[11239] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: building a true RNG

daemon@ATHENA.MIT.EDU (David Wagner)
Mon Jul 29 14:36:02 2002

From: David Wagner <daw@cs.berkeley.edu>
To: jsd@monmouth.com (John S. Denker)
Date: Mon, 29 Jul 2002 10:45:39 -0700 (PDT)
Cc: daw@mozart.cs.berkeley.edu (David Wagner),
	cryptography@wasabisystems.com, barney@tp.databus.com (Barney Wolff)
In-Reply-To: <3D457D6D.E414C051@monmouth.com> from "John S. Denker" at Jul 29, 2002 01:37:49 PM

> 3) For a one-way hash function should not expect a _constructive_ 
> proof that it generates all possible codes;  such a construction
> would violate the one-way property.

Nitpick: the last statement does not seem quite right to me.  I'm thinking
of the notion of a one-way permutation.  For instance, the RSA function
f(x) = x^3 mod n is conjectured to be a one-way permutation, assuming n
is a RSA modulus with unknown factorization and the RSA assumption holds.
(I'm being a little fast and loose with the formal details, but I hope
this conveys the idea.)

That said, I'm not claiming that the RSA function would make a good
cryptographic hash function.  Cryptographic hash functions are expected
to be a lot more than just one-way and collision-free.

I don't know of any good cryptographic hash function that comes with
a proof that all outputs are possible.  However, it might not be too
hard to come up with plausible examples.  For example, if we apply the
Luby-Rackoff construction (i.e., 3 rounds of a Feistel cipher), with
ideal hash functions in each round, does this have the desired properties?
It might.

On the gripping hand, I don't think this is a real issue in practice.
SHA1 is probably good enough for all practical purposes that I can
think of.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post