1996-10-09 - BBS generator

Header Data

From: paul@fatmans.demon.co.uk
To: cypherpunks@toad.com
Message Hash: 1a8ca439137de45424dc33e48a44f6695445a59a45a933b515e1743540a308c4
Message ID: <844888870.2598.0@fatmans.demon.co.uk>
Reply To: N/A
UTC Datetime: 1996-10-09 21:21:37 UTC
Raw Date: Wed, 9 Oct 1996 14:21:37 -0700 (PDT)

Raw message

From: paul@fatmans.demon.co.uk
Date: Wed, 9 Oct 1996 14:21:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: BBS generator
Message-ID: <844888870.2598.0@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone here know the approximate ammount of output from a BBS 
PRNG needed to predict with some certainty the next bit or bits? - is 
the generator totally secure, ie. do you need to factor to predict or 
is there an attack using the output?


  Datacomms Technologies web authoring and data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: 5BBFAEB1
     "Don`t forget to mount a scratch monkey"





Thread