Results 1 to 10 of 10

Thread: Linux 3.15 Random To Support Intel's RDSEED

  1. #1
    Join Date
    Jan 2007
    Posts
    14,538

    Default Linux 3.15 Random To Support Intel's RDSEED

    Phoronix: Linux 3.15 Random To Support Intel's RDSEED

    The Linux 3.15 kernel's /dev/random implementation will feature a new instruction of Intel's upcoming Broadwell processors...

    http://www.phoronix.com/vr.php?view=MTY1NDY

  2. #2
    Join Date
    Apr 2014
    Posts
    1

    Default

    Quote Originally Posted by phoronix View Post
    Phoronix: Linux 3.15 Random To Support Intel's RDSEED

    The Linux 3.15 kernel's /dev/random implementation will feature a new instruction of Intel's upcoming Broadwell processors...

    http://www.phoronix.com/vr.php?view=MTY1NDY
    I had asked about how Intel's RDRAND could possibly compromise entropy on StackExchange a while ago. Maybe it will be of interest to anyone seeing this article: http://crypto.stackexchange.com/ques...romise-entropy

  3. #3
    Join Date
    Sep 2007
    Posts
    305

    Default

    Fine, as it won't be the only source for randomness to be used...

  4. #4
    Join Date
    May 2008
    Posts
    99

    Default

    Since this chip was designed way before Snowden happened, this instruction most probably has nothing to do with randomness.

  5. #5
    Join Date
    Oct 2009
    Posts
    2,081

    Default

    Is it fully 100% NSA compliant?

  6. #6
    Join Date
    May 2013
    Posts
    34

    Default

    the RDSEED instruction is supported with Broadwell hardware for seeding /dev/random.
    There is no seed for /dev/random, as it intended to be 100% true random. Seeding is for pseudorandom number generators.

  7. #7
    Join Date
    Sep 2012
    Posts
    653

    Default

    Quote Originally Posted by Szzz View Post
    There is no seed for /dev/random, as it intended to be 100% true random. Seeding is for pseudorandom number generators.
    You can seed /dev/random. In a sense, it is actually seeded by environmental noises. Using a hardware generator can be used to get the required entropy faster, especially early after boot, even more so on predictably functioning machines.

  8. #8
    Join Date
    Aug 2012
    Location
    Pennsylvania, United States
    Posts
    1,873

    Default

    Linus has already gone over this multiple times. /dev/random and /dev/urandom aren't seeded by a single source. They get used as one of many sources so even if one source is bad, the "bad' gets flushed out by the added entropy from other sources.

  9. #9
    Join Date
    Mar 2013
    Posts
    59

    Default

    Quote Originally Posted by droidhacker View Post
    Is it fully 100% NSA compliant?
    I should think so.

    But how to tell...?

  10. #10
    Join Date
    Mar 2011
    Location
    Canada
    Posts
    96

    Default

    Quote Originally Posted by Szzz View Post
    There is no seed for /dev/random, as it intended to be 100% true random. Seeding is for pseudorandom number generators.
    /dev/random is also a pseudo-random number generator. It's not safe to use the unconditioned entropy because it has varying quality so it's not exposed.

    http://www.2uo.de/myths-about-urandom/

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •