Frequently changing keys also limits the exposure time of a key compromised by Mallory. If the extracted key is used only for a single communication session, Mallory cannot decrypt previous sessions and needs to repeat the extraction (and hope that her malware won’t be detected by Alice’s virus scanners, firewalls, and intrusion detection systems) to […]
3.7.3 True randomness and pseudo-randomness Modern algorithms such as Yarrow [99] or Fortuna (see chapter 10 of [65]) generate secret keys for use in cryptographic algorithms and protocols by accumulating entropy from several True Random Number Generators (TRNGs) and combining it using hash functions (see Chapter 11, Hash Functions and Message Authentication Codes) and block […]