Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

Q: Why was Stonehenge abandoned? A: It wasn't IBM compatible.


sci / sci.crypt.random-numbers / Re: A software for combining text files to obtain high quality pseudo-random sequences in practice

SubjectAuthor
* A software for combining text files to obtain high quality pseudo-random sequencMok-Kong Shen
+* Re: A software for combining text files to obtain high quality pseudo-random seqWilliam Unruh
|`* Re: A software for combining text files to obtain high quality pseudo-random seqMok-Kong Shen
| `* Re: A software for combining text files to obtain high quality pseudo-random seqKarl.Frank
|  `* Re: A software for combining text files to obtain high quality pseudo-random seqMok-Kong Shen
|   `* Re: A software for combining text files to obtain high quality pseudo-random seqKarl.Frank
|    `* Re: A software for combining text files to obtain high quality pseudo-random seqMok-Kong Shen
|     `* Re: A software for combining text files to obtain high quality pseudo-random seqKarl.Frank
|      `* Re: A software for combining text files to obtain high quality pseudo-random seqMok-Kong Shen
|       `* Re: A software for combining text files to obtain high quality pseudo-random seqKarl.Frank
|        +* Re: A software for combining text files to obtain high quality pseudo-random seqMok-Kong Shen
|        |`* Re: A software for combining text files to obtain high quality pseudo-random seqKarl.Frank
|        | `* Re: A software for combining text files to obtain high quality pseudo-random seqMok-Kong Shen
|        |  `- Re: A software for combining text files to obtain high quality pseudo-random seqKarl.Frank
|        `* Re: A software for combining text files to obtain high quality pseudo-random seqMok-Kong Shen
|         `* Re: A software for combining text files to obtain high quality pseudo-random seqWilliam Unruh
|          +* Re: A software for combining text files to obtain high quality pseudo-random seqMok-Kong Shen
|          |`* Re: A software for combining text files to obtain high quality pseudo-random seqKarl.Frank
|          | `* Re: A software for combining text files to obtain high quality pseudo-random seqMok-Kong Shen
|          |  `- Re: A software for combining text files to obtain high quality pseudo-random seqKarl.Frank
|          `* Re: A software for combining text files to obtain high quality pseudo-random seqKarl.Frank
|           `- Re: A software for combining text files to obtain high quality pseudo-random seqKarl.Frank
`- Re: A software for combining text files to obtain high quality pseudo-random seqMok-Kong Shen

1
Subject: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Mok-Kong Shen
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Tue, 11 Jul 2017 09:21 UTC
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: mok-kong.shen@t-online.de (Mok-Kong Shen)
Newsgroups: sci.crypt.random-numbers
Subject: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Tue, 11 Jul 2017 11:21:41 +0200
Organization: albasani.net
Lines: 29
Message-ID: <ok25b3$c5g$4@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net vKhSwXxmjFPw158G9f/A6nXgIDFno43YX+/wxA5e0by/r6j8WmhWYA3VYITwcyPTZQWZ4ch/ibSnhLvYemI1jLOr02C4zDAH8WS3+XYZGJ5ZOoRRH+YJNManm6atabwD
NNTP-Posting-Date: Tue, 11 Jul 2017 09:21:39 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="88uhnw6a0Vs0S23ahFDhj451FYG6KB+uQ0qE6JaEsFiV+vXT0SAi7gWXOeHF151pj1S7JQ7QrGc3NwrXDZJsaf/Zj8v/tF5+BmjO5dsHdKdtWgDPKVldCBwInZXdRFB9GN5H0vYbXo1gjC9fNDRfUpdrGXa+tAxc35kXOG01h+A="; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
Thunderbird/52.2.1
X-Mozilla-News-Host: news://news.albasani.net:119
Cancel-Lock: sha1:FTdIKbW8LhtUEXqiiaASdTuqBsg=
View all headers

Shannon did some experiments to determine the entropy in English texts.
A later
work done by Cover and King [1] gave an estimate of 1.34 bits per
letter. This
implies that, if the letters are coded into 5 bits, one needs to
appropriately
combine 4 text files in order to obtain bit sequences of full entropy, since
4*1.34 = 5.36 > 5. The method used in our software is to sum (mod 32)
the coded
values of a-z (mapped to 0-25) as 5 bits of the corresponding letters of
the
text files.

There are plenty of other schemes for obtaining high quality pseudo-random
sequences in practice, e.g. AES in counter mode. However our scheme seems to
be much simpler both in the underlying logic (understandability) and in
implementation and is thus a viable alternative that one could use/need
under
circumstances.

The software, TEXTCOMBINE-SP, is available at http://mok-kong-shen.de

M. K. Shen
-------------------------------------------------------------------------------

[1] T. M. Cover, R. C. King, A Convergent Gambling Estimate of the
Entropy of
English, IEEE Trans. Inf. Theory, vol. 24, 1978, pp. 413-421.

