Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 11 Jun 2000 09:19:37 +0200
From:      Mark Murray <mark@grondar.za>
To:        "Andrey A. Chernov" <ache@FreeBSD.ORG>
Cc:        current@FreeBSD.ORG
Subject:   Re: mktemp() patch 
Message-ID:  <200006110719.JAA70888@grimreaper.grondar.za>
In-Reply-To: <20000610193610.B99504@freebsd.org> ; from "Andrey A. Chernov" <ache@FreeBSD.ORG>  "Sat, 10 Jun 2000 19:36:10 MST."
References:  <20000610193610.B99504@freebsd.org> 

next in thread | previous in thread | raw e-mail | index | archive | help
> >     Think about it.  If you mix a random number with a non-random number,
> >     using xor, what you get is.... a random number.  It's neither stronger
> >     nor weaker.
> 
> No, you'll get weaker random number, it badly affects random distribution. 
> OR or AND will affect more. What you say is true only if second XOR part is 
> 0 or -1 or changed between them or simple constant. I.e. if not _all_ bits XORed 
> in the same way, it affects.

Andrey, this is simply not true.

A fundamental theorem of randomness is that random bits XORed onto your
data is random. How do you think a one-time-pad works?

I suggest you read Bruce Schneier's Cryptography book before continuing
this debate.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200006110719.JAA70888>