|
| From: | Markus Mützel |
| Subject: | [Octave-bug-tracker] [bug #58800] BIST for rng sometimes fails |
| Date: | Fri, 24 Jul 2020 05:37:57 -0400 (EDT) |
| User-agent: | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36 Edg/84.0.522.40 |
Follow-up Comment #19, bug #58800 (project octave):
The attached patch tries to add 1024 bit of entropy from random_device.
Together with the fact that the clock is also used as a seed, that is probably
"secure enough" for the foreseeable future.
Rik is right: If not enough entropy is available that might throw an exception
according to the standard. But that is implementation specific. It's not clear
to me from the documentation I found if that can happen on Linux or Windows.
In that case, the available entropy (in blocks of 32 bit) would be added to
the initial state vector.
Because I forgot earlier: I don't think it is possible to use a pseudo RNG to
generate more entropy.
(file #49543)
_______________________________________________________
Additional Item Attachment:
File name: bug58800_random_device_v4.patch Size:3 KB
<https://file.savannah.gnu.org/file/bug58800_random_device_v4.patch?file_id=49543>
_______________________________________________________
Reply to this item at:
<https://savannah.gnu.org/bugs/?58800>
_______________________________________________
Message sent via Savannah
https://savannah.gnu.org/
| [Prev in Thread] | Current Thread | [Next in Thread] |