Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Random number generation being influenced - rumors

Maxim Kammerer mk at dee.su
Sat Sep 7 08:21:00 PDT 2013


On Sat, Sep 7, 2013 at 8:24 AM, Andy Isaacson <adi at hexapodia.org> wrote:
> That's the claimed design, yes.  I see no particular reason to believe
> that the hardware in my server implements the design.  I can't even test
> that the AES whitening does what it is documented to do, because Intel
> refused to provide access to the prewhitened input.

I agree; I misread the Intel documentation previously, and inferred
that CTR_DRBG and other high-level algorithms are implemented in
microcode, with ES being accessible to it (and to reverse engineers)
directly. Personally, I wouldn't trust an embedded engineer to
implement bubble sort correctly, and see no reason to trust them with
security-critical implementations, even if one assumes no malice or
subversion of production process. In Google+ thread referenced above,
David Johnston (Intel engineer in charge of RDRAND) claimed that all
the specs are open and accessible; when I mentioned that the AES block
size in CTR_DRBG is not even specified, I received no response (of
course). Also, proponents of feeding RDRAND directly into
/dev/[u]random ignore the AES-reducibility of any cryptosystem that
uses RDRAND in that fashion.

-- 
Maxim Kammerer
Liberté Linux: http://dee.su/liberte



More information about the liberationtech mailing list