From: “Perry E. Metzger” <perry@piermont.com>
To: paul@fatmans.demon.co.uk
Message Hash: df4b35284152cf496f8473eec204ed147d3a48ea7845edc930427a0fcc93d154
Message ID: <199610092220.SAA09079@jekyll.piermont.com>
Reply To: <844888870.2598.0@fatmans.demon.co.uk>
UTC Datetime: 1996-10-09 22:23:04 UTC
Raw Date: Wed, 9 Oct 1996 15:23:04 -0700 (PDT)
From: "Perry E. Metzger" <perry@piermont.com>
Date: Wed, 9 Oct 1996 15:23:04 -0700 (PDT)
To: paul@fatmans.demon.co.uk
Subject: Re: BBS generator
In-Reply-To: <844888870.2598.0@fatmans.demon.co.uk>
Message-ID: <199610092220.SAA09079@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain
paul@fatmans.demon.co.uk writes:
> Does anyone here know the approximate ammount of output from a BBS
> PRNG needed to predict with some certainty the next bit or bits? - is
> the generator totally secure, ie. do you need to factor to predict or
> is there an attack using the output?
The whole point of a BBS generator is that you have to factor in order
to predict -- I'm sure that Schneier has a discussion on this.
Perry
Return to October 1996
Return to ““Perry E. Metzger” <perry@piermont.com>”