| Hi,
|
| I've been wondering about the proper application of statistics with
| regard to comparing PRNGs and encrypted text to truly random sources.
|
| As I understand it, when looking at output, one can take a
| hypothetical source model (e.g. "P(0) = 0.3, P(1) = 0.7, all bits
| independent")
Travis H. wrote:
> Hi,
>
> I've been wondering about the proper application of statistics with
> regard to comparing PRNGs and encrypted text to truly random sources.
>
> As I understand it, when looking at output, one can take a
> hypothetical source model (e.g. "P(0) = 0.3, P(1) = 0.7, all bit
Speaking of bulk encryption cards... does the linux 2.6 kernel support
any? There is a reference to a "crypto framework" in the
configuration menus, but as is typical of linux, there are no man
pages or other documentation related to it, and I don't feel like
reading source code. (/usr/src/linux*
On May 19, 2006, at 6:51, Travis H. wrote:
As I understand it, when looking at output, one can take a
hypothetical source model (e.g. "P(0) = 0.3, P(1) = 0.7, all bits
independent") and come up with a probability that the source may have
generated that output.
One can come up with the probabi
Some alternative media groups have called for a national day of protests
against the telcos' latest sleazy activities, including their cooperation
in NSA's illegal surveillance of innocent citizens.
http://saveaccess.org/
Events are already scheduled in Boston, Chicago, San Francisco, and
NYC.
On Fri, May 19, 2006 at 06:51:55AM -0500, Travis H. wrote:
> As I understand it, when looking at output, one can take a
> hypothetical source model (e.g. "P(0) = 0.3, P(1) = 0.7, all bits
> independent") and come up with a probability that the source may have
> generated that output. One cannot, h
There's an article in today's NY Times (for subscribers, it's at
http://www.nytimes.com/2006/05/22/technology/22privacy.html?_r=1&oref=slogin )
on whether Phil Zimmerman's Zfone -- an encrypted VoIP package -- will
invite government scrutiny. There doesn't seem to be any imminent threat
in the U.S
On Fri, 19 May 2006, John Ioannidis wrote:
> Speaking of bulk encryption cards... does the linux 2.6 kernel support
> any? There is a reference to a "crypto framework" in the
> configuration menus, but as is typical of linux, there are no man
> pages or other documentation related to it, and I don
At 10:19 AM -0400 5/22/06, Steven M. Bellovin wrote:
There's an article in today's NY Times (for subscribers, it's at
http://www.nytimes.com/2006/05/22/technology/22privacy.html?_r=1&oref=slogin )
on whether Phil Zimmerman's Zfone -- an encrypted VoIP package -- will
invite government scrutiny.
"Steven M. Bellovin" writes:
-+--
| .. -- that leaves open the possibility of a
| protocol change that implemented some sort of Clipper-like functionality.
| A silent change like that would be *very* ominous.
|
I'm reminded of Adi Shamir's
10 matches
Mail list logo