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: William Unruh
Newsgroups: sci.crypt.random-numbers
Organization: A noiseless patient Spider
Date: Tue, 11 Jul 2017 20:01 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: unruh@invalid.ca (William Unruh)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Tue, 11 Jul 2017 20:01:56 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 41
Message-ID: <ok3ark$hqs$2@dont-email.me>
References: <ok25b3$c5g$4@news.albasani.net>
Injection-Date: Tue, 11 Jul 2017 20:01:56 -0000 (UTC)
Injection-Info: mx02.eternal-september.org; posting-host="b534f9f5247c47fd4afa6ccd05a28da1";
logging-data="18268"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18BkD43YqXV0qP493kKzN88"
User-Agent: slrn/1.0.1 (Linux)
Cancel-Lock: sha1:zCyHlNjgSE3Xetv4y/siNvyfL/I=
View all headers

You are repeating yourself. Do you think that if you say it three times
(as with the Bellman) it will suddenly become worthwhile?
As I have said, this is a horrible scheme. text has many long range
correlations (from charater pairs to paragraphs, etc) , which would mess up the random stream. (make it non-random).
Bad idea.
And you might want to look at what Shannon and others actually did.

Note that even if the letters really were completely random, your method
of combining them would make the output non-random.

On 2017-07-11, Mok-Kong Shen <mok-kong.shen@t-online.de> wrote:
>
> Shannon did some experiments to determine the entropy in English texts.
> A later
> work done by Cover and King [1] gave an estimate of 1.34 bits per
> letter. This
> implies that, if the letters are coded into 5 bits, one needs to
> appropriately
> combine 4 text files in order to obtain bit sequences of full entropy, since
> 4*1.34 = 5.36 > 5. The method used in our software is to sum (mod 32)
> the coded
> values of a-z (mapped to 0-25) as 5 bits of the corresponding letters of
> the
> text files.
>
> There are plenty of other schemes for obtaining high quality pseudo-random
> sequences in practice, e.g. AES in counter mode. However our scheme seems to
> be much simpler both in the underlying logic (understandability) and in
> implementation and is thus a viable alternative that one could use/need
> under
> circumstances.
>
> The software, TEXTCOMBINE-SP, is available at http://mok-kong-shen.de
>
> M. K. Shen
> -------------------------------------------------------------------------------
>
> [1] T. M. Cover, R. C. King, A Convergent Gambling Estimate of the
> Entropy of
> English, IEEE Trans. Inf. Theory, vol. 24, 1978, pp. 413-421.

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Mok-Kong Shen
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Wed, 12 Jul 2017 15:37 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: mok-kong.shen@t-online.de (Mok-Kong Shen)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Wed, 12 Jul 2017 17:37:42 +0200
Organization: albasani.net
Lines: 52
Message-ID: <ok5fo6$os9$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net pzqa0cyAxzIan4+GG6ODjsUjIFnDvIpSX8Q/TcydFafZGwYawH0Ri7cc67uavgA1EFRvq/Ba3o0WPo+3ERyVDb8lJZIokd6NJ6CkkQvrsSazqqeGrRXJT8IKkjmCvqD5
NNTP-Posting-Date: Wed, 12 Jul 2017 15:37:42 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="U9fNl30KMXacOgo3nQYS+lUjgVnCqKO6Xfnl2RftKIRRUGXEypY0gzQNqhbhG6ScxDHHgmtc2yEjw0gRUGX0piR43279SGTy+8Yvha4/aC997VXX0zN0dS3hzwJpi37oP7n+jfriybXDCDbJC3JpLJnmlx0NwGtT4JrJKjYdg48="; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
Thunderbird/52.2.1
In-Reply-To: <ok3ark$hqs$2@dont-email.me>
Cancel-Lock: sha1:vTHGVuqYvYsj7NpSfI6nLO08PQs=
View all headers

Am 11.07.2017 um 22:01 schrieb William Unruh:
> You are repeating yourself. Do you think that if you say it three times
> (as with the Bellman) it will suddenly become worthwhile?
> As I have said, this is a horrible scheme. text has many long range
> correlations (from charater pairs to paragraphs, etc) , which would mess up the random stream. (make it non-random).
> Bad idea.
> And you might want to look at what Shannon and others actually did.
>
> Note that even if the letters really were completely random, your method
> of combining them would make the output non-random.

See the reference I gave of the paper about entropy and the test
statistic of Maurer's test.

(I had answered your post in another group and wonder why you didn't
answer there and switched to this one. I post to diverse groups because
the readers of different groups are not the same. Understand?)

