1995-01-12 - Re: Cryptanalysis

Header Data

From: daleh@ix.netcom.com (Dale Harrison (AEGIS))
To: cypherpunks@toad.com
Message Hash: 23bb7c2b447d16e5a11e71195101f2fe07a30d5ca2edf14b45c71ed13ee9ccf2
Message ID: <199501121537.HAA01536@ix2.ix.netcom.com>
Reply To: N/A
UTC Datetime: 1995-01-12 15:38:43 UTC
Raw Date: Thu, 12 Jan 95 07:38:43 PST

Raw message

From: daleh@ix.netcom.com (Dale Harrison (AEGIS))
Date: Thu, 12 Jan 95 07:38:43 PST
To: cypherpunks@toad.com
Subject: Re: Cryptanalysis
Message-ID: <199501121537.HAA01536@ix2.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


You wrote: 

>If the encryption method is any good, the output will be pseudo-random
>with no digit being more frequent than any other. This certainly applies
>to IDEA and DES. With RSA, you usually have a random (IDEA) session key
>encrypted using the senders private key. This will also be an effectively
>'random' number.

Just a technical note, but a normal distribution of digits (i.e. 'no digit 
more frequent than any other') is no inidication of either randomness or 
'good' encryption.  A better test is to look for a normal distribution at 
all scale levels.  For example, the following text block: "UUU" (in ASCII) 
has a normal distribution at the bit level "0101 0101 0101 0101 0101 0101",
but not at the byte level.

Dale H.






Thread