On Jul 18, 2014, at 11:19 AM, Leif Pedersen <[email protected]> wrote:

> The extra readers interrupt the position of the stream, so that it is harder 
> to predict the next value. This only works if one instance of the PRNG is 
> shared by multiple readers, rather than each reader operating in isolation.

If there was a non-zero chance that an attacker could predict the next value, 
your PRNG was already broken. Two of the fundamental properties of a working 
PRNG is that if an attacker sees any number of outputs from the PRNG, the 
attacker cannot compute any previous values and the attacker cannot predict any 
future values. 

--Paul Hoffman
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "[email protected]"

Reply via email to