"Scott G. Miller" wrote:
> No, not that SHA is leaking information, but that an adversary, knowing
> the output of the hash (which is present in the data generated) and the
> input to the hash function (which can be guessed) can calculate the next
> state.

The input can't be guessed.  It comes from random (entropy) inputs
suitably mixed.  The only way they could gather information about the
seed would be if SHA leaked information.

_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to