"Scott G. Miller" wrote: > No, not that SHA is leaking information, but that an adversary, knowing > the output of the hash (which is present in the data generated) and the > input to the hash function (which can be guessed) can calculate the next > state.
The input can't be guessed. It comes from random (entropy) inputs suitably mixed. The only way they could gather information about the seed would be if SHA leaked information. _______________________________________________ Freenet-dev mailing list Freenet-dev at lists.sourceforge.net http://lists.sourceforge.net/mailman/listinfo/freenet-dev