Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What is a case where a random IV needs a different entropy source than a session key?

And if we're assuming the entropy pool is being compromised (full state read by attacker) from time to time, isn't it foolish to be generating keys on such a machine? Why would new state not be compromised in he same way the previous state was? I understand the system design may want to provide a robust RNG, but further than that seems slightly pointless.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: