[718] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Random numbers from the '60's...

daemon@ATHENA.MIT.EDU (Joshua E. Hill)
Tue May 6 19:49:49 1997

From: "Joshua E. Hill" <jehill@w6bhz.calpoly.edu>
To: colin@nyx.net (Colin Plumb)
Date: Tue, 6 May 1997 16:32:28 -0700 (PDT)
Cc: cryptography@c2.net
In-Reply-To: <9705060507.AA16619@nyx.net> from Colin Plumb at "May 5, 97 11:07:53 pm"

Colin Plumb said:
> What you need is collision freedom.  If there are 2^160 possible inputs
> (even if they're thousands of bits long), each of which produces a
> distinct 160-bit output, then clearly no entropy has been lost.

hmmm... As I recall from Crypto '96, several people assumed that 
cryptographic hashes acted as "Random Oracles" (things that were
able to extract entropy from less-then-truly-random sources).   Most 
of them quickly followed this by saying that this had only weak 
foundation in theory, but that it simplified things greatly.  

I follow your explanation, and I think that this would apply to an 
_ideal_ cryptographic hash.  Unfortunately, I don't know that we have 
any of those right now...

				Josh

-----------------------------Joshua E. Hill-----------------------------
|           You can't fight the law of conservation of energy          |
|                  but you sure can bargain with it.                   |
-------jehill@<gauss.elee|galaxy.csc|w6bhz|tuba.aix>.calpoly.edu--------

home help back first fref pref prev next nref lref last post