-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> for crypto.
>
> Why does Yarrow require a block cyper, as opposed to a digest, anyway?
> The /dev/random code in the Linux kernel uses SHA-1, not a block cypher.
Its in the paper... Yarrow uses both a hash function (SHA1) and a block
cipher (3DES in the paper). Its used in the output generation phase.
- From the paper:
The Generation Mechanism provides the PRNG output. The output must have
the property that if an attacker does not know the PRNG's key, he cannot
distinguish the PRNG's output from a truly random sequence of bits.
The generation mechanism must have the following properties:
* Resistant to cryptanalytic attack,
* efficient,
* resistant to backtracking after a key comprimise,
*** capable of generating a very long sequence of outputs securely without
reseeding
...
section 5.1
We have an n-bit counter value C. To generate the next n-bit output
block, we increment C and encrypt it with our block cipher, using the key
K. To generate the next output block we thus do the following:
C <- (C + 1) mod 2^n
R <- Ek(C)
...
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE4+9PNpXyM95IyRhURAv4yAKCxAERJMOaxpSGmtSkjQTLcwDvD1wCguqjD
FijOTc6tzm0T5RRAKd09EBk=
=hsa6
-----END PGP SIGNATURE-----
_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev