-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
> "Scott G. Miller" wrote: > > No, not that SHA is leaking information, but that an adversary, knowing > > the output of the hash (which is present in the data generated) and the > > input to the hash function (which can be guessed) can calculate the next > > state. > > The input can't be guessed. It comes from random (entropy) inputs > suitably mixed. The only way they could gather information about the > seed would be if SHA leaked information. Thats the thing. A computer is by definition a deterministic machine. There aren't any truely random sources. And certainly not in the code we have now. I grab the system timer in a number of spots, as well as a whole shitload of input at the startup. . . But if you run out of entropy, and you're not getting new ones, the quality degrades very quickly and guessing becomes easy. Scott -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.1 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE4+//9pXyM95IyRhURAqMkAKCHmeCmJxXGw51EO6g8aZSsl+3CLACfUUAD j/tu9/iExS0L5d75Uz2cW3k= =p38j -----END PGP SIGNATURE----- _______________________________________________ Freenet-dev mailing list Freenet-dev at lists.sourceforge.net http://lists.sourceforge.net/mailman/listinfo/freenet-dev