diff options
author | lloyd <[email protected]> | 2008-11-11 21:06:39 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2008-11-11 21:06:39 +0000 |
commit | 03e022126be8fac992a33983ac4430150fb55c84 (patch) | |
tree | b2389a014b7b68d01fd073d83533c49564f264ec /src/rng | |
parent | 8879a51da7c3b93e27439122cea5d5aa81ae38c3 (diff) |
Drop use of entropy estimation in Randpool for the same reason as HMAC_RNG.
As with HMAC_RNG, instead assume one bit of conditional entropy per byte
of polled material. Since they are no longer used, drop the entropy
estimation routines entirely.
Diffstat (limited to 'src/rng')
-rw-r--r-- | src/rng/hmac_rng/hmac_rng.cpp | 1 | ||||
-rw-r--r-- | src/rng/randpool/randpool.cpp | 36 |
2 files changed, 20 insertions, 17 deletions
diff --git a/src/rng/hmac_rng/hmac_rng.cpp b/src/rng/hmac_rng/hmac_rng.cpp index d85cebada..95b119b9d 100644 --- a/src/rng/hmac_rng/hmac_rng.cpp +++ b/src/rng/hmac_rng/hmac_rng.cpp @@ -4,7 +4,6 @@ *************************************************/ #include <botan/hmac_rng.h> -#include <botan/entropy.h> #include <botan/loadstor.h> #include <botan/xor_buf.h> #include <botan/util.h> diff --git a/src/rng/randpool/randpool.cpp b/src/rng/randpool/randpool.cpp index 743123b9e..0017c476c 100644 --- a/src/rng/randpool/randpool.cpp +++ b/src/rng/randpool/randpool.cpp @@ -4,7 +4,6 @@ *************************************************/ #include <botan/randpool.h> -#include <botan/entropy.h> #include <botan/loadstor.h> #include <botan/xor_buf.h> #include <botan/util.h> @@ -109,7 +108,19 @@ void Randpool::reseed() { SecureVector<byte> buffer(128); - Entropy_Estimator estimate; + u32bit entropy_est = 0; + + /* + When we reseed, assume we get 1 bit per byte sampled. + + This class used to perform entropy estimation, but what we really + want to measure is the conditional entropy of the data with respect + to an unknown attacker with unknown capabilities. For this reason + making any sort of sane estimate is impossible. See also + "Boaz Barak, Shai Halevi: A model and architecture for + pseudo-random generation with applications to /dev/random. ACM + Conference on Computer and Communications Security 2005." + */ // First do a fast poll of all sources (no matter what) for(u32bit j = 0; j != entropy_sources.size(); ++j) @@ -117,24 +128,18 @@ void Randpool::reseed() u32bit got = entropy_sources[j]->fast_poll(buffer, buffer.size()); mac->update(buffer, got); - estimate.update(buffer, got, 96); + entropy_est += got; } - /* Limit assumed entropy from fast polls (to ensure we do at - least a few slow polls) - */ - estimate.set_upper_bound(256); - // Then do a slow poll, until we think we have got enough entropy for(u32bit j = 0; j != entropy_sources.size(); ++j) { u32bit got = entropy_sources[j]->slow_poll(buffer, buffer.size()); mac->update(buffer, got); + entropy_est += got; - estimate.update(buffer, got, 256); - - if(estimate.value() > 384) + if(entropy_est > 512) break; } @@ -143,7 +148,7 @@ void Randpool::reseed() xor_buf(pool, mac_val, mac_val.size()); mix_pool(); - entropy += estimate.value(); + entropy = std::min<u32bit>(entropy + entropy_est, 8 * mac_val.size()); } /************************************************* @@ -155,9 +160,8 @@ void Randpool::add_entropy(const byte input[], u32bit length) xor_buf(pool, mac_val, mac_val.size()); mix_pool(); - Entropy_Estimator estimate; - estimate.update(input, length); - entropy += estimate.value(); + // Assume 1 bit conditional entropy per byte of input + entropy = std::min<u32bit>(entropy + length, 8 * mac_val.size()); } /************************************************* @@ -173,7 +177,7 @@ void Randpool::add_entropy_source(EntropySource* src) *************************************************/ bool Randpool::is_seeded() const { - return (entropy >= 384); + return (entropy >= 7 * mac->OUTPUT_LENGTH); } /************************************************* |