M. K. Shen

>
> On 2017-07-11, Mok-Kong Shen <mok-kong.shen@t-online.de> wrote:
>>
>> Shannon did some experiments to determine the entropy in English texts.
>> A later
>> work done by Cover and King [1] gave an estimate of 1.34 bits per
>> letter. This
>> implies that, if the letters are coded into 5 bits, one needs to
>> appropriately
>> combine 4 text files in order to obtain bit sequences of full entropy, since
>> 4*1.34 = 5.36 > 5. The method used in our software is to sum (mod 32)
>> the coded
>> values of a-z (mapped to 0-25) as 5 bits of the corresponding letters of
>> the
>> text files.
>>
>> There are plenty of other schemes for obtaining high quality pseudo-random
>> sequences in practice, e.g. AES in counter mode. However our scheme seems to
>> be much simpler both in the underlying logic (understandability) and in
>> implementation and is thus a viable alternative that one could use/need
>> under
>> circumstances.
>>
>> The software, TEXTCOMBINE-SP, is available at http://mok-kong-shen.de
>>
>> M. K. Shen
>> -------------------------------------------------------------------------------
>>
>> [1] T. M. Cover, R. C. King, A Convergent Gambling Estimate of the
>> Entropy of
>> English, IEEE Trans. Inf. Theory, vol. 24, 1978, pp. 413-421.

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Karl.Frank
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Wed, 12 Jul 2017 16:44 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: Karl.Frank@Freecx.co.uk (Karl.Frank)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality pseudo-random
sequences in practice
Date: Wed, 12 Jul 2017 18:44:27 +0200
Organization: albasani.net
Lines: 75
Message-ID: <ok5jlb$hgk$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me> <ok5fo6$os9$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net 4B+V3+OlwVqsZfg6TKBOAc4xZE9oh+zneLJRKGXcj98XtrgwkL4xm3hkoOJETChu+rZjL+SMg4QENpCEKVpAVY46sv/6uyuvlFsroGXEqS5HjTFUs3h8mfhLx07dB53O
NNTP-Posting-Date: Wed, 12 Jul 2017 16:44:27 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="40QRA1caRMrLx/idLYRS6I0yawKJyeGoV1ulvVPk4N45dQadeSgqoR4dxIlu83ufIiobjTbMbG6MUJ7G3N4IoFVe7Qv8QbEDbEe+B1H/gYGzjSL4/ZRiqHryqtJIA+hm"; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.0
In-Reply-To: <ok5fo6$os9$1@news.albasani.net>
Cancel-Lock: sha1:8PusEWXZp7VXjB1ZwDCtK78N4hc=
View all headers

On 12.07.17 17:37, Mok-Kong Shen wrote:
> Am 11.07.2017 um 22:01 schrieb William Unruh:
>> You are repeating yourself. Do you think that if you say it three times
>> (as with the Bellman) it will suddenly become worthwhile?
>> As I have said, this is a horrible scheme. text has many long range
>> correlations (from charater pairs to paragraphs, etc) , which would
>> mess up the random stream. (make it non-random).
>> Bad idea.
>> And you might want to look at what Shannon and others actually did.
>>
>> Note that even if the letters really were completely random, your method
>> of combining them would make the output non-random.
>
> See the reference I gave of the paper about entropy and the test
> statistic of Maurer's test.
>
Did it ever occur to you that verifying randomness only by the Maurer
test is not sufficient?

What about ENT, test for bias or, much more important, Pierre L'Ecuyer's
TestU01 suite?

In the past I have already demonstrated that one of your PRNG's, namely
PERMPOLYPRNG which passed the Maurer test, is massively flawed.

> (I had answered your post in another group and wonder why you didn't
> answer there and switched to this one. I post to diverse groups because
> the readers of different groups are not the same. Understand?)
>
> M. K. Shen
>
>>
>> On 2017-07-11, Mok-Kong Shen <mok-kong.shen@t-online.de> wrote:
>>>
>>> Shannon did some experiments to determine the entropy in English texts.
>>> A later
>>> work done by Cover and King [1] gave an estimate of 1.34 bits per
>>> letter. This
>>> implies that, if the letters are coded into 5 bits, one needs to
>>> appropriately
>>> combine 4 text files in order to obtain bit sequences of full
>>> entropy, since
>>> 4*1.34 = 5.36 > 5. The method used in our software is to sum (mod 32)
>>> the coded
>>> values of a-z (mapped to 0-25) as 5 bits of the corresponding letters of
>>> the
>>> text files.
>>>
>>> There are plenty of other schemes for obtaining high quality
>>> pseudo-random
>>> sequences in practice, e.g. AES in counter mode. However our scheme
>>> seems to
>>> be much simpler both in the underlying logic (understandability) and in
>>> implementation and is thus a viable alternative that one could use/need
>>> under
>>> circumstances.
>>>
>>> The software, TEXTCOMBINE-SP, is available at http://mok-kong-shen.de
>>>
>>> M. K. Shen
>>> -------------------------------------------------------------------------------
>>>
>>>
>>> [1] T. M. Cover, R. C. King, A Convergent Gambling Estimate of the
>>> Entropy of
>>> English, IEEE Trans. Inf. Theory, vol. 24, 1978, pp. 413-421.
>

