[11273] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: building a true RNG

daemon@ATHENA.MIT.EDU (David Wagner)
Thu Aug 1 21:49:30 2002

From: David Wagner <daw@cs.berkeley.edu>
To: paul@ciphergoth.org (Paul Crowley)
Date: Thu, 1 Aug 2002 17:28:43 -0700 (PDT)
Cc: daw@cs.berkeley.edu (David Wagner),
	jsd@monmouth.com (John S. Denker),
	daw@mozart.CS.Berkeley.EDU (David Wagner),
	cryptography@wasabisystems.com, barney@tp.databus.com (Barney Wolff)
In-Reply-To: <87heiejey6.fsf@saltationism.subnet.hedonism.cluefactory.org.uk> from "Paul Crowley" at Aug 02, 2002 01:13:05 AM

> David Wagner <daw@cs.berkeley.edu> writes:
> > I don't know of any good cryptographic hash function that comes with
> > a proof that all outputs are possible.  However, it might not be too
> > hard to come up with plausible examples.  For example, if we apply the
> > Luby-Rackoff construction (i.e., 3 rounds of a Feistel cipher), with
> > ideal hash functions in each round, does this have the desired properties?
> > It might.
> 
> This seems to define a block cipher with no key, which is collision
> free but not one-way.  Am I misunderstanding what you're proposing?

You understood it perfectly.  Good point.
I didn't notice that problem.  Harrumph.

Thanks for catching my oversight!

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post