1996-03-03 - New PRNG method!

Header Data

From: Olcay Cirit <olcay@libtech.com>
To: cypherpunks@toad.com
Message Hash: 35bce19ee58b09b2379756b33501f18c9ba6234095f621b334c3d71c46d72cd9
Message ID: <199603021656.LAA13644@bb.hks.net>
Reply To: N/A
UTC Datetime: 1996-03-03 15:13:47 UTC
Raw Date: Sun, 3 Mar 1996 23:13:47 +0800

Raw message

From: Olcay Cirit <olcay@libtech.com>
Date: Sun, 3 Mar 1996 23:13:47 +0800
To: cypherpunks@toad.com
Subject: New PRNG method!
Message-ID: <199603021656.LAA13644@bb.hks.net>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

Hello, All!

I was just thinking about how to generate random numbers,
when I hit upon an interesting idea:

If the internet is so huge and complex, why not, say, use 
the least significant bits of ping times from random internet 
hosts as seeds for a PRNG? (Practical Random Number Gen.)

You could then break the resulting binary value into 128-bit
blocks and modulus/xor each with a stream of random numbers taken
from a keyboard timing.

After all this, you could wash it with a secure symmetric 
cryptosystem such as idea in CBC mode.

Any thoughts, comments?

	-olcay

- --
"For he who lives more lives than one, |) Olcay Cirit -- olcay@libtech.com
   more deaths than one must die"      (| http://www.libtech.com/olo2.html

- ---
[This message has been signed by an auto-signing service.  A valid signature
means only that it has been received at the address corresponding to the
signature and forwarded.]

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Gratis auto-signing service

iQBFAwUBMTh9pCoZzwIn1bdtAQGuDAGA1QM1KyGQ2i6n9LLF00HrVn7OvBftesA9
+Jsu4W3yZothdL1pFQLt2v5l9mjgTspW
=2x/g
-----END PGP SIGNATURE-----





Thread