Deutsch   English   Français   Italiano  
<vqc9d5$30gab$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!news.quux.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: Richard Heathfield <rjh@cpax.org.uk>
Newsgroups: sci.crypt
Subject: Re: Generate random passwords with your mouse ... :-)
Date: Thu, 6 Mar 2025 13:53:40 +0000
Organization: Fix this later
Lines: 48
Message-ID: <vqc9d5$30gab$1@dont-email.me>
References: <vqaaim$1q8rg$1@paganini.bofh.team> <vqafqv$2jg8b$2@dont-email.me>
 <vqbnmd$21e9n$1@paganini.bofh.team> <vqbpl5$2tqjk$1@dont-email.me>
 <vqc784$2281i$1@paganini.bofh.team>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 06 Mar 2025 14:53:42 +0100 (CET)
Injection-Info: dont-email.me; posting-host="a12ade0f7e5b6fab51cfc5e27fedd0be";
	logging-data="3162443"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18A/4jGoWI5Zb4s/XkR4N0KvvjwDqooYaXxMzXwHmY5zQ=="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:E/RtkndLJpOEfVAgvuwPLHGwEyQ=
Content-Language: en-GB
In-Reply-To: <vqc784$2281i$1@paganini.bofh.team>
Bytes: 2635

On 06/03/2025 13:16, Stefan Claas wrote:
> You may check out the additional Linux code.

Well, okay, I did.

I asked for 1 character, which took me maybe 2 or 3 seconds 
(should be command line args, by the way), and then I got a 
character back pretty much immediately, as one would expect.

Then I ran it again, this time asking for 2 characters. For over 
3 minutes I jiggled the mouse like crazy, to no avail. In the end 
I hit ^C.

Here's my output. Note the position of the interrupt at the end 
of the "Progress" line.

rjh@hero:~/alldata/dev/crypto/stefanclaas/entropy/mouse$ time 
../scmouse
Enter desired number of hex bytes (default is 16, max 256): 2
Generate character-based password instead of hex? (1=yes, 0=no): 1
Using 2 bytes for entropy collection

Please move your mouse to collect entropy...
Take your time, each mouse movement is being recorded.
Progress: 50% [##########----------]^C

Entropy collection completed!

Random Password: Za
SHA256: 
ccb4d4846d431717f5bad8aabbad7d2b7e07f1611f506964c5c0c1af8f9a07dd

real	3m3.799s
user	0m0.834s
sys	0m2.252s


At 90+ seconds per byte, I can get entropy faster from my 20d16 
--- 80 bits per chuck, at as fast a speed as I can type them in.

Why is it so slow?

-- 
Richard Heathfield
Email: rjh at cpax dot org dot uk
"Usenet is a strange place" - dmr 29 July 1999
Sig line 4 vacant - apply within