Re: Mersenne Twister - Why a PRNG isn't a OTP

New Message Reply About this list Date view Thread view Subject view Author view

Perry E. Metzger (perry@piermont.com)
Tue, 14 Jul 1998 13:08:42 -0400


"Tom Otvos" writes:
> (Sigh.) So much to learn. Thanks for taking the time to respond in such
> detail. Incidentally, the MT paper does offer that "by a simple linear
> transformation...one can easily guess the present state from a sufficiently
> large size of the output".
>
> But here is one more thought (or question really). If you combine a PRNG
> with a one-way hash, is the output still "random" and more secure?

Might I suggest that rather than using a non-cryptographic PRNG and
attempting to use hard-to-analyze kludges to make it better, why not
start with a cryptographic PRNG instead? We have several available,
and they work nicely. RC4 isn't too shabby for many purposes, and
neither is the use of an algorithm like CAST-128 in output feedback
mode.

> Or, should I just go back to being a passive observer on this list?

Nothing wrong with enthusiasm and participation, but I'd suggest
thoroughly reading two books as soon as you can:

0) Kahn's "The Codebreakers", the original unabridged version.
     Reason: So you'll have some sense of how nasty this stuff gets in
             the real world when lives are on the line.
1) Schneier's Applied Cryptography
     Reason: So you'll understand current cryptographic practice.

Perry


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:20:22 ADT