Internet Privacy Guaranteed ad (POTP Jr.)
Bill Stewart
stewarts at ix.netcom.com
Sat Feb 24 00:54:22 PST 1996
At 11:08 AM 2/22/96 -0500, SINCLAIR DOUGLAS N <sinclai at ecf.toronto.edu> wrote:
>What they have gained is the knowledge that their random number source
>isn't broken. If your RNG started spewing 0 bits by the thousand would
>you say "This stream is just as likely as any other stream that I can
>imagine so there is no problem", or "My RNG is broken". Of course,
>in nice mathematical abstractions your RNG never breaks, but we live in
>a nasty world of thermal failiures and cold solder joints.
They _haven't_ gained that knowledge, only the knowledge that it isn't
_totally_ broken and spewing zeros. For example, the output of
while(1) printf("%8c", des(i++, key)); // Pretend syntax is correct
would probably pass the randomness tests just fine, in spite of being entirely
predictable and having only 56 bits of key plus log(i) bits of state,
and is vulnerable to most cryptanalysis attacks on DES systems as well.
But it's not a One Time Pad, it's just counter-mode DES.
#--
# Thanks; Bill
# Bill Stewart, stewarts at ix.netcom.com / billstewart at attmail.com +1-415-442-2215
# http://www.idiom.com/~wcs Pager +1-408-787-1281
More information about the cypherpunks-legacy
mailing list