Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 10 Jun 2000 19:51:03 -0700
From:      "Andrey A. Chernov" <ache@freebsd.org>
To:        Mark Murray <mark@grondar.za>
Cc:        "Jeroen C. van Gelderen" <jeroen@vangelderen.org>, Kris Kennaway <kris@FreeBSD.ORG>, current@FreeBSD.ORG
Subject:   Re: mktemp() patch
Message-ID:  <20000610195102.D99504@freebsd.org>
In-Reply-To: <200006100713.JAA04771@grimreaper.grondar.za>; from mark@grondar.za on Sat, Jun 10, 2000 at 09:13:30AM %2B0200
References:  <20000609155342.B33329@freebsd.org> <200006100713.JAA04771@grimreaper.grondar.za>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Jun 10, 2000 at 09:13:30AM +0200, Mark Murray wrote:

Well, I tend to agree that it is not weakens random, but I not see any 
improvement too.

> That is a pretty fundamental theorem of Cryptography. My suggestion
> _strengthens_ the random number. All you lose is one bit if it

If it not weakers I can't see why it strenghthens.
I.e. you can constantly strenghthens generator with passing it through XOR -1?
If not, why any other value is better than -1?

-- 
Andrey A. Chernov
<ache@nagual.pp.ru>
http://ache.pp.ru/


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000610195102.D99504>