[Discuss] NSA capabilities
Richard Pieri
richard.pieri at gmail.com
Thu Aug 15 10:34:35 EDT 2013
Richard Pieri wrote:
> This assumes a truly random spread. Computers don't do truly random
> numbers.
Just found this courtesy of slashdot. I haven't been keeping up with the
MITnews or I would have spotted this yesterday.
http://web.mit.edu/newsoffice/2013/encryption-is-less-secure-than-we-thought-0814.html
One practical upshot of this is that the probability of repeat
collisions is 1 in 2^(n-x) where "x" represents how not quite
cryptographically random the PRNG used really is. This leads to another
point and another slashdot article. Just because you have good tools (or
good enough tools) does not mean you auto-magically get good results:
http://android-developers.blogspot.com/2013/08/some-securerandom-thoughts.html
"We have now determined that applications which use the Java
Cryptography Architecture (JCA) for key generation, signing, or random
number generation may not receive cryptographically strong values on
Android devices due to improper initialization of the underlying PRNG."
That's on the root cause of the recent Android Bitcoin theft.
--
Rich P.
More information about the Discuss
mailing list