diff --git a/core/java/src/net/i2p/crypto/DHSessionKeyBuilder.java b/core/java/src/net/i2p/crypto/DHSessionKeyBuilder.java
index 804aff1af7c8d6a6bbd99b824f4e09df037dba2d..b3c5813f13bf05746f0092b65365166dd5d1b69f 100644
--- a/core/java/src/net/i2p/crypto/DHSessionKeyBuilder.java
+++ b/core/java/src/net/i2p/crypto/DHSessionKeyBuilder.java
@@ -48,6 +48,7 @@ import net.i2p.util.RandomSource;
  * @author jrandom
  */
 public class DHSessionKeyBuilder {
+    private static I2PAppContext _context = I2PAppContext.getGlobalContext();
     private final static Log _log = new Log(DHSessionKeyBuilder.class);
     private static int MIN_NUM_BUILDERS = -1;
     private static int MAX_NUM_BUILDERS = -1;
@@ -68,7 +69,7 @@ public class DHSessionKeyBuilder {
     public final static String DEFAULT_DH_PRECALC_DELAY = "1000";
 
     static {
-        I2PAppContext ctx = I2PAppContext.getGlobalContext();
+        I2PAppContext ctx = _context;
         try {
             int val = Integer.parseInt(ctx.getProperty(PROP_DH_PRECALC_MIN, DEFAULT_DH_PRECALC_MIN));
             MIN_NUM_BUILDERS = val;
@@ -305,6 +306,8 @@ public class DHSessionKeyBuilder {
                 _log.debug("Storing " + remaining.length + " bytes from the DH exchange by SHA256 the session key");
         } else { // (buf.length >= val.length) 
             System.arraycopy(buf, 0, val, 0, val.length);
+            // feed the extra bytes into the PRNG
+            _context.random().harvester().feedEntropy("DH", buf, val.length, buf.length-val.length); 
             byte remaining[] = new byte[buf.length - val.length];
             System.arraycopy(buf, val.length, remaining, 0, remaining.length);
             _extraExchangedBytes.setData(remaining);
diff --git a/core/java/src/net/i2p/crypto/ElGamalAESEngine.java b/core/java/src/net/i2p/crypto/ElGamalAESEngine.java
index 085b917989565faaebf523f31767c50b23daf2e4..5cf8e9ef05b319c08a755bf6c25c5ca6547cedee 100644
--- a/core/java/src/net/i2p/crypto/ElGamalAESEngine.java
+++ b/core/java/src/net/i2p/crypto/ElGamalAESEngine.java
@@ -154,11 +154,14 @@ public class ElGamalAESEngine {
 
         byte preIV[] = null;
         
+        int offset = 0;
         byte key[] = new byte[SessionKey.KEYSIZE_BYTES];
-        System.arraycopy(elgDecr, 0, key, 0, SessionKey.KEYSIZE_BYTES);
+        System.arraycopy(elgDecr, offset, key, 0, SessionKey.KEYSIZE_BYTES);
+        offset += SessionKey.KEYSIZE_BYTES;
         usedKey.setData(key);
         preIV = new byte[32];
-        System.arraycopy(elgDecr, SessionKey.KEYSIZE_BYTES, preIV, 0, 32);
+        System.arraycopy(elgDecr, offset, preIV, 0, 32);
+        offset += 32;
 
         //_log.debug("Pre IV for decryptNewSession: " + DataHelper.toString(preIV, 32));
         //_log.debug("SessionKey for decryptNewSession: " + DataHelper.toString(key.getData(), 32));
@@ -168,6 +171,9 @@ public class ElGamalAESEngine {
         System.arraycopy(ivHash.getData(), 0, iv, 0, 16);
         _context.sha().cache().release(cache);
 
+        // feed the extra bytes into the PRNG
+        _context.random().harvester().feedEntropy("ElG/AES", elgDecr, offset, elgDecr.length - offset); 
+
         byte aesDecr[] = decryptAESBlock(data, 514, data.length-514, usedKey, iv, null, foundTags, foundKey);
 
         if (_log.shouldLog(Log.DEBUG))
@@ -403,6 +409,8 @@ public class ElGamalAESEngine {
             elgEncr = elg;
         }
         //_log.debug("ElGamal encrypted length: " + elgEncr.length + " elGamal source length: " + elgSrc.toByteArray().length);
+        
+        // should we also feed the encrypted elG block into the harvester?
 
