| Hi,
|
| I've been wondering about the proper application of statistics with
| regard to comparing PRNGs and encrypted text to truly random sources.
|
| As I understand it, when looking at output, one can take a
| hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits
| independent)
Travis H. wrote:
Hi,
I've been wondering about the proper application of statistics with
regard to comparing PRNGs and encrypted text to truly random sources.
As I understand it, when looking at output, one can take a
hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits
Speaking of bulk encryption cards... does the linux 2.6 kernel support
any? There is a reference to a crypto framework in the
configuration menus, but as is typical of linux, there are no man
pages or other documentation related to it, and I don't feel like
reading source code.
On May 19, 2006, at 6:51, Travis H. wrote:
As I understand it, when looking at output, one can take a
hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits
independent) and come up with a probability that the source may have
generated that output.
One can come up with the
Some alternative media groups have called for a national day of protests
against the telcos' latest sleazy activities, including their cooperation
in NSA's illegal surveillance of innocent citizens.
http://saveaccess.org/
Events are already scheduled in Boston, Chicago, San Francisco, and
NYC.
On Fri, May 19, 2006 at 06:51:55AM -0500, Travis H. wrote:
As I understand it, when looking at output, one can take a
hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits
independent) and come up with a probability that the source may have
generated that output. One cannot,
There's an article in today's NY Times (for subscribers, it's at
http://www.nytimes.com/2006/05/22/technology/22privacy.html?_r=1oref=slogin )
on whether Phil Zimmerman's Zfone -- an encrypted VoIP package -- will
invite government scrutiny. There doesn't seem to be any imminent threat
in the
At 10:19 AM -0400 5/22/06, Steven M. Bellovin wrote:
There's an article in today's NY Times (for subscribers, it's at
http://www.nytimes.com/2006/05/22/technology/22privacy.html?_r=1oref=slogin )
on whether Phil Zimmerman's Zfone -- an encrypted VoIP package -- will
invite government scrutiny.
Steven M. Bellovin writes:
-+--
| .. -- that leaves open the possibility of a
| protocol change that implemented some sort of Clipper-like functionality.
| A silent change like that would be *very* ominous.
|
I'm reminded of Adi Shamir's