"Scott G. Miller" wrote: > If you run out of entropy, then there is (at least in theory) a > possibility that if an attacker knows the previous output (say from a > random number recently generated) than he can might find correlation > effects that make further states more guessable. For the current use of > EntropyPool, it almost certainly doesn't matter. But if we start > generating session keys for block ciphers in the future, it probably > *isn't* sufficient.
The comments in the Linux kernel claim that SHA does not leak information. Are you saying that it does, or that it could? The two are not the same thing at all. A block cypher could leak information (i.e. be flawed), in theory. _______________________________________________ Freenet-dev mailing list Freenet-dev at lists.sourceforge.net http://lists.sourceforge.net/mailman/listinfo/freenet-dev