         SHA256EntryCache.CacheEntry cache = _context.sha().cache().acquire(preIV.length);
         Hash ivHash = _context.sha().calculateHash(preIV, cache);
diff --git a/core/java/src/net/i2p/crypto/EntropyHarvester.java b/core/java/src/net/i2p/crypto/EntropyHarvester.java
new file mode 100644
index 0000000000000000000000000000000000000000..a635d6bf81e9dad13d0e95d749adece92e1077ae
--- /dev/null
+++ b/core/java/src/net/i2p/crypto/EntropyHarvester.java
@@ -0,0 +1,30 @@
+package net.i2p.crypto;
+
+/**
+ * Allow various components with some entropy to feed that entropy back
+ * into some PRNG.  The quality of the entropy provided varies, so anything
+ * harvesting should discriminate based on the offered "source" of the 
+ * entropy, silently discarding insufficient entropy sources.
+ *
+ */
+public interface EntropyHarvester {
+    /** 
+     * Feed the entropy pools with data[offset:offset+len] 
+     *
+     * @param source origin of the entropy, allowing the harvester to 
+     *               determine how much to value the data
+     * @param offset index into the data array to start
+     * @param len how many bytes to use
+     */
+    void feedEntropy(String source, byte data[], int offset, int len);
+    /** 
+     * Feed the entropy pools with the bits in the data
+     *
+     * @param source origin of the entropy, allowing the harvester to 
+     *               determine how much to value the data
+     * @param bitoffset bit index into the data array to start 
+     *                  (using java standard big-endian)
+     * @param bits how many bits to use
+     */
+    void feedEntropy(String source, long data, int bitoffset, int bits);
+}
diff --git a/core/java/src/net/i2p/util/RandomSource.java b/core/java/src/net/i2p/util/RandomSource.java
index f5508203f3c915802b910881dc787651f0a79c9f..cf320d599446bb280240c90855778775928945d2 100644
--- a/core/java/src/net/i2p/util/RandomSource.java
+++ b/core/java/src/net/i2p/util/RandomSource.java
@@ -12,6 +12,7 @@ package net.i2p.util;
 import java.security.SecureRandom;
 
 import net.i2p.I2PAppContext;
+import net.i2p.crypto.EntropyHarvester;
 
 /**
  * Singleton for whatever PRNG i2p uses.  
@@ -20,10 +21,14 @@ import net.i2p.I2PAppContext;
  */
 public class RandomSource extends SecureRandom {
     private Log _log;
+    private EntropyHarvester _entropyHarvester;
 
     public RandomSource(I2PAppContext context) {
         super();
         _log = context.logManager().getLog(RandomSource.class);
+        // when we replace to have hooks for fortuna (etc), replace with
+        // a factory (or just a factory method)
+        _entropyHarvester = new DummyEntropyHarvester();
     }
     public static RandomSource getInstance() {
         return I2PAppContext.getGlobalContext().random();
@@ -62,4 +67,12 @@ public class RandomSource extends SecureRandom {
             super.nextBytes(bytes);
         }
     }
+    
+    public EntropyHarvester harvester() { return _entropyHarvester; }
+ 
+    // noop
+    private static class DummyEntropyHarvester implements EntropyHarvester {
+        public void feedEntropy(String source, long data, int bitoffset, int bits) {}
+        public void feedEntropy(String source, byte[] data, int offset, int len) {}
+    }
 }
\ No newline at end of file