Sujet : Re: Torvalds Slams Theoretical Security
De : invalid (at) *nospam* invalid.invalid (Richard Kettlewell)
Groupes : comp.os.linux.advocacy comp.os.linux.miscDate : 26. Oct 2024, 09:56:59
Autres entêtes
Organisation : terraraq NNTP server
Message-ID : <wwv8qubb5t0.fsf@LkoBDZeT.terraraq.uk>
References : 1 2 3 4 5 6
User-Agent : Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
Lawrence D'Oliveiro <
ldo@nz.invalid> writes:
Richard Kettlewell wrote:
Lawrence D'Oliveiro <ldo@nz.invalid> writes:
Weak cryptography is easy to fix. The hard part to fix is weak random
numbers.
Other way round. A bad RNG can be swapped out for a better one with
little or no impact on anything else.
>
Unfortunately, you can never be sure your RNG is good.
You can’t be 100% certain of anything. There’s a 2^-256 chance someone
could guess an AES-256 key in a single try, for instance. But you can be
certain enough for practical purposes.
Accidents (DSA-1571, Sony) and compromises (Juniper, Crypto AG) happen;
so does cryptanalysis (Enigma). But the majority of vulnerabilities are
not cryptographic in nature.
-- https://www.greenend.org.uk/rjk/