Mercurial > dropbear
comparison libtomcrypt/doc/crypt.tex @ 1711:e9dba7abd939
Merge libtomcrypt v1.18.2
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Wed, 10 Jun 2020 23:16:13 +0800 |
parents | 6dba84798cd5 |
children |
comparison
equal
deleted
inserted
replaced
1710:1ff2a1034c52 | 1711:e9dba7abd939 |
---|---|
3664 and SHA--256 hash function. Technically, Fortuna will work with any block cipher that accepts a 256--bit | 3664 and SHA--256 hash function. Technically, Fortuna will work with any block cipher that accepts a 256--bit |
3665 key, and any hash that produces at least a 256--bit output. However, to make the implementation simpler | 3665 key, and any hash that produces at least a 256--bit output. However, to make the implementation simpler |
3666 it has been fixed to those choices. | 3666 it has been fixed to those choices. |
3667 | 3667 |
3668 Fortuna is more secure than Yarrow in the sense that attackers who learn parts of the entropy being | 3668 Fortuna is more secure than Yarrow in the sense that attackers who learn parts of the entropy being |
3669 added to the PRNG learn far less about the state than that of Yarrow. Without getting into to many | 3669 added to the PRNG learn far less about the state than that of Yarrow. Without getting into too many |
3670 details Fortuna has the ability to recover from state determination attacks where the attacker starts | 3670 details Fortuna has the ability to recover from state determination attacks where the attacker starts |
3671 to learn information from the PRNGs output about the internal state. Yarrow on the other hand, cannot | 3671 to learn information from the PRNGs output about the internal state. Yarrow on the other hand, cannot |
3672 recover from that problem until new entropy is added to the pool and put to use through the ready() function. | 3672 recover from that problem until new entropy is added to the pool and put to use through the ready() function. |
3673 | |
3674 For detailed information on how the algorithm works and what you have to do to maintain the secure state | |
3675 get a copy of the book\footnote{Niels Ferguson and Bruce Schneier, Practical Cryptography. ISBN 0-471-22357-3.} or | |
3676 read the paper online\footnote{\url{https://www.schneier.com/academic/paperfiles/fortuna.pdf} [Accessed on 7th Dec. 2017]}. | |
3673 | 3677 |
3674 \subsubsection{RC4} | 3678 \subsubsection{RC4} |
3675 | 3679 |
3676 RC4 is an old stream cipher that can also double duty as a PRNG in a pinch. You key RC4 by | 3680 RC4 is an old stream cipher that can also double duty as a PRNG in a pinch. You key RC4 by |
3677 calling add\_entropy(), and setup the key by calling ready(). | 3681 calling add\_entropy(), and setup the key by calling ready(). |