Re: statistical inferences and PRNG characterization

2006-05-22 Thread leichter_jerrold
| Hi, | | I've been wondering about the proper application of statistics with | regard to comparing PRNGs and encrypted text to truly random sources. | | As I understand it, when looking at output, one can take a | hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits | independent)

Re: statistical inferences and PRNG characterization

2006-05-22 Thread Bill Tompkins
Travis H. wrote: Hi, I've been wondering about the proper application of statistics with regard to comparing PRNGs and encrypted text to truly random sources. As I understand it, when looking at output, one can take a hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits

Re: Crypto hardware with secure key storage

2006-05-22 Thread John Ioannidis
Speaking of bulk encryption cards... does the linux 2.6 kernel support any? There is a reference to a crypto framework in the configuration menus, but as is typical of linux, there are no man pages or other documentation related to it, and I don't feel like reading source code.

Re: statistical inferences and PRNG characterization

2006-05-22 Thread Matt Crawford
On May 19, 2006, at 6:51, Travis H. wrote: As I understand it, when looking at output, one can take a hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits independent) and come up with a probability that the source may have generated that output. One can come up with the

May 24: National Day of Outrage at NSA/Telco surveillance

2006-05-22 Thread John Gilmore
Some alternative media groups have called for a national day of protests against the telcos' latest sleazy activities, including their cooperation in NSA's illegal surveillance of innocent citizens. http://saveaccess.org/ Events are already scheduled in Boston, Chicago, San Francisco, and NYC.

Re: statistical inferences and PRNG characterization

2006-05-22 Thread David Malone
On Fri, May 19, 2006 at 06:51:55AM -0500, Travis H. wrote: As I understand it, when looking at output, one can take a hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits independent) and come up with a probability that the source may have generated that output. One cannot,

Phil Zimmerman and voice encryption; a Skype problem?

2006-05-22 Thread Steven M. Bellovin
There's an article in today's NY Times (for subscribers, it's at http://www.nytimes.com/2006/05/22/technology/22privacy.html?_r=1oref=slogin ) on whether Phil Zimmerman's Zfone -- an encrypted VoIP package -- will invite government scrutiny. There doesn't seem to be any imminent threat in the

Re: Phil Zimmerman and voice encryption; a Skype problem?

2006-05-22 Thread Paul Hoffman
At 10:19 AM -0400 5/22/06, Steven M. Bellovin wrote: There's an article in today's NY Times (for subscribers, it's at http://www.nytimes.com/2006/05/22/technology/22privacy.html?_r=1oref=slogin ) on whether Phil Zimmerman's Zfone -- an encrypted VoIP package -- will invite government scrutiny.

Re: Phil Zimmerman and voice encryption; a Skype problem?

2006-05-22 Thread dan
Steven M. Bellovin writes: -+-- | .. -- that leaves open the possibility of a | protocol change that implemented some sort of Clipper-like functionality. | A silent change like that would be *very* ominous. | I'm reminded of Adi Shamir's