Changes between Initial Version and Version 1 of Ticket #22948, comment 5


Ignore:
Timestamp:
Jul 18, 2017, 12:21:39 AM (22 months ago)
Author:
cypherpunks
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Ticket #22948, comment 5

    initial v1  
    1212This is not something to decide, permanently, in a rush.
    1313
    14 Intuitively, thinking about what (very far future attacks) could happen, rather than what is known to already be possible, random or at least pseudo-random data seems better. And there are simple ways of generating pseudorandom data that is at least better against imaginable future cryptanalysis than all zeroes, which consume very little entropy, like repeated hashing, or (perhaps potentially less good) a stream cipher with a random key, etc.
    15 
    16 (Why potentially less good? Arguably it is consistent with $agency's agenda to allow 'hash functions' to be developed and adopted that have the best security properties possible, but the same may not be true of 'ciphers'.)
     14Intuitively, thinking about what (very far future attacks) could happen, rather than what is known to already be possible, random or at least pseudo-random data seems better. And there are simple ways of generating pseudorandom data that is at least better against imaginable future cryptanalysis than all zeroes, which consume very little entropy, like a stream cipher with a random key, repeated hashing, etc.