From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: David Honig <honig@m7.sprynet.com>
Message Hash: 841366c5a4400791799bd78f6b3fa95e127c3027d98e559a54dd140008a6d467
Message ID: <35BD8E9A.799466A6@stud.uni-muenchen.de>
Reply To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
UTC Datetime: 1998-07-28 08:41:06 UTC
Raw Date: Tue, 28 Jul 1998 01:41:06 -0700 (PDT)
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 28 Jul 1998 01:41:06 -0700 (PDT)
To: David Honig <honig@m7.sprynet.com>
Subject: Re: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <35BD8E9A.799466A6@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain
David Honig wrote:
> The output of a good block cipher in feedback mode will pass Diehard tests,
> though it is not crypto-secure.
I often see the phrase 'pass Diehard test' though I don't see from
the documents of Diehard how to evaluate the volumenous printout
of Diehard to say exactly whether the test is passed or not. Furthermore
the component asc2bin.exe of Diehard is buggy.
M. K. Shen
Return to July 1998
Return to “Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>”