Re: Optimal solution

2002-10-08 Thread gfgs pedo
Best means best for some specific objective. Optimal means the same thing as best. Depends on what you want to do. There are countless examples of problems for which different algorithms scale differently by problem size, e.g. for N=10, Algorithm A is the fastest solution, but for

Optimal solution

2002-10-07 Thread gfgs pedo
hi, In the case of algorithms is the best algorithm always the best solution to the problem,be the algorithm with a constant run time or randomised algorithm. i.e is the best solution always the optimal solution for a problem. how can we argue -either way? Thank U. Regards Data.

Doubt on O notation.

2002-08-11 Thread gfgs pedo
hi, I have problem understanding time complexity for the following problem I need to check if two strings are equal let string one s1=aaabbb and string two s2=aaabbb We place it on a single tape turing machine aaabbb aaabbb the book says it takes roughly 2n steps to match corresponding

Re: [CI] Re: Turing thesis(Incompleteness theorom)

2002-08-11 Thread gfgs pedo
hi, thank you Mr. Jim,one more query, regarding Godel's incompleteness theorom. with reference to http://www.miskatonic.org/godel.html Gödel asks for the program and the circuit design of the UTM. The program may be complicated, but it can only be finitely long. Call the program P(UTM) for

Turing thesis

2002-08-10 Thread gfgs pedo
hi, Here is an example illustrating turing thesis { Suppose we make a conjecture that a turing machine is equal to the power of a typical digital computer?how can we defend or refute sucha hypotheis? to defend it we could take an increasingly more difficult and show that they are solvable

Re:Atmospheric noise fair coin flipping

2002-07-16 Thread gfgs pedo
Data. --- Optimizzin Al-gorithym [EMAIL PROTECTED] wrote: At 05:45 AM 7/14/02 -0700, gfgs pedo wrote: it is said that atmospheric noise is random but how can we say for sure. Physics, chaos, the growth of initial uncertainty as systems evolve, energy/time required to make measurements

RE: Finding encrytion algorithm

2002-07-15 Thread gfgs pedo
hi, I get the idea,thanx. Regards Data. can u pls explain how they have statistical signatures,pls- may be using SPN's, i have tried ANSI X9.17 key generation with GOST-it did have a negligably small skew-it makes me wonder what statistical signature they have.The negligable skew is

Atmospheric noise fair coin flipping

2002-07-15 Thread gfgs pedo
wrote: On Sat, 13 Jul 2002, gfgs pedo wrote: can u pls explain how they have statistical signatures,pls- may be using SPN's, i have tried ANSI X9.17 key generation with GOST-it did have a negligably small skew-it makes me wonder what statistical signature

Re: Finding encrytion algorithm

2002-07-13 Thread gfgs pedo
hi, thanx Mr Jim. Data. __ Do You Yahoo!? Yahoo! Autos - Get free new car price quotes http://autos.yahoo.com

Finding encrytion algorithm

2002-07-11 Thread gfgs pedo
i meant cryptanalyst-hope i spelled that rite :-) Data. __ Do You Yahoo!? Sign up for SBC Yahoo! Dial - First Month Free http://sbc.yahoo.com

Finding encrytion algorithm

2002-07-11 Thread gfgs pedo
hi, suppose a cryptanalysis only has encrypted data-how is going 2 know which is the encrytion algorithm used 2 encrypt the data ,so that he can effeciently cryptanalyse if 1:he has large amount of cipher text only 2:has large amount of plain text and corresponding cipher text. There r so

Man in middle attack

2002-07-02 Thread gfgs pedo
will give some clarity. now he can send Bob the original message of Alice. So I think the above suggested protocol will not work. Mallory can still get away with his scheme Regards Data. --- Marcel Popescu [EMAIL PROTECTED] wrote: From: gfgs pedo [EMAIL PROTECTED] One solution suggested

Re: Diffie-Hellman and MITM

2002-07-01 Thread gfgs pedo
hi, Thanx Mark, I was also wondering on the line of hash functions too,me 2 dont see how it works securely. Nor does the interlock protocol look secure to me. Regards Data. --- Marcel Popescu [EMAIL PROTECTED] wrote: From: gfgs pedo [EMAIL PROTECTED] One solution suggested against

Re: Diffie-Hellman and MITM

2002-06-29 Thread gfgs pedo
hi, If there is no previous shared secret,then ur communication on an insecure network is susecptable to the man in the middle attack. One solution suggested against the man in the middle attack is using the interlock protocol InterLock Protocol Is used to foil a man in the middle

lsfr with odd charecteristics

2002-06-11 Thread gfgs pedo
hi, Book says, a construction that involved computing LSFR's over a field of 'odd charecteristics' is insecure. Does that mean a register with odd number of bits is insecure which would mean a tap sequence which uses an odd degree polynomial is insecure? Regards Data.

Re: How can i check the authenticity of a private key

2002-05-31 Thread gfgs pedo
hi, I was helping a friend if mine with rsa key generation.if it helps u here it is. I am posting the mail which i sent to him. 1:Choose 2 large prime numbers p q 2:choose n=p*q z=(p-1)*(q-1) 3:choose a number relatively prime to z anc call it d. two numbers (a,b) are said to be

ANSI X9.17 STANDARDS

2002-05-29 Thread gfgs pedo
hi, I have an idea of what x9.17 standards says but no idea behind the mathametcial background of it. x9.17 standards is a standard but why is it so.mathametically what makes it a secure key generator? Could some 1 pls address the issue. Thank u very much. Data.

Mersenne Twister

2002-05-24 Thread gfgs pedo
hi, Does any 1 have a reference to the actual Mersenne Twister algorithm? Thank u. Regards Data. __ Do You Yahoo!? LAUNCH - Your Yahoo! Music Experience http://launch.yahoo.com

Regarding maximum period LSFR's

2002-05-21 Thread gfgs pedo
hi, Its regarding maximum period LSFR's (Linear feed back shift registers) used for generating pseudo random numbers. A tap sequence for an LFSR is the xor of certain bits in the register. For eg: I choose a primitive polynomail mod 2 x^32+x^7+x^5+x^3+x^2+x+1 is a primitive polynomial mod

Random number generator-Idea 1

2002-04-24 Thread gfgs pedo
hi, With reference to the following url http://www.ietf.org/rfc/rfc1750.txt As in idea 1 what about choosing 2 independent bit file streams. Then as in RFC 1750 6.1.1 A Trivial Mixing Function (page 14), make a 3rd bit file stream such that We xor For i=0 to n bit(i)file3=bit(i)file1

Re:Two ideas for random number generators

2002-04-24 Thread gfgs pedo
hi, Using Transition Mappings to De-Skew Randomness Recommendations for Security RFC 1750 An extract from it. Another technique, originally due to von Neumann [VON NEUMANN], is to examine a bit stream as a sequence of non-overlapping pair | pair |

Need help on x mod m

2002-04-22 Thread gfgs pedo
hi, Here is a query frm my friend- I wondered if anyone knows a solution for my problem... x mod m = a x mod n = b Let's say i choose small number... m=5 n=3 a=3 b=1 then it's x mod 5 = 3 x mod 3 = 1 after trying a but you will now that x=13

Two ideas for random number generation

2002-04-20 Thread gfgs pedo
hi, Here are two ideas which came up in my mind. Since I have done a few diagrams for illustration and thought that it will not be a good idea as attachment,I have put the ideas at the following url http://www.ircsuper.net/~neo/ I sincerely appreciate ur comments.Thank u for ur time. Regards