### Re: statistical inferences and PRNG characterization

| Hi, | | I've been wondering about the proper application of statistics with | regard to comparing PRNGs and encrypted text to truly random sources. | | As I understand it, when looking at output, one can take a | hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits | independent)

### Re: statistical inferences and PRNG characterization

Travis H. wrote: Hi, I've been wondering about the proper application of statistics with regard to comparing PRNGs and encrypted text to truly random sources. As I understand it, when looking at output, one can take a hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits

### Re: Crypto hardware with secure key storage

Speaking of bulk encryption cards... does the linux 2.6 kernel support any? There is a reference to a crypto framework in the configuration menus, but as is typical of linux, there are no man pages or other documentation related to it, and I don't feel like reading source code.

### Re: statistical inferences and PRNG characterization

On May 19, 2006, at 6:51, Travis H. wrote: As I understand it, when looking at output, one can take a hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits independent) and come up with a probability that the source may have generated that output. One can come up with the

### May 24: National Day of Outrage at NSA/Telco surveillance

Some alternative media groups have called for a national day of protests against the telcos' latest sleazy activities, including their cooperation in NSA's illegal surveillance of innocent citizens. http://saveaccess.org/ Events are already scheduled in Boston, Chicago, San Francisco, and NYC.

### Re: statistical inferences and PRNG characterization

On Fri, May 19, 2006 at 06:51:55AM -0500, Travis H. wrote: As I understand it, when looking at output, one can take a hypothetical source model (e.g. P(0) = 0.3, P(1) = 0.7, all bits independent) and come up with a probability that the source may have generated that output. One cannot,

### Phil Zimmerman and voice encryption; a Skype problem?

There's an article in today's NY Times (for subscribers, it's at http://www.nytimes.com/2006/05/22/technology/22privacy.html?_r=1oref=slogin ) on whether Phil Zimmerman's Zfone -- an encrypted VoIP package -- will invite government scrutiny. There doesn't seem to be any imminent threat in the

### Re: Phil Zimmerman and voice encryption; a Skype problem?

At 10:19 AM -0400 5/22/06, Steven M. Bellovin wrote: There's an article in today's NY Times (for subscribers, it's at http://www.nytimes.com/2006/05/22/technology/22privacy.html?_r=1oref=slogin ) on whether Phil Zimmerman's Zfone -- an encrypted VoIP package -- will invite government scrutiny.

### Re: Phil Zimmerman and voice encryption; a Skype problem?

Steven M. Bellovin writes: -+-- | .. -- that leaves open the possibility of a | protocol change that implemented some sort of Clipper-like functionality. | A silent change like that would be *very* ominous. | I'm reminded of Adi Shamir's