Re: pipad, was Re: bounded storage model - why is R organized as 2-d array?

2006-03-21 Thread leichter_jerrold
| Anyone see a reason why the digits of Pi wouldn't form an excellent | public large (infinite, actually) string of random bits? | | There's even an efficient digit-extraction (a/k/a random access to | fractional bits) formula, conveniently base 16: | http://mathworld.wolfram.com/BBPFormula.html

Re: pipad, was Re: bounded storage model - why is R organized as 2-d array?

2006-03-21 Thread John Kelsey
From: [EMAIL PROTECTED] Sent: Mar 21, 2006 9:58 AM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED], cryptography@metzdowd.com Subject: Re: pipad, was Re: bounded storage model - why is R organized as 2-d array? ... | Anyone see a reason why the digits of Pi wouldn't form an excellent | public

pipad, was Re: bounded storage model - why is R organized as 2-d array?

2006-03-20 Thread Travis H.
Anyone see a reason why the digits of Pi wouldn't form an excellent public large (infinite, actually) string of random bits? There's even an efficient digit-extraction (a/k/a random access to fractional bits) formula, conveniently base 16: http://mathworld.wolfram.com/BBPFormula.html I dub this

Re: bounded storage model - why is R organized as 2-d array?

2006-03-10 Thread Bill Stewart
At 10:37 AM 3/9/2006, Chris Palmer wrote: Right, but even though a 1.5GHz machine is a bit old (heh...) for a workstation, my dinky little Linksys WRT54GC wireless AP still needs to AES-encrypt a theoretical maximum of 54Mbps when I turn on WPA. Unless you're using your Linksys for

Re: bounded storage model - why is R organized as 2-d array?

2006-03-09 Thread alex
- Original Message - From: Travis H. [EMAIL PROTECTED] To: cryptography@metzdowd.com Subject: bounded storage model - why is R organized as 2-d array? Date: Thu, 2 Mar 2006 23:06:41 -0600 Hey, In Maurer's paper, which is the last link here on the following page, he proposes

Re: bounded storage model - why is R organized as 2-d array?

2006-03-09 Thread Steven M. Bellovin
On Thu, 09 Mar 2006 02:10:58 -0500 [EMAIL PROTECTED] wrote: This is very useful for encrypting things like video streams without an expensive hardware cryptographic accelerator card. I think you vastly overestimate how much hardware one needs to do something like AES. I ran dd

bounded storage model - why is R organized as 2-d array?

2006-03-08 Thread Travis H.
Hey, In Maurer's paper, which is the last link here on the following page, he proposes to use a public random pad to encrypt the plaintext based on bits selected by a key. What I'm wondering is why he chose the strange construction for encryption; namely, that he uses an additive (mod 2) cipher