Mok-Kong Shen
8/7/2015 5:18:00 PM
Am 07.08.2015 um 16:51 schrieb Kaz Kylheku:
> On 2015-08-07, Mok-Kong Shen <mok-kong.shen@t-online.de> wrote:
>> "Among the core self-identified purposes of JTRIG are two tactics: (1)
>> to inject all sorts of false material onto the internet in order to
>> destroy the reputation of its targets.
>
> This does not apply when the target is yourself and you believe the false
> material that you're posting that is ruining your own reputation,
> like "Python's PRNG is good enough for generating RSA keys and one-time pads"
> and "if an academic paper doesn't explicitly spell out an assumption,
> then such an assumption doesn't hold".
In the other thread I argued that, since an algorithm of CSPRNG
given in HAC is based on RSA, there would have been a vicious
circle in implementation, if the generation of RSA keys had required
from the outset an CSPRNG. (If this 2nd CSPRNG is not available,
then the implementation of the first CSPRNG is obviously impossible.
If the 2nd CSPRNG is available, then in the clearly majority of cases
in practice one would (for convenience and economy) simply use that
2nd CSPRNG and not spend any additional time and efforts to do an
implementation for the 1st CSPRNG.
Is there any logical error in my argument above?
M. K. Shen
> Wait, when did you have a good reputation around here?
>
> At the time of the From: line in your first posting, it was slightly
> positive. It took a downturn to neutral in Subject: and continued
> to plummet in the body.
>