-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> for crypto.  
> 
> Why does Yarrow require a block cyper, as opposed to a digest, anyway? 
> The /dev/random code in the Linux kernel uses SHA-1, not a block cypher.
Its in the paper... Yarrow uses both a hash function (SHA1) and a block
cipher (3DES in the paper).  Its used in the output generation phase.  

- From the paper:

The Generation Mechanism provides the PRNG output.  The output must have
the property that if an attacker does not know the PRNG's key, he cannot
distinguish the PRNG's output from a truly random sequence of bits.

The generation mechanism must have the following properties:

* Resistant to cryptanalytic attack,

* efficient,

* resistant to backtracking after a key comprimise,

*** capable of generating a very long sequence of outputs securely without
reseeding


...
section 5.1

We have an n-bit counter value C.  To generate the next n-bit output
block, we increment C and encrypt it with our block cipher, using the key
K.  To generate the next output block we thus do the following:

        C <- (C + 1) mod 2^n
        R <- Ek(C)

...


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE4+9PNpXyM95IyRhURAv4yAKCxAERJMOaxpSGmtSkjQTLcwDvD1wCguqjD
FijOTc6tzm0T5RRAKd09EBk=
=hsa6
-----END PGP SIGNATURE-----


_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to