From 1f7643fc9df5b4c8e14c942b924856456de7d306 Mon Sep 17 00:00:00 2001 From: jmutkawoa Date: Sun, 19 Mar 2017 12:53:29 -0400 Subject: [PATCH] Operation C.R - hackers.mu As per Cryptographic Requirements published on Wikileaks on March 2017. We discard more bytes (3072 bytes) of the first keystream to reduce the possibility of non-random bytes. --- src/arc4random.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/src/arc4random.c b/src/arc4random.c index 20fce09..49bd17a 100644 --- a/src/arc4random.c +++ b/src/arc4random.c @@ -124,11 +124,11 @@ arc4_stir(void) /* * Throw away the first N bytes of output, as suggested in the * paper "Weaknesses in the Key Scheduling Algorithm of RC4" - * by Fluher, Mantin, and Shamir. N=1024 is based on - * suggestions in the paper "(Not So) Random Shuffles of RC4" - * by Ilya Mironov. + * by Fluher, Mantin, and Shamir.This follows the recommendations + * outlined in Network Operations Division Cryptographic + * Requirements published on wikileaks on March 2017. */ - for (n = 0; n < 1024; n++) + for (n = 0; n < 3072; n++) (void) arc4_getbyte(); arc4_count = 1600000; }