[11234] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: building a true RNG

daemon@ATHENA.MIT.EDU (David Wagner)
Mon Jul 29 11:58:29 2002

X-Envelope-To: cryptography@wasabisystems.com
To: cryptography@wasabisystems.com
From: daw@mozart.cs.berkeley.edu (David Wagner)
Date: 29 Jul 2002 15:39:32 GMT
X-Complaints-To: news@abraham.cs.berkeley.edu

Barney Wolff  wrote:
>This leads me to ask what may be a laughably naive question:
>Do we even know that the popular hash functions can actually generate
>all 2^N values of their outputs?

It seems very unlikely that they can generate all 2^N outputs
(under current knowledge).  However, they satisfy the next-best
thing: their output appears to be indistinguishable from uniform to
computationally-bounded observers, hence it's "as good as" if they
could generate all 2^N outputs for most purposes.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post