From: stewarts@ix.netcom.com
To: ph@netcom.com (Peter Hendrickson)
Message Hash: 2d834320d9e1a5db808bf04dab37a9b2f6d62353c1f953f821b992023402391d
Message ID: <1.5.4.32.19961119041700.0057ad64@popd.ix.netcom.com>
Reply To: N/A
UTC Datetime: 1996-11-19 04:17:11 UTC
Raw Date: Mon, 18 Nov 1996 20:17:11 -0800 (PST)
From: stewarts@ix.netcom.com
Date: Mon, 18 Nov 1996 20:17:11 -0800 (PST)
To: ph@netcom.com (Peter Hendrickson)
Subject: Re: FCPUNX:Playing Cards
Message-ID: <1.5.4.32.19961119041700.0057ad64@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP UNSIGNED TEXT-----
At 03:14 PM 11/14/96 -0800, ph@netcom.com (Peter Hendrickson) wrote:
>It would be nice if cryptography software would allow you to enter
>randomly selected playing cards from time to time to increase the
>entropy of keys. Careful people (Black Unicorn?) would enter the
>cards prior to sending each message.
If the keyboard-entropy program you're using hashes in the values
of the keys typed as well as the timing, this can let you improve the
actual entropy of the data you enter. Get yourself a deck of cards
or some 20-sided D&D dice or toss some yarrow stalks or open a book randomly,
and type in those values rather than the fjfjfjfjfj stuff you
might otherwise use. Won't hurt, and it'll let you be sure you've
got all the entropy you need*
Bill Stewart, lurking from fcpunx
[*Depending on how the universe has been treating you recently...]
-----PGP UNSIGNATURE BLOCK-----
32767WHATISSIXTIMESNINE23THEUMBERHULKHITS42GRATEFULDEAD10OFSWORDS
-----END PGP UNSIGNATURE BLOCK-----
# Thanks; Bill
# Bill Stewart, +1-415-442-2215 stewarts@ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk
Return to November 1996
Return to “stewarts@ix.netcom.com”
1996-11-19 (Mon, 18 Nov 1996 20:17:11 -0800 (PST)) - Re: FCPUNX:Playing Cards - stewarts@ix.netcom.com