--
cHNiMUBACG0HAAAAAAAAAAAAAABIZVbDdKVM0w1kM9vxQHw+bkLxsY/Z0czY0uv8/Ks6WULxJVua
zjvpoYvtEwDVhP7RGTCBVlzZ+VBWPHg5rqmKWvtzsuVmMSDxAIS6Db6YhtzT+RStzoG9ForBcG8k
G97Q3Jml/aBun8Kyf+XOBHpl5gNW4YqhiM0=

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Mok-Kong Shen
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Wed, 12 Jul 2017 20:44 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: mok-kong.shen@t-online.de (Mok-Kong Shen)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Wed, 12 Jul 2017 22:44:17 +0200
Organization: albasani.net
Lines: 35
Message-ID: <ok61n1$fdj$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me>
<ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net LoIGRDHf/sghNKIxS35BIe0PTGDZqFNLbuzPt65knvOsooLzzU1d2s8IhzNZhrFfkQdHmtqGKJL6DgyFNWzGj12VaY8udxsP6ALrZM5O1DexxJvtBD8+XaExaqAMkJ+x
NNTP-Posting-Date: Wed, 12 Jul 2017 20:44:17 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="KoASTdheEAnlctkT4s84xp19yYFH2YzgdP69oP5Y4Nu+hKaznMqtUZ1zscL7HfG8vggCajCBcJso8FPhmljMBoiQ9ZhxVrznq0Lm/8OnT9zQW6TVLyrh/G3oQ1Uh7rsxkiBpP0iyBJKICpZ5e5ZiQZ1IodRD9AX+r+/2FUu5hCw="; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
Thunderbird/52.2.1
In-Reply-To: <ok5jlb$hgk$1@news.albasani.net>
Cancel-Lock: sha1:p7QyArtQj4j60nKHQ+fj+wiH7Fs=
View all headers

Am 12.07.2017 um 18:44 schrieb Karl.Frank:
> On 12.07.17 17:37, Mok-Kong Shen wrote:
>> Am 11.07.2017 um 22:01 schrieb William Unruh:
>>> You are repeating yourself. Do you think that if you say it three times
>>> (as with the Bellman) it will suddenly become worthwhile?
>>> As I have said, this is a horrible scheme. text has many long range
>>> correlations (from charater pairs to paragraphs, etc) , which would
>>> mess up the random stream. (make it non-random).
>>> Bad idea.
>>> And you might want to look at what Shannon and others actually did.
>>>
>>> Note that even if the letters really were completely random, your method
>>> of combining them would make the output non-random.
>>
>> See the reference I gave of the paper about entropy and the test
>> statistic of Maurer's test.
>>
> Did it ever occur to you that verifying randomness only by the Maurer
> test is not sufficient?
>
> What about ENT, test for bias or, much more important, Pierre L'Ecuyer's
> TestU01 suite?
>
> In the past I have already demonstrated that one of your PRNG's, namely
> PERMPOLYPRNG which passed the Maurer test, is massively flawed.

The unfortunate situation with PRN generation in general is that there
are lots of different tests. I don't have expertise in such and use just
one test for the sake of convenience. Further, my targeted users, the
common people who need security protection of their personal
communications, have only very limited volumes, so cryptanalytical risks
associated with assumptions of large volumes of encrypted materials are
not intimidating for them IMHO.

M. K. Shen

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Karl.Frank
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 00:15 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: Karl.Frank@Freecx.co.uk (Karl.Frank)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality pseudo-random
sequences in practice
Date: Thu, 13 Jul 2017 02:15:52 +0200
Organization: albasani.net
Lines: 51
Message-ID: <ok6e3o$egv$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me> <ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net> <ok61n1$fdj$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net gUCDBDuIu5x1f96CMp9SGFJeti/UG/PiVTW6aIIYWHtTgqheuae0eNOiMd+BAXmrLIoSEu8pEr8kzkucxYLt1rigUQ6W+wFW0sfyYvEfIlCH/R6+CWHubMBAUMlArDHt
NNTP-Posting-Date: Thu, 13 Jul 2017 00:15:52 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="28pVAKVIZ2AKqpp0oT+1tGyGIiDtyUaAhxx5AmAP4OFs1Glh33gonMCV8paUP86i8Fn898ICDetusSVS7Zq8x5h2kXJ8tpAVlpjuCHiZOairvCp/PeoQ0h+RCKhetFl+"; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.0
In-Reply-To: <ok61n1$fdj$1@news.albasani.net>
Cancel-Lock: sha1:cxI4gllyrYZm3AWIbg1wVYD6/ow=
View all headers

