Re: Random Data from Geiger Counter

New Message Reply About this list Date view Thread view Subject view Author view

William H. Geiger III (whgiii@invweb.net)
Tue, 07 Jul 1998 08:42:27 -0500


-----BEGIN PGP SIGNED MESSAGE-----

In <00c501bda996$76d808e0$83004bca@em.who.net>, on 07/07/98
   at 07:00 PM, "Enzo Michelangeli" <em@who.net> said:

>-----Original Message-----
>From: Ben Laurie <ben@algroup.co.uk>
>To: Antonomasia <ant@notatla.demon.co.uk>
>Cc: CodherPlunks@toad.com <CodherPlunks@toad.com>
>Date: Tuesday, July 07, 1998 6:24 PM
>Subject: Re: Random Data from Geiger Counter

>[...]
>>I was suggesting using the length of the intervals to generate more
>>bits, rather than the count in a specified time.

>In fact, I can see no reason why the number of bits cannot be made as
>large as allowed by the resolution of the time counter: after all, the
>time of decay is not quantized. For example, if your digital counter is
>clocked at 100 MHz and gated by the decay events, about one decay per
>second yields counts about 26 bit long. Discard, say, the most
>significant 10 bits, and you'll get something very close to 16 bits of
>entropy per decay event. The distribution should be extremely close to
>uniform, because in a Poisson statistics the chances of getting periods
>2^10 times smaller than the mean value (which would skew the
>distribution) are negligible. To make it safer, discard them after
>performing a hash.

>My point is that the constraints here seem to be only practical
>(frequencies too high for the time counter to accept, or periods too long
>for a comfortable measurement), not theoretical.

I would have to see the math and some test data before I would feel
comfortable with this. There seems to be a big difference between using
the time between to hit to generate X bits and taking the 2 deltas between
3 hits and then generating one bit of data from that.

- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Walk through doors, don't crawl through Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNaImyI9Co1n+aLhhAQG0BgP/f2W0sZsoU0yQL9G51tIU1/Itg3sdU2Yu
EgPIKe1s47qnVyc3SbffZUorlZZDWTM3jITCTsvaknrKaaeyMdQhc5aNFE5fwOBC
8m9aGp4h6YBJkjSUshHjfdUZ4pGutaV3LQh1OTKcpuUlTssH/xsq8+ZgJrpnWPvv
YaE5q7Sa4Ao=
=Qh5P
-----END PGP SIGNATURE-----


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:20:09 ADT