comparison libtomcrypt/doc/crypt.tex @ 1711:e9dba7abd939

Merge libtomcrypt v1.18.2
author Matt Johnston <matt@ucc.asn.au>
date Wed, 10 Jun 2020 23:16:13 +0800
parents 6dba84798cd5
children
comparison
equal deleted inserted replaced
1710:1ff2a1034c52 1711:e9dba7abd939
3664 and SHA--256 hash function. Technically, Fortuna will work with any block cipher that accepts a 256--bit 3664 and SHA--256 hash function. Technically, Fortuna will work with any block cipher that accepts a 256--bit
3665 key, and any hash that produces at least a 256--bit output. However, to make the implementation simpler 3665 key, and any hash that produces at least a 256--bit output. However, to make the implementation simpler
3666 it has been fixed to those choices. 3666 it has been fixed to those choices.
3667 3667
3668 Fortuna is more secure than Yarrow in the sense that attackers who learn parts of the entropy being 3668 Fortuna is more secure than Yarrow in the sense that attackers who learn parts of the entropy being
3669 added to the PRNG learn far less about the state than that of Yarrow. Without getting into to many 3669 added to the PRNG learn far less about the state than that of Yarrow. Without getting into too many
3670 details Fortuna has the ability to recover from state determination attacks where the attacker starts 3670 details Fortuna has the ability to recover from state determination attacks where the attacker starts
3671 to learn information from the PRNGs output about the internal state. Yarrow on the other hand, cannot 3671 to learn information from the PRNGs output about the internal state. Yarrow on the other hand, cannot
3672 recover from that problem until new entropy is added to the pool and put to use through the ready() function. 3672 recover from that problem until new entropy is added to the pool and put to use through the ready() function.
3673
3674 For detailed information on how the algorithm works and what you have to do to maintain the secure state
3675 get a copy of the book\footnote{Niels Ferguson and Bruce Schneier, Practical Cryptography. ISBN 0-471-22357-3.} or
3676 read the paper online\footnote{\url{https://www.schneier.com/academic/paperfiles/fortuna.pdf} [Accessed on 7th Dec. 2017]}.
3673 3677
3674 \subsubsection{RC4} 3678 \subsubsection{RC4}
3675 3679
3676 RC4 is an old stream cipher that can also double duty as a PRNG in a pinch. You key RC4 by 3680 RC4 is an old stream cipher that can also double duty as a PRNG in a pinch. You key RC4 by
3677 calling add\_entropy(), and setup the key by calling ready(). 3681 calling add\_entropy(), and setup the key by calling ready().