On 12.07.17 22:44, Mok-Kong Shen wrote:
> Am 12.07.2017 um 18:44 schrieb Karl.Frank:
>> On 12.07.17 17:37, Mok-Kong Shen wrote:
>>> Am 11.07.2017 um 22:01 schrieb William Unruh:
>>>> You are repeating yourself. Do you think that if you say it three times
>>>> (as with the Bellman) it will suddenly become worthwhile?
>>>> As I have said, this is a horrible scheme. text has many long range
>>>> correlations (from charater pairs to paragraphs, etc) , which would
>>>> mess up the random stream. (make it non-random).
>>>> Bad idea.
>>>> And you might want to look at what Shannon and others actually did.
>>>>
>>>> Note that even if the letters really were completely random, your
>>>> method
>>>> of combining them would make the output non-random.
>>>
>>> See the reference I gave of the paper about entropy and the test
>>> statistic of Maurer's test.
>>>
>> Did it ever occur to you that verifying randomness only by the Maurer
>> test is not sufficient?
>>
>> What about ENT, test for bias or, much more important, Pierre L'Ecuyer's
>> TestU01 suite?
>>
>> In the past I have already demonstrated that one of your PRNG's, namely
>> PERMPOLYPRNG which passed the Maurer test, is massively flawed.
>
> The unfortunate situation with PRN generation in general is that there
> are lots of different tests. I don't have expertise in such and use just
> one test for the sake of convenience. Further, my targeted users, the
> common people who need security protection of their personal
> communications, have only very limited volumes, so cryptanalytical risks
> associated with assumptions of large volumes of encrypted materials are
> not intimidating for them IMHO.
>
> M. K. Shen

It is not an unfortunate situation. In contrast these test suites are of
great help in revealing weak or even totally useless PRNG's for the
common people - let alone in terms of cryptography.

So now you're promoting another cryptographic scheme for the obfuscation
of your little sisters diary? - as Bruce Schneier called it once.

--
cHNiMUBACG0HAAAAAAAAAAAAAABIZVbDdKVM0w1kM9vxQHw+bkLxsY/Z0czY0uv8/Ks6WULxJVua
zjvpoYvtEwDVhP7RGTCBVlzZ+VBWPHg5rqmKWvtzsuVmMSDxAIS6Db6YhtzT+RStzoG9ForBcG8k
G97Q3Jml/aBun8Kyf+XOBHpl5gNW4YqhiM0=

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Mok-Kong Shen
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 06:36 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: mok-kong.shen@t-online.de (Mok-Kong Shen)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Thu, 13 Jul 2017 08:36:54 +0200
Organization: albasani.net
Lines: 59
Message-ID: <ok74e6$63o$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me>
<ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net>
<ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net Mtw3mNBZg0J2gz6KMM0tfBhiK6S4XH49k4DIbJ3vz4YIVj+q0c+C0U6MWgP3pAYhWpU1/RIfQe5IhIx/wFYCKcpbzaSAxuGUPd8URkfj3Mrs2+JBLLcjPB049Ij9oKwc
NNTP-Posting-Date: Thu, 13 Jul 2017 06:36:54 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="BpPOC5GZukKZ2lD4XH1Hip1zL773Ng3MzoXYo3z83JeCVSEeSQnUVnYF8ryqVeN1IGvYhhWcL35hNrP2/YTBD1qfF0Ovhawu0BxrDvPrS4WkuXVoknnxPMAZPVE9YhZLEUnuV4RQjfWe31gQ3UHFXEI7fmmFtepUTDWdmmfRPwM="; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
Thunderbird/52.2.1
In-Reply-To: <ok6e3o$egv$1@news.albasani.net>
Cancel-Lock: sha1:+8MUwDFiHDTsKwODjoPEGQ1VR3I=
View all headers

Am 13.07.2017 um 02:15 schrieb Karl.Frank:
> On 12.07.17 22:44, Mok-Kong Shen wrote:
>> Am 12.07.2017 um 18:44 schrieb Karl.Frank:
>>> On 12.07.17 17:37, Mok-Kong Shen wrote:
>>>> Am 11.07.2017 um 22:01 schrieb William Unruh:
>>>>> You are repeating yourself. Do you think that if you say it three
>>>>> times
>>>>> (as with the Bellman) it will suddenly become worthwhile?
>>>>> As I have said, this is a horrible scheme. text has many long range
>>>>> correlations (from charater pairs to paragraphs, etc) , which would
>>>>> mess up the random stream. (make it non-random).
>>>>> Bad idea.
>>>>> And you might want to look at what Shannon and others actually did.
>>>>>
>>>>> Note that even if the letters really were completely random, your
>>>>> method
>>>>> of combining them would make the output non-random.
>>>>
>>>> See the reference I gave of the paper about entropy and the test
>>>> statistic of Maurer's test.
>>>>
>>> Did it ever occur to you that verifying randomness only by the Maurer
>>> test is not sufficient?
>>>
>>> What about ENT, test for bias or, much more important, Pierre L'Ecuyer's
>>> TestU01 suite?
>>>
>>> In the past I have already demonstrated that one of your PRNG's, namely
>>> PERMPOLYPRNG which passed the Maurer test, is massively flawed.
>>
>> The unfortunate situation with PRN generation in general is that there
>> are lots of different tests. I don't have expertise in such and use just
>> one test for the sake of convenience. Further, my targeted users, the
>> common people who need security protection of their personal
>> communications, have only very limited volumes, so cryptanalytical risks
>> associated with assumptions of large volumes of encrypted materials are
>> not intimidating for them IMHO.
>>
>> M. K. Shen
>
> It is not an unfortunate situation. In contrast these test suites are of
> great help in revealing weak or even totally useless PRNG's for the
> common people - let alone in terms of cryptography.
>
> So now you're promoting another cryptographic scheme for the obfuscation
> of your little sisters diary? - as Bruce Schneier called it once.

