-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> "Scott G. Miller" wrote:
> > No, not that SHA is leaking information, but that an adversary, knowing
> > the output of the hash (which is present in the data generated) and the
> > input to the hash function (which can be guessed) can calculate the next
> > state.
>
> The input can't be guessed. It comes from random (entropy) inputs
> suitably mixed. The only way they could gather information about the
> seed would be if SHA leaked information.
Thats the thing. A computer is by definition a deterministic
machine. There aren't any truely random sources. And certainly not in
the code we have now. I grab the system timer in a number of spots, as
well as a whole shitload of input at the startup. . .
But if you run out of entropy, and you're not getting new ones, the
quality degrades very quickly and guessing becomes easy.
Scott
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE4+//9pXyM95IyRhURAqMkAKCHmeCmJxXGw51EO6g8aZSsl+3CLACfUUAD
j/tu9/iExS0L5d75Uz2cW3k=
=p38j
-----END PGP SIGNATURE-----
_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev