[11268] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: building a true RNG

daemon@ATHENA.MIT.EDU (John S. Denker)
Thu Aug 1 18:48:53 2002

Date: Thu, 01 Aug 2002 18:15:35 -0400
From: "John S. Denker" <jsd@monmouth.com>
To: David Wagner <daw@cs.berkeley.edu>
Cc: amir@herzberg.name, cryptography@wasabisystems.com,
	David Honig <dahonig@cox.net>

1) There were some very interesting questions such as
  -- whether one can construct a hash function that
     generates all possible codes.
  -- ditto, generating them as uniformly as possible.
  -- Whether off-the-shelf hash functions such as SHA-1 
     have such properties.

The answers are respectively yes, yes, and very probably.

I wrote up a discussion of this, with examples, at
  http://www.monmouth.com/~jsd/turbid/paper/turbid.htm#sec-uniform-hash

2) David W. suggested (off-list) that I clarify the relationship
of entropy-based information-theoretic arguments to computational-
feasibility arguments.  I took some steps in this direction; see
  http://www.monmouth.com/~jsd/turbid/paper/turbid.htm#sec-objectives

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post