Date: Sun, 11 Jun 2000 09:19:37 +0200 From: Mark Murray <mark@grondar.za> To: "Andrey A. Chernov" <ache@FreeBSD.ORG> Cc: current@FreeBSD.ORG Subject: Re: mktemp() patch Message-ID: <200006110719.JAA70888@grimreaper.grondar.za> In-Reply-To: <20000610193610.B99504@freebsd.org> ; from "Andrey A. Chernov" <ache@FreeBSD.ORG> "Sat, 10 Jun 2000 19:36:10 MST." References: <20000610193610.B99504@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> > Think about it. If you mix a random number with a non-random number, > > using xor, what you get is.... a random number. It's neither stronger > > nor weaker. > > No, you'll get weaker random number, it badly affects random distribution. > OR or AND will affect more. What you say is true only if second XOR part is > 0 or -1 or changed between them or simple constant. I.e. if not _all_ bits XORed > in the same way, it affects. Andrey, this is simply not true. A fundamental theorem of randomness is that random bits XORed onto your data is random. How do you think a one-time-pad works? I suggest you read Bruce Schneier's Cryptography book before continuing this debate. M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200006110719.JAA70888>