Khoth comments on Can noise have power? - Less Wrong

9 Post author: lukeprog 23 May 2014 04:54AM

You are viewing a comment permalink. View the original post to see all comments and the full post content.

Comments (42)

You are viewing a single comment's thread. Show more comments above.

Comment author: Khoth 23 May 2014 10:51:43PM *  3 points [-]

They may only be able to access your hardware in limited ways. For example, if a hardware "RNG" actually outputs 1,2,3,... encrypted with some key known only to the NSA, that's essentially totally undetectable. But if instead they have the hardware send out extra information over the internet, sooner or later someone will notice and the game will be up.

Comment author: V_V 25 May 2014 09:14:53AM 0 points [-]

How does the NSA synchs with your "RNG" is no information is exchanged?

But anyway, if you reasonably believe that your RNG may have been compromised, then you just don't use it.

Comment author: Nornagest 27 May 2014 08:31:09PM *  1 point [-]

They don't need to sync for it to be a serious weakness in a cryptosystem. If a system using Khoth's PRNG sends out a billion encrypted messages in its lifetime, then an attacker with the PRNG key needs less than 2^30 tries to decrypt a message sent at an unknown point in that sequence -- a large number, but more than manageable when you consider that a PRNG with a period of 2^80 would be considered weak in the crypto world.

Comment author: V_V 28 May 2014 08:52:19AM 0 points [-]

Agreed.