Random numbers from CPU execution time jitter
Random numbers from CPU execution time jitter
Posted Apr 30, 2015 15:08 UTC (Thu) by fandingo (guest, #67019)In reply to: Random numbers from CPU execution time jitter by tpo
Parent article: Random numbers from CPU execution time jitter
Your criticism is predicated on a complete change of how entropy pools are used. Randomness is never "sucked out" of an entropy pool. New random data is folded into the existing data, and the overall pool never decreases in size. The output of an entropy pool is transformed data, too, so you're never giving out the seed data (because that would disclose state).
(This seems to confuse a lot of people when they look at the blocking behavior of /dev/random. The pool never depletes, but a calculation of the quality of the randomness in the pool -- i.e. the entropy -- causes blocking, not a depletion of the actual data.)
That's why adding data doesn't hurt. If you have an entropy pool that you trust at t1, folding in a bunch of low-quality data still leaves you with the original t1 randomness.
