Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261423AbTHYE3s (ORCPT ); Mon, 25 Aug 2003 00:29:48 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S261471AbTHYE3s (ORCPT ); Mon, 25 Aug 2003 00:29:48 -0400 Received: from mail.jlokier.co.uk ([81.29.64.88]:44164 "EHLO mail.jlokier.co.uk") by vger.kernel.org with ESMTP id S261423AbTHYE3r (ORCPT ); Mon, 25 Aug 2003 00:29:47 -0400 Date: Mon, 25 Aug 2003 05:29:33 +0100 From: Jamie Lokier To: David Wagner Cc: linux-kernel@vger.kernel.org Subject: Re: [RFC][PATCH] Make cryptoapi non-optional? Message-ID: <20030825042933.GD20529@mail.jlokier.co.uk> References: <20030818004313.T3708@schatzie.adilger.int> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.1i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 806 Lines: 20 David Wagner wrote: > If you see a 64-bit values repeat twice in a row when querying a > cryptographic pseudorandom generator, the crypto-PRNG is almost surely > broken. True. However if you generate lots of 64-bit values and see a collision between any two, that is much more likely. See "birthday paradox". I know you understand this, David. Just so everyone else is clear, because part of this thread is about locking problems (same result within a short time), and part of this thread is about uniqueness (collisions between any pair). Enjoy, -- Jamie - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/