From: jmorton123 on
I'm glad to see we are now on solid ground in this discussion

I have just finished the basic software of my random binary number
generator.

I expect to post the description here tomorrow in a new post and make
the freeware available on my website at that time:
kingkonglomerate.com

Some of the freeware I have made availabe have just been educational
tools for the newbies but some of the other freeware programs have
been preliminary steps towards this Random Binary Number Generator.

I look forward to your comments on the effectiveness of this program
as it will be described.

I will post some tutorial videos in the next couple of weeks as well.

JM




On Feb 8, 11:09 am, g...(a)nope.ucsd.edu (Greg Rose) wrote:
> In article <outer-8C04BE.12064208022...(a)news.ssl.Ngroups.NET>,
> Richard Outerbridge  <ou...(a)interlog.com> wrote:
>
>
>
>
>
> >In article
> ><f1471543-c3e8-40b5-856f-9b933b6b7...(a)j31g2000yqa.googlegroups.com>,
> > bmearns <mearn...(a)gmail.com> wrote:
>
> >> On Jan 31, 6:18 pm, jmorton123 <jmorton...(a)rock.com> wrote:
> >> [snip]
> >> > It's all about the "random" numbers.  If no one can reproduce the
> >> > "random" numbers then no one can decrypt the encrypted message,
> >> > regardless of where those "random" numbers came from or how they were
> >> > produced.
> >> [snip]
>
> >> While I can't claim to be any kind of expert in this field, I don't
> >> believe you're correct in this conclusion. Preventing someone from
> >> exactly recreating your pseudorandom sequence is of course very
> >> important, but that's not the only vector of attack. You need to be
> >> careful to ensure that there are no patterns or biases in your
> >> sequence, either. You might have a stream of bits in which the
> >> distance between 1's is perfectly random, but if it's 90% 0's, that's
> >> not a very secure sequence. That's an extreme example, of course, but
> >> more subtle patterns and biases could be devastating to someone
> >> relying on this for security.
>
> >For cryptographic purposes, does it not suffice that the entropy of the
> >keystream be greater than the redundancy of the plaintext?  It need not
> >be perfectly random - just sufficiently random.
>
> To use my favourite quote: "In theory there's no
> difference between theory and practice, but in
> practice, there is." -- Yogi Berra.
>
> Theoretically you're right, but it's very
> dangerous. In a real cryptosystem, you have to
> assume multiple messages, and while the individual
> messages might be highly compressed or have high
> entropy, you are much less certain about the
> entropy rate of multiple messages.  Perhaps one of
> the recipients modified or quoted the content and
> sent it out again. Correlation between the two
> messages would show this (see the Venona
> intercepts) and then the total entropy of the two
> messages might well fall below what is necessary
> for security.
>
> Greg.
>
> --
> Greg Rose
> 232B EC8F 44C6 C853 D68F  E107 E6BF CD2F 1081 A37C- Hide quoted text -
>
> - Show quoted text -