If the volume of materials available for analyze is small, then
exploiting tiny biases would be more difficult, isn't it?

Views could indeed be entirely different. Schneier demanded also that
one who is interested in crypto should first be proficient in analyzing
the diverse classical schemes. If everyone follows that advice, I am
quite sure that a non-trivial percentage of persons currently in the
crypto groups would have been absent because they haven't yet been able
to finish the work that they are required to do.

M. K. Shen

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Karl.Frank
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 09:39 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: Karl.Frank@Freecx.co.uk (Karl.Frank)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality pseudo-random
sequences in practice
Date: Thu, 13 Jul 2017 11:39:40 +0200
Organization: albasani.net
Lines: 75
Message-ID: <ok7f4t$a4b$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me> <ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net> <ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net> <ok74e6$63o$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net GzVGOmPh7aQSWBMdRAwmtlHEk54imSUqTeOzvxxA8tNJI2jDbjyiuraJoAxIGGybzQLDhcUQKR/IMpLm8WrRnlFM6BG3UVNMcCZvjKWE+SpRm36BIHFZOKy7Pybiw0nx
NNTP-Posting-Date: Thu, 13 Jul 2017 09:39:41 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="v/CKcl8Vov0mdwf5YvAg+mGFA1wlJxOr6NHNvW9ieu62zZZdtU/6S0dfJfyJ8AnNoLwu0/MIUCtedMRUuhLCoHwb9axYmuhHzsUW6Tu3+x/Fxn1FqN0SH9RQ9zAARYIA"; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.0
In-Reply-To: <ok74e6$63o$1@news.albasani.net>
Cancel-Lock: sha1:4Xii3CR57KFBfeQHnw31m767Qq0=
View all headers

On 13.07.17 08:36, Mok-Kong Shen wrote:
> Am 13.07.2017 um 02:15 schrieb Karl.Frank:
>> On 12.07.17 22:44, Mok-Kong Shen wrote:
>>> Am 12.07.2017 um 18:44 schrieb Karl.Frank:
>>>> On 12.07.17 17:37, Mok-Kong Shen wrote:
>>>>> Am 11.07.2017 um 22:01 schrieb William Unruh:
>>>>>> You are repeating yourself. Do you think that if you say it three
>>>>>> times
>>>>>> (as with the Bellman) it will suddenly become worthwhile?
>>>>>> As I have said, this is a horrible scheme. text has many long range
>>>>>> correlations (from charater pairs to paragraphs, etc) , which would
>>>>>> mess up the random stream. (make it non-random).
>>>>>> Bad idea.
>>>>>> And you might want to look at what Shannon and others actually did.
>>>>>>
>>>>>> Note that even if the letters really were completely random, your
>>>>>> method
>>>>>> of combining them would make the output non-random.
>>>>>
>>>>> See the reference I gave of the paper about entropy and the test
>>>>> statistic of Maurer's test.
>>>>>
>>>> Did it ever occur to you that verifying randomness only by the Maurer
>>>> test is not sufficient?
>>>>
>>>> What about ENT, test for bias or, much more important, Pierre
>>>> L'Ecuyer's
>>>> TestU01 suite?
>>>>
>>>> In the past I have already demonstrated that one of your PRNG's, namely
>>>> PERMPOLYPRNG which passed the Maurer test, is massively flawed.
>>>
>>> The unfortunate situation with PRN generation in general is that there
>>> are lots of different tests. I don't have expertise in such and use just
>>> one test for the sake of convenience. Further, my targeted users, the
>>> common people who need security protection of their personal
>>> communications, have only very limited volumes, so cryptanalytical risks
>>> associated with assumptions of large volumes of encrypted materials are
>>> not intimidating for them IMHO.
>>>
>>> M. K. Shen
>>
>> It is not an unfortunate situation. In contrast these test suites are of
>> great help in revealing weak or even totally useless PRNG's for the
>> common people - let alone in terms of cryptography.
>>
>> So now you're promoting another cryptographic scheme for the obfuscation
>> of your little sisters diary? - as Bruce Schneier called it once.
>
> If the volume of materials available for analyze is small, then
> exploiting tiny biases would be more difficult, isn't it?
>
Depending on how heavy the bias of the PRNG in question is. You might
notice that the most recent break of RC4 was basically managed with very
tiny ciphertexts.

