On Wed, Jul 26, 2017 at 1:57 PM, Martin Rex <m...@sap.com> wrote:
>
> Through the 10x compression of the RDRAND output, which will provably
> create an incredibly huge amount of collisions, the attacker will be
> unable to identify any particular output values of RDRAND.
>
> Your conceived attack could only work under the condition that
> 10 RDRAND consecutive outputs are always fully deterministic, and
> that also the seed used by RDRAND will be fully deterministic to
> the attacker -- or can otherwise be learned out-of-band by the attacker
> -- while at the same time this property will remain invisible to
> all external randomness tests.
>

I think this is pretty easy for some conceivable attacks. Suppose that your
adversary makes RDRAND a DRBG seeded with wall-clock time and device-ID.
That's going to produce deterministic output, but it will pass all of the
tests and appear to be random. If the attacker knows your device-ID, or
even just a range of possible device-IDs, they can confirm via a match.

The 10x compression would just make them do a bit more work.


-- 
Colm
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to