Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 11 Jun 2000 09:24:37 +0200
From:      Mark Murray <mark@grondar.za>
To:        "Andrey A. Chernov" <ache@FreeBSD.ORG>
Cc:        Mark Murray <mark@grondar.za>, "Jeroen C. van Gelderen" <jeroen@vangelderen.org>, Kris Kennaway <kris@FreeBSD.ORG>, current@FreeBSD.ORG
Subject:   Re: mktemp() patch 
Message-ID:  <200006110724.JAA70920@grimreaper.grondar.za>
In-Reply-To: <20000610195102.D99504@freebsd.org> ; from "Andrey A. Chernov" <ache@FreeBSD.ORG>  "Sat, 10 Jun 2000 19:51:03 MST."
References:  <20000610195102.D99504@freebsd.org> 

next in thread | previous in thread | raw e-mail | index | archive | help
> If it not weakers I can't see why it strenghthens.
> I.e. you can constantly strenghthens generator with passing it through XOR -1
?
> If not, why any other value is better than -1?

Huh? -1 is a constant, not random. Pass your data through _random_ bits,
XORing it with them, and you have unbreakable crypto (one-time-pad) if you
make a record of the random bits (the key).

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200006110724.JAA70920>