[13227] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Randomness

daemon@ATHENA.MIT.EDU (Paul Onions)
Fri May 9 11:11:59 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Paul Onions <paul_onions@siliconinfusion.com>
To: Ben Laurie <ben@algroup.co.uk>
Date: Fri, 9 May 2003 09:37:15 +0100
Cc: cryptography@metzdowd.com
In-Reply-To: <3EBA64BD.7070008@algroup.co.uk>

On Thursday 08 May 2003 3:07 pm, Ben Laurie wrote:
>
> It was my intention, and perhaps I should make it clearer, that the only
> difference between insecureprng() and the other PRNGs is the source of
> entropy. Hence, it does not leak state any more than the rest do.
> Clearly if the insecureprng() uses a cryptographically weak algorithm
> then it cannot share state.

Oh okay.  But a small doubt still remains - is a secure-PRNG still a 
secure-PRNG when multiple instantiations are run in parallel and (at least 
partially) sharing the same state information?

Correct me if I'm wrong, but I don't think this question has been addressed 
in the literature.

Regards,
Paul(o)

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post