[13233] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Randomness

daemon@ATHENA.MIT.EDU (David Wagner)
Fri May 9 21:56:43 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
X-Envelope-To: cryptography@metzdowd.com
To: cryptography@metzdowd.com
From: daw@mozart.cs.berkeley.edu (David Wagner)
Date: 9 May 2003 15:47:01 GMT
X-Complaints-To: news@abraham.cs.berkeley.edu

Paul Onions  wrote:
>Now assume I have two PRBGs of the same design.  One is seeded with X, the 
>other with Y.  Assume that X, when considered on its own, has entropy H(X) = 
>n, but that Y is related to X such that H(Y|X) < n.  Now, if an adversary has 
>access to the output streams of these two generators, is it able to 
>distinguish them from the random case?

Absolutely.  Suppose Y = X, for instance.  More generally, if
H(Y|X) = k, then there could well be an attack of complexity 2^k or so.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post