Matches for Entropy, 516 total results Sorted by newest | relevance
Wed Feb 24 00:29:39 UTC 2016 <asciilifeform> wait till they get to the part with 'entropy spreading'.
Mon Feb 15 23:44:07 UTC 2016 <BingoBoingo> They exploded for good reason. Entropy tends to find a way.
Wed Feb 10 01:20:11 UTC 2016 <mircea_popescu> i suspect it goes deeper than that. something something entropy/and/bandwidth
Sat Feb 06 20:42:28 UTC 2016 <mircea_popescu> are we confusing entropy and bias here ?
Sat Feb 06 16:13:58 UTC 2016 <assbot> Logged on 06-02-2016 15:33:16; asciilifeform: i never looked into what his entropy source is. if it's a prng, straight to hell.
Sat Feb 06 15:57:24 UTC 2016 <assbot> Logged on 06-02-2016 15:33:16; asciilifeform: i never looked into what his entropy source is. if it's a prng, straight to hell.
Sat Feb 06 15:33:16 UTC 2016 <asciilifeform> i never looked into what his entropy source is. if it's a prng, straight to hell.
Sat Feb 06 01:30:27 UTC 2016 <mircea_popescu> what colors are your bits, bitch! and how much entropy is there in this dword ?
Sat Feb 06 01:30:08 UTC 2016 <mircea_popescu> "256 bits has sufficient entropy to render any brute force attack, and even severe weakening (e.g. sq root effort attacks) utterly infeasible." << dude where the fuck do they come from.
Fri Feb 05 19:27:34 UTC 2016 <assbot> Entropy Forum: Entropy's future, pullmoll am 09.7.2004 22:51 ... ( http://bit.ly/1X8SOhj )
Wed Feb 03 01:57:17 UTC 2016 <asciilifeform> e.g., 1 and 2 imply that there are sufficient bits per entropy without having to resort to whitenings or distillation
Mon Feb 01 22:59:17 UTC 2016 <assbot> Zotamedu comments on Bitcoin core will soon replace the industry standard random number generator with a homebrew script. Sorry for your loss (of entropy) ... ( http://bit.ly/1Q8QotN )
Mon Feb 01 18:25:15 UTC 2016 <mircea_popescu> +/** Add entropy to the pool directly. Use this for seeding or on-demand entropy. */
Sun Jan 24 22:55:15 UTC 2016 <asciilifeform> we actually don't have an algebra for entropy measures, other than shannon's
Sun Jan 24 22:48:57 UTC 2016 <mircea_popescu> it is the direct equivalent of entropy-diddling for keysystems.
Fri Jan 22 01:07:20 UTC 2016 <mod6> re: entropy topic, perhaps ya, we can do something like this when we have a crypto lib 'eh?
Fri Jan 22 01:03:54 UTC 2016 <mircea_popescu> incidentally, and unrelatedly to the "magic numbers" avenue of trb improvement : one obvious anbd cheap hardening for trb would be to allow the user control of entropy source.
Tue Jan 05 04:15:50 UTC 2016 <ben_vulpes> should i come up with my own hairbrained scheme to do so or ask how best to get entropy out of this rng directly from you?
Thu Dec 31 04:37:43 UTC 2015 <mircea_popescu> quite exactly. it'd seem OpenSSL 1.0.1e-fips does not actually utilize entropy to generate keys.
Thu Dec 31 04:36:42 UTC 2015 <asciilifeform> mircea_popescu: i dont think even my rng gives 4096*typical-miller-rabin-retries bits of entropy in 0.5s