1994-04-29 - Re: Random #’s via CD-ROM?

Header Data

From: jpp@markv.com
To: cypherpunks@toad.com
Message Hash: 7ee4b8be1471dbb33f5e7f3361ef35cb389b6056ecf3015e77de4e1127c09905
Message ID: <9404281919.aa08006@hermix.markv.com>
Reply To: <199404290142.VAA04213@access.netaxs.com>
UTC Datetime: 1994-04-29 02:20:55 UTC
Raw Date: Thu, 28 Apr 94 19:20:55 PDT

Raw message

From: jpp@markv.com
Date: Thu, 28 Apr 94 19:20:55 PDT
To: cypherpunks@toad.com
Subject: Re: Random #'s via CD-ROM?
In-Reply-To: <199404290142.VAA04213@access.netaxs.com>
Message-ID: <9404281919.aa08006@hermix.markv.com>
MIME-Version: 1.0
Content-Type: text/plain

  This strikes me as another variant on the venerable 'book' cypher.    
To quote Kahn (is that even close?  The guy who wrote _The Code  
Breakers_.) 'What you gain in key size, you loose in key coherency.' 
In general book ciphers are not very strong.  (At least thats what I    
think the big boys said...) 
  But, speaking of random numbers.  In Crypto '92 (or '93?) there is    
this great protocol for two players (Andy and Beth say) to listen to a  
poorly heard (radio) source (a low power satalite, or perhaps Radio    
Free Bosnia) and extract a shared secret key -- even when an evil  
opponent (Eve say) is listening with much better equipment.  This is 
really a great result!  It is at least as exciting as DH key exchange  
(to me).  It's strength is based on probability and information theory    
and not on 'unproven' complexity theory assumtions (such as 'discrete   
logrithms are hard to compute').  But -- how do we make it work on the

		   O I am Jay Prime Positive jpp@markv.com
1250 bit fingerprint B06229 = B8 95 E0 AF 9A A2 CD A5  89 C9 F0 FE B4 3A 2C 3F
 524 bit fingerprint 2A915D = 8A 7C B9 F2 D5 46 4D ED  66 23 F1 71 DE FF 51 48
Public keys via `finger jpp@markv.com', or via email to pgp-public-keys@io.com
Your feedback is welcome directly or via my symbol JPP on hex@sea.east.sun.com

Resist the Clipper Chip, write "I oppose Clipper" to Clipper.petition@cpsr.org