IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

2nd version - Proposal for New Section 11.1 PRNG



Hi,

Integrating Russ' suggestion.

Thanks,
Chris

============================================================

11.1 PRNG

   This protocol binds each session key to the session by including
   random data that is specific to the session in the hash used to
   produce session keys.  If the random data here (e.g., DH parameters)
   are pseudo-random then the PRNG should be cryptographically secure
   (i.e., its next output not easily guessed even when knowing all
   previous outputs) and, furthermore, entropy needs to be added to the
   PRNG.  RFC 1750 [1750] offers suggestions for sources of entropy.
   Implementors should note the importance of entropy and the well-meant,
   anecdotal warning about the difficulty in properly implementing PRNG
   functions.

   The amount of entropy available to a given client or server sometimes
   may be less than what is needed to run the protocol.  In this case
   one must either resort to PRNGs anyways or refuse to run the protocol.
   In practice implementors will generally rely on some PRNG.



[1750] Eastlake, D., Crocker, S. and J. Schiller, "Randomness
       Recommendations for Security", RFC 1750, December 1994.





Home | Main Index | Thread Index | Old Index