> Views could indeed be entirely different. Schneier demanded also that
> one who is interested in crypto should first be proficient in analyzing
> the diverse classical schemes. If everyone follows that advice, I am
> quite sure that a non-trivial percentage of persons currently in the
> crypto groups would have been absent because they haven't yet been able
> to finish the work that they are required to do.
>
This would hold mostly true for you then.

> M. K. Shen
>

--
cHNiMUBACG0HAAAAAAAAAAAAAABIZVbDdKVM0w1kM9vxQHw+bkLxsY/Z0czY0uv8/Ks6WULxJVua
zjvpoYvtEwDVhP7RGTCBVlzZ+VBWPHg5rqmKWvtzsuVmMSDxAIS6Db6YhtzT+RStzoG9ForBcG8k
G97Q3Jml/aBun8Kyf+XOBHpl5gNW4YqhiM0=

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Mok-Kong Shen
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 11:29 UTC
References: 1 2 3 4 5 6 7 8
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: mok-kong.shen@t-online.de (Mok-Kong Shen)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Thu, 13 Jul 2017 13:29:17 +0200
Organization: albasani.net
Lines: 93
Message-ID: <ok7lie$p6v$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me>
<ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net>
<ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net>
<ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net YQmxtCrVVTdGEP/pVt7Hn8A8epNp0qoldUFNFnVvP53xGJsXodv9Lt0B/WBKo4fKOGzqNf5Ftpwv81Jtvp38INQ/G28yNuKe6SMYitWyAUoEhZOvTKxYwDa5Dq49QNsr
NNTP-Posting-Date: Thu, 13 Jul 2017 11:29:18 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="L0EMZVYz4q54gxAFX83WORwxv0m5AVjvwpAgG8Ai7hFucjsD7eQDvX4BcCnVGvbY67ezUktndsoxEg+yq9GRTpv8r+3MprpjhEZsSW1OsJmI51y/KQNGTyIZTFoS0ShPziGdY9Pn3AtkNL8/8VqncsOeshVvlDCwQI2I8Qw3foo="; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
Thunderbird/52.2.1
In-Reply-To: <ok7f4t$a4b$1@news.albasani.net>
Cancel-Lock: sha1:Ru2UCOBQlwiLbkR0vUHrRyrvz9U=
View all headers

Am 13.07.2017 um 11:39 schrieb Karl.Frank:
> On 13.07.17 08:36, Mok-Kong Shen wrote:
>> Am 13.07.2017 um 02:15 schrieb Karl.Frank:
>>> On 12.07.17 22:44, Mok-Kong Shen wrote:
>>>> Am 12.07.2017 um 18:44 schrieb Karl.Frank:
>>>>> On 12.07.17 17:37, Mok-Kong Shen wrote:
>>>>>> Am 11.07.2017 um 22:01 schrieb William Unruh:
>>>>>>> You are repeating yourself. Do you think that if you say it three
>>>>>>> times
>>>>>>> (as with the Bellman) it will suddenly become worthwhile?
>>>>>>> As I have said, this is a horrible scheme. text has many long range
>>>>>>> correlations (from charater pairs to paragraphs, etc) , which would
>>>>>>> mess up the random stream. (make it non-random).
>>>>>>> Bad idea.
>>>>>>> And you might want to look at what Shannon and others actually did.
>>>>>>>
>>>>>>> Note that even if the letters really were completely random, your
>>>>>>> method
>>>>>>> of combining them would make the output non-random.
>>>>>>
>>>>>> See the reference I gave of the paper about entropy and the test
>>>>>> statistic of Maurer's test.
>>>>>>
>>>>> Did it ever occur to you that verifying randomness only by the Maurer
>>>>> test is not sufficient?
>>>>>
>>>>> What about ENT, test for bias or, much more important, Pierre
>>>>> L'Ecuyer's
>>>>> TestU01 suite?
>>>>>
>>>>> In the past I have already demonstrated that one of your PRNG's,
>>>>> namely
>>>>> PERMPOLYPRNG which passed the Maurer test, is massively flawed.
>>>>
>>>> The unfortunate situation with PRN generation in general is that there
>>>> are lots of different tests. I don't have expertise in such and use
>>>> just
>>>> one test for the sake of convenience. Further, my targeted users, the
>>>> common people who need security protection of their personal
>>>> communications, have only very limited volumes, so cryptanalytical
>>>> risks
>>>> associated with assumptions of large volumes of encrypted materials are
>>>> not intimidating for them IMHO.
>>>>
>>>> M. K. Shen
>>>
>>> It is not an unfortunate situation. In contrast these test suites are of
>>> great help in revealing weak or even totally useless PRNG's for the
>>> common people - let alone in terms of cryptography.
>>>
>>> So now you're promoting another cryptographic scheme for the obfuscation
>>> of your little sisters diary? - as Bruce Schneier called it once.
>>
>> If the volume of materials available for analyze is small, then
>> exploiting tiny biases would be more difficult, isn't it?
>>
> Depending on how heavy the bias of the PRNG in question is. You might
> notice that the most recent break of RC4 was basically managed with very
> tiny ciphertexts.

