[表示 : 全て 最新50 1-99 101- 201- 301- 401- 501- 601- 701- 801- 901- 2chのread.cgiへ]
Update time : 05/09 20:06 / Filesize : 221 KB / Number-of Response : 985
[このスレッドの書き込みを削除する]
[+板 最近立ったスレ&熱いスレ一覧 : +板 最近立ったスレ/記者別一覧] [類似スレッド一覧]


↑キャッシュ検索、類似スレ動作を修正しました、ご迷惑をお掛けしました

【Linux】カーネル総合2【Kernel】



870 名前:login:Penguin mailto:sage [2006/03/09(木) 17:42:46 ID:F1hfIavH]
Analysis of the Linux Random Number Generator
Zvi Gutterman and Benny Pinkas and Tzachy Reinman
ttp://eprint.iacr.org/2006/086

Abstract. Linux is the most popular open source project.
The Linux random number generator is part of the kernel of all Linux distributions
and is based on generating randomness from entropy of operating system events.
The output of this generator is used for almost every security protocol,
including TLS/SSL key generation, choosing TCP sequence numbers, and file system and email encryption.
Although the generator is part of an open source project, its source code
(about $2500$ lines of code) is poorly documented, and patched with hundreds of code patches.

We used dynamic and static reverse engineering to learn the operation of this generator.
This paper presents a description of the underlying algorithms and exposes several security vulnerabilities.
In particular, we show an attack on the forward security of the generator
which enables an adversary who exposes the state of the generator to compute previous states and outputs.
In addition we present a few cryptographic flaws in the design of the generator,
as well as measurements of the actual entropy collected by it,
and a critical analysis of the use of the generator in Linux distributions on disk-less devices.






[ 続きを読む ] / [ 携帯版 ]

全部読む 前100 次100 最新50 [ このスレをブックマーク! 携帯に送る ] 2chのread.cgiへ
[+板 最近立ったスレ&熱いスレ一覧 : +板 最近立ったスレ/記者別一覧]( ´∀`)<221KB

read.cgi ver5.27 [feat.BBS2 +1.6] / e.0.2 (02/09/03) / eucaly.net products.
担当:undef