On Feb 18, 2006, at 5:42 PM, Stephen A. Lawrence wrote:
Horace Heffner wrote:
UPDATE - FEBRUARY 16, 2006 An arbitrarily close approximation to
an hysteresis free circuit (a circuit producing bits with
information entropy approaching 1) can be obtained by XORing the
outputs from multiple independent circuits having hysteresis.
The XORing can be achieved using simple clocked digital logic.
Suppose a circuit is being used that is very fast, but exhibits a
hysteresis of about 1 percent. That is to say the probability of
a 1 is 0.495 percent, and the probability of a 0 is 0.505
percent. By XORing the output of the two independent circuits,
the probability of a 0 drops to 0.495^2 + 0.505^2 = .5005. By
XORing the output of four independent circuits, the probability
of a 0 drops to 0.4995^2 + 0.5005^2 = .5000005. By XORing the
output of eight independent circuits, the probability of a 0
drops to 0.4999995^2 + 0.5000005^2 = .5000000000005. The
hysteresis is removed to less than 1 part in 10^12.
That is really cool. Is it original? If so it's surely worth a
patent!
Well, if so, I'll gladly sell any rights to it for $1 to anyone who
wants to patent it. I seriously doubt the originality, though I did
just write this off the top of my head with calculator busy in hand -
as usual with most things I wrote to vortex.
This method has the advantage over the Von Neumann whitening
method (see: http://en.wikipedia.org/wiki/One_time_pad
Are high-tech one-time-pads of any use? It seems like you need to
securely send a key the same length as the message to use it. But
if you can do that you can securely send the message itself (it's
the same length) so what did you need to encrypt it for?
One time pads can be useful because they can be prepared in advance
of the need to send a message. Ships or airplanes, for example, can
carry one time pads on missions.
The original physical one-time-pads used a centrally generated key
(printed on the pad) which was carried with the spy to whatever
destination. The spy knew whether he'd been caught (obviously) and
knew whether he still had the pad with him (obviously) and so could
know whether the pad's integrity had been compromised. Thus, in
effect, the "channel" from headquarters to the field office was
known to be "secure". So, since a copy of the pad was kept back at
HQ, he could then send the encrypted message, _without_ the
accompanying key, in perfect security, the only hazard being that
he had to destroy the clear-text original _and_ his copy of the key
in some secure fashion (cigarette lighter and hotel ashtray, for
instance).
There are much better ways to use one time pads.
When you move into the electronic world, though, you're presumably
talking about generating the key on the spot, at the point where
the encryption takes place.
Not necessarily.
But that's useless! You only need to encrypt the message if the
channel isn't secure, but in that case you can't send the key!
Again, it seems like the _only_ way a one-time-pad can be useful is
in the unusual case where there is a secure _one_ _way_ channel,
and you need to transfer information the _other_ _way_. In that
unique case the key can be originated at one end and a copy of the
key sent securely, and the encrypted data can then be returned
insecurely.
One use for on-the-spot one time pads is to fill in voids in
communication channels. In that way signal analysis can not be
used. Sometimes just knowing the communication volume on a channel
is very useful. However, if vast quantities of filler one time pad
are shipped, it is then possible for prearranged algorithms to be
used to select and transform portions of that huge mass of seemingly
useless data to arrive at a useful pad. A one time pad can then be
used to exchange the small amount of transform information.
However, my interest in this primarily relates to the EGG project. I
have to wonder if a good whitening algorithm is used whether the
effect will still be observed. Beyond that, I have to wonder even if
a whitening algorithm suppresses the effect - so what? That's what
it is supposed to do! It is the underlying quantum mechanics that
are really in question, so suppressing that signal may just be
foolish. OTOH, if the random number generators are not random, there
is no surprise anomalies do occur. This is a tough problem.
I think the place where the idea has real and immediate usefulness is
in cases where true random number generators are already in use. One
such place might be video poker and other gambling machines, and also
Monte Carlo simulations. Bias in such machines could prove costly.
The advantage to the method lies in the fact that no hardware changes
are necessary if a hardware RNG is in place already. It is then
merely a matter of generating and XORing pads. The problem is a
slowing of the pad generation rate for that approach, but that is no
problem at all for gambling machines.
It may be of interest that processors are sold with two fast hardware
RNGs built into the processor (and thus they are "free"). See:
http://www.mini-box.com/s.nl/sc.8/category.99/it.A/id.432/.f
Horace Heffner