"Scott G. Miller" wrote:
> If you run out of entropy, then there is (at least in theory) a
> possibility that if an attacker knows the previous output (say from a
> random number recently generated) than he can might find correlation
> effects that make further states more guessable.  For the current use of
> EntropyPool, it almost certainly doesn't matter.  But if we start
> generating session keys for block ciphers in the future, it probably
> *isn't* sufficient.

The comments in the Linux kernel claim that SHA does not leak
information.  Are you saying that it does, or that it could?  The two
are not the same thing at all.  A block cypher could leak information
(i.e. be flawed), in theory.

_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to