-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> "Scott G. Miller" wrote:
> > No, not that SHA is leaking information, but that an adversary, knowing
> > the output of the hash (which is present in the data generated) and the
> > input to the hash function (which can be guessed) can calculate the next
> > state.
> 
> The input can't be guessed.  It comes from random (entropy) inputs
> suitably mixed.  The only way they could gather information about the
> seed would be if SHA leaked information.
Thats the thing.  A computer is by definition a deterministic
machine.  There aren't any truely random sources.  And certainly not in
the code we have now.  I grab the system timer in a number of spots, as
well as a whole shitload of input at the startup. . .
But if you  run out of entropy, and you're not getting new ones, the
quality degrades very quickly and guessing becomes easy.

        Scott

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE4+//9pXyM95IyRhURAqMkAKCHmeCmJxXGw51EO6g8aZSsl+3CLACfUUAD
j/tu9/iExS0L5d75Uz2cW3k=
=p38j
-----END PGP SIGNATURE-----


_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to