From: paul@fatmans.demon.co.uk
To: cypherpunks@toad.com
Message Hash: 1a8ca439137de45424dc33e48a44f6695445a59a45a933b515e1743540a308c4
Message ID: <844888870.2598.0@fatmans.demon.co.uk>
Reply To: N/A
UTC Datetime: 1996-10-09 21:21:37 UTC
Raw Date: Wed, 9 Oct 1996 14:21:37 -0700 (PDT)
From: paul@fatmans.demon.co.uk
Date: Wed, 9 Oct 1996 14:21:37 -0700 (PDT)
To: cypherpunks@toad.com
Subject: BBS generator
Message-ID: <844888870.2598.0@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
Does anyone here know the approximate ammount of output from a BBS
PRNG needed to predict with some certainty the next bit or bits? - is
the generator totally secure, ie. do you need to factor to predict or
is there an attack using the output?
Datacomms Technologies web authoring and data security
Paul Bradley, Paul@fatmans.demon.co.uk
Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: 5BBFAEB1
"Don`t forget to mount a scratch monkey"
Return to October 1996
Return to ““Perry E. Metzger” <perry@piermont.com>”