[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: cprng_fast implementation benchmarks
On Apr 24, 2014, at 10:09 PM, Thor Lancelot Simon <tls%panix.com@localhost>
> On Thu, Apr 24, 2014 at 07:23:41PM +0000, Paul_Koning%Dell.com@localhost
>> I do disagree. The reason is that I see no requirements that make it
>> possible to decide whether the weak generator is useful.
> Here are some cases where the "fast" CPRNG is used:
> 1) Generation of ip_id values
> 2) Generation of ephemeral port numbers
> 3) Generation of explicit IVs for use in cryptographic network
> 4) Randomization of addresses for mappings of userspace processes
> 5) Generation of the random "canary" used by the userspace stack
> smash protection code
> I think these cases have some things in common and we can begin to intuit
> some general rules from them.
That’s not clear to me, probably because I haven’t seen descriptions of the
vulnerabilities. I know there is some discussion of #3 that I can find; I
don’t know about the others.
> It seems to me that we are generally looking at cases where:
> * The value of the resource directly being protected is ephemeral
> * An active attack is required in order to exploit any weakness
> in the RNG
> * The constant factor for an adversary to attack the RNG
> is quite large (for example, making a process crash across the
> * Nonetheless attacks on non-cryptographic RNGs have been empirically
> sucessful in all of these cases.
> I don't think anyone knows much about how to design a RNG that's "just strong
> enough" even if we had a much more detailed threat model (though one might
> argue that one could keep subtracting rounds from ChaCha and arrive at ChaCha4
> or so forth; and there is the intriguing suggestion to be found various places
> that, in fact, the NSA does do things very much like this, with Skipjack
> having been designed to be just as strong as it needed to be and no stronger).
Note that I was not advocating “just strong enough”. I was advocating “strong
enough”, which requires knowing what the minimum is so we can be comfortably
> But we do know how to select an RNG that meets some minimum strength criteria
> and is faster than the "fast" RNG we already have. And that is what we are
> doing in this discussion.
Yes, the discussion is about an RNG that is weaker than the existing strong
RNG. How much weaker is not clear. But the critical point is that I can’t
tell whether it is stronger than the minimum required, or weaker than that.
Main Index |
Thread Index |