[11272] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: building a true RNG

daemon@ATHENA.MIT.EDU (Paul Crowley)
Thu Aug 1 21:47:42 2002

To: David Wagner <daw@cs.berkeley.edu>
Cc: jsd@monmouth.com (John S. Denker),
	daw@mozart.cs.berkeley.edu (David Wagner),
	cryptography@wasabisystems.com, barney@tp.databus.com (Barney Wolff)
From: Paul Crowley <paul@ciphergoth.org>
Date: 02 Aug 2002 01:13:05 +0100
In-Reply-To: David Wagner's message of "Mon, 29 Jul 2002 10:45:39 -0700 (PDT)"

David Wagner <daw@cs.berkeley.edu> writes:
> I don't know of any good cryptographic hash function that comes with
> a proof that all outputs are possible.  However, it might not be too
> hard to come up with plausible examples.  For example, if we apply the
> Luby-Rackoff construction (i.e., 3 rounds of a Feistel cipher), with
> ideal hash functions in each round, does this have the desired properties?
> It might.

This seems to define a block cipher with no key, which is collision
free but not one-way.  Am I misunderstanding what you're proposing?
-- 
  __  Paul Crowley
\/ o\ sig@paul.ciphergoth.org
/\__/ http://www.ciphergoth.org/

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post