1996-03-02 - Truelly Random Numbers

Header Data

From: “A. Padgett Peterson P.E. Information Security” <PADGETT@hobbes.orl.mmc.com>
To: cypherpunks@toad.com
Message Hash: 36cac9d4cf49440c90acff1dc914b67b1f965d818be4385806fefd3c1305c6fb
Message ID: <960302142608.202017b7@hobbes.orl.mmc.com>
Reply To: N/A
UTC Datetime: 1996-03-02 19:49:51 UTC
Raw Date: Sun, 3 Mar 1996 03:49:51 +0800

Raw message

From: "A. Padgett Peterson P.E. Information Security" <PADGETT@hobbes.orl.mmc.com>
Date: Sun, 3 Mar 1996 03:49:51 +0800
To: cypherpunks@toad.com
Subject: Truelly Random Numbers
Message-ID: <960302142608.202017b7@hobbes.orl.mmc.com>
MIME-Version: 1.0
Content-Type: text/plain


>The number of randomly selected 768 bit primes that you would need for a
>reasonable chance of a birthday collision is 1.708E104

True however the current mechanism of generating PGP keys which consists 
primarily of pseudo-randomly pounding on a keyboard is hardly "truely random.

Have no idea of the true number but expect it to be significantly less than
that quoted above, even for a 1024 bit key like mine.
							Warmly,
								Padgett






Thread