http://www.ibm.com/developerworks/power/library/pa-cellsecurity/
So, it seems the cell does have hardware random number generator. But isn't used for encryption?
Maybe the hardware random number generator is only used for the firmware code (hypervisor).
and the hypervisor(that sony wrote) itself encrypts/decrypts SELFS with it's own seperate key that does not have random number in it.
IBM article said:The runtime secure boot can protect the certificate revocation list (think of this as the list of bad guys) from modification (a particular bad guy might be removed from the list, for example). The hardware root of secrecy can ensure that the private key is not exposed by an attacker. (If the private key is obtained, all communication addressed to the private key owner will be exposed to the attacker). The hardware random number generator protects against replay attacks (see Resources) by marking the current communication with a time stamp. A replay attack is where an adversary takes an old communication message and sends it again through the unsecured communication channel. Because the authentication protocol will verify that the message is authentic, a robust time stamping feature is the only way for the communication partners to realize that there is a man-in-the-middle attack happening.
So, it seems the cell does have hardware random number generator. But isn't used for encryption?
Maybe the hardware random number generator is only used for the firmware code (hypervisor).
and the hypervisor(that sony wrote) itself encrypts/decrypts SELFS with it's own seperate key that does not have random number in it.
Last edited by a moderator: