Random numbers from CPU execution time jitter
Random numbers from CPU execution time jitter
Posted Apr 30, 2015 7:31 UTC (Thu) by alankila (guest, #47141)Parent article: Random numbers from CPU execution time jitter
This is all perfectly theoretical anyway because it will be very hard to attack a random number generator which gets data in from multiple sources. Saving the seed to disk and merging it into the random pool during the next boot is the most important thing, I think. Any source not perfectly controlled by attacker from the start of time will input at least some unpredictable bits sometimes, and unless the attacker can gain access of the PRNG state, the problem is completely intractable.
Since there is no practical usage for "real" entropy, I don't see why Linux bothers with /dev/random.
