You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: 6.857/ps1_problem3.tex
+6-1
Original file line number
Diff line number
Diff line change
@@ -69,6 +69,11 @@ \section{Problem 3.a}
69
69
\item The entropy pool at system startup is unpredictable. As an added security feature, \emph{/dev/random} makes sure that the entropy pool persists between shutdown and startup. Since the boot process is predictable, the helps ensure that an attacker cannot predict random numbers while the computer is still booting. This assumption could break down, however, in cases where the computer has been shutdown for a long time and the entropy pool's bits are zeroed.
70
70
\end{itemize}
71
71
72
-
The \emph{/dev/random} function assumes that its input values are unpredictable.
72
+
The assumptions underlying \emph{/dev/random} make it more easy to exploit, especially if an attacker knows about the interrupt operations on the machine in question and is able to attack the machine on startup. For most cases, however, \emph{/dev/random} generates keys which are hard to predict.
73
+
74
+
\section{Problem 3.b}
75
+
76
+
The proposal to use the sponge construction in \emph{/dev/random} would require a number of properties about SHA-3 and the sponge construction it uses.
0 commit comments