Random numbers from CPU execution time jitter
Random numbers from CPU execution time jitter
Posted Apr 30, 2015 9:32 UTC (Thu) by matthias (subscriber, #94967)In reply to: Random numbers from CPU execution time jitter by alankila
Parent article: Random numbers from CPU execution time jitter
Getting real entropy is a big problem if you want to have cryptography on embedded devices. The way of cracking a key by going all the way down through a RNG is not very practical, but if you do not use enough entropy, then you will e.g. generate RSA keys that share a common factor with other RSA keys produced on similar systems. These keys provide no security at all.
The following is just the first reference, I found:
http://arstechnica.com/business/2012/02/15/crypto-shocker...
The systems did not have enough real entropy, else these collisions should not occur. And saving and reloading a seed is no help, if these devices need to create cryptographic keys on first boot.
