Date: Sun, 11 Jun 2000 09:24:37 +0200 From: Mark Murray <mark@grondar.za> To: "Andrey A. Chernov" <ache@FreeBSD.ORG> Cc: Mark Murray <mark@grondar.za>, "Jeroen C. van Gelderen" <jeroen@vangelderen.org>, Kris Kennaway <kris@FreeBSD.ORG>, current@FreeBSD.ORG Subject: Re: mktemp() patch Message-ID: <200006110724.JAA70920@grimreaper.grondar.za> In-Reply-To: <20000610195102.D99504@freebsd.org> ; from "Andrey A. Chernov" <ache@FreeBSD.ORG> "Sat, 10 Jun 2000 19:51:03 MST." References: <20000610195102.D99504@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> If it not weakers I can't see why it strenghthens. > I.e. you can constantly strenghthens generator with passing it through XOR -1 ? > If not, why any other value is better than -1? Huh? -1 is a constant, not random. Pass your data through _random_ bits, XORing it with them, and you have unbreakable crypto (one-time-pad) if you make a record of the random bits (the key). M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200006110724.JAA70920>