Pitchforks for RDSEED
Pitchforks for RDSEED
Posted Feb 9, 2024 12:18 UTC (Fri) by zx2c4 (subscriber, #82519)In reply to: Pitchforks for RDSEED by spacefrogg
Parent article: Pitchforks for RDSEED
Posted Feb 9, 2024 12:42 UTC (Fri)
by spacefrogg (subscriber, #119608)
[Link] (3 responses)
Cross-domain fairness seems to be hard to achieve when I think about it, especially because entropy is such a scarce resource. Access to the entropy source should be exclusive to the kernel(s). Applications should have to make due with derived PRNG values. But I am just thinking out loud...
Posted Feb 9, 2024 12:59 UTC (Fri)
by spacefrogg (subscriber, #119608)
[Link] (2 responses)
Posted Feb 9, 2024 13:28 UTC (Fri)
by zx2c4 (subscriber, #82519)
[Link] (1 responses)
Posted Feb 9, 2024 14:31 UTC (Fri)
by spacefrogg (subscriber, #119608)
[Link]
Daniel J. Bernstein has an excellent write-up about how you could potentially mis-use an entropy source to force your encryption scheme to leak your private key alongside your ciphertext while making it look perfectly fine. I just fail to find it right now. (It was concentrating on why encryption schemes should not mindlessly access entropy)
The argument is quite simple: You do know how the encryption scheme distributes bits. If you control the entropy bits and the encryption scheme, you can hide the private key in the entropy bits and make the ciphertext partially predictable, enough to recover the private key and thus the original message.
Pitchforks for RDSEED
Pitchforks for RDSEED
These are unprivileged CPU instructions. This isn't a kernel scheduler issue.
Pitchforks for RDSEED
Pitchforks for RDSEED