Conversation:
Notices
-
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 06-Jan-2014 02:44:27 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
Michael Lee @mukimu of ZDNet writes about proof-of-concept code demonstrating the Dual_EC_DRBG random number generator vulnerability http://www.zdnet.com/nsa-encryption-backdoor-proof-of-concept-published-7000024793/ In December Theodore Ts'o approved a Linux kernel patch to initialize SHA starting value with the hardware RNG http://lkml.indiana.edu/hypermail/linux/kernel/1312.2/01593.html (apparently in spite of his earlier protests: https://lkml.org/lkml/2013/9/5/275 ) !crypto !surveillance -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 06-Jan-2014 03:05:10 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
@mukimu also writes " While the NSA-defined values of P and Q are unknown…" — how people write an implementation if P and Q are unknown? I think he must have meant "the *relationship between* P and Q are unknown"
-