I don't yet know that recent break. How tiny? Could you give a
reference?

BTW, you wrote earlier:
"In the past I have already demonstrated that one of your PRNG's,
namely PERMPOLYPRNG which passed the Maurer test, is massively flawed."
The latest version of that software is 3.1, so at least its first
version was fairly unsatisfactory even to myself. However, all the
revisions were based on thoughts of myself, not of any other person. It
can certainly not be excluded that even the latest version may indeed
be "massively flawed". But where is your "demonstration"?? I just
checked and found that the thread in the group where PERMPOLYPRNG is
published is exceptionally short and all posts in it were from me and
not from any other person.

M. K. Shen
>
>
>> Views could indeed be entirely different. Schneier demanded also that
>> one who is interested in crypto should first be proficient in analyzing
>> the diverse classical schemes. If everyone follows that advice, I am
>> quite sure that a non-trivial percentage of persons currently in the
>> crypto groups would have been absent because they haven't yet been able
>> to finish the work that they are required to do.
>>
> This would hold mostly true for you then.
>
>
>> M. K. Shen
>>
>
>

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Karl.Frank
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 12:08 UTC
References: 1 2 3 4 5 6 7 8 9
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: Karl.Frank@Freecx.co.uk (Karl.Frank)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality pseudo-random
sequences in practice
Date: Thu, 13 Jul 2017 14:08:11 +0200
Organization: albasani.net
Lines: 130
Message-ID: <ok7nrc$j9a$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me> <ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net> <ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net> <ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net> <ok7lie$p6v$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net NaxUON0xXAjzK5QwEFhhPwrGOk9pz2tH65490G4ziGP81GXctKcatOO2ADGj14JLQR6/FTfY7CG/6Gmm4xKJ2hAGEoAd+Tc7n+o0LJBgcI8UPgPszCvOXt0/l73jOJp9
NNTP-Posting-Date: Thu, 13 Jul 2017 12:08:12 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="O2OdXttDCUKvRL8MUmaekI4jrWDGnGbPKdYXuFHsdk2hjrti0LRJEFIx5fW5S+x4S5ui9jlZhDkB0SdJgZzVHCfBFVMV2vWPe0CgjYICG42D6XzUbydcxF81gsVELfDV"; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.0
In-Reply-To: <ok7lie$p6v$1@news.albasani.net>
Cancel-Lock: sha1:rC80XUgs+bN8CGcQLNo7wLZ9GR0=
View all headers

On 13.07.17 13:29, Mok-Kong Shen wrote:
> Am 13.07.2017 um 11:39 schrieb Karl.Frank:
>> On 13.07.17 08:36, Mok-Kong Shen wrote:
>>> Am 13.07.2017 um 02:15 schrieb Karl.Frank:
>>>> On 12.07.17 22:44, Mok-Kong Shen wrote:
>>>>> Am 12.07.2017 um 18:44 schrieb Karl.Frank:
>>>>>> On 12.07.17 17:37, Mok-Kong Shen wrote:
>>>>>>> Am 11.07.2017 um 22:01 schrieb William Unruh:
>>>>>>>> You are repeating yourself. Do you think that if you say it three
>>>>>>>> times
>>>>>>>> (as with the Bellman) it will suddenly become worthwhile?
>>>>>>>> As I have said, this is a horrible scheme. text has many long range
>>>>>>>> correlations (from charater pairs to paragraphs, etc) , which would
>>>>>>>> mess up the random stream. (make it non-random).
>>>>>>>> Bad idea.
>>>>>>>> And you might want to look at what Shannon and others actually did.
>>>>>>>>
>>>>>>>> Note that even if the letters really were completely random, your
>>>>>>>> method
>>>>>>>> of combining them would make the output non-random.
>>>>>>>
>>>>>>> See the reference I gave of the paper about entropy and the test
>>>>>>> statistic of Maurer's test.
>>>>>>>
>>>>>> Did it ever occur to you that verifying randomness only by the Maurer
>>>>>> test is not sufficient?
>>>>>>
>>>>>> What about ENT, test for bias or, much more important, Pierre
>>>>>> L'Ecuyer's
>>>>>> TestU01 suite?
>>>>>>
>>>>>> In the past I have already demonstrated that one of your PRNG's,
>>>>>> namely
>>>>>> PERMPOLYPRNG which passed the Maurer test, is massively flawed.
>>>>>
>>>>> The unfortunate situation with PRN generation in general is that there
>>>>> are lots of different tests. I don't have expertise in such and use
>>>>> just
>>>>> one test for the sake of convenience. Further, my targeted users, the
>>>>> common people who need security protection of their personal
>>>>> communications, have only very limited volumes, so cryptanalytical
>>>>> risks
>>>>> associated with assumptions of large volumes of encrypted materials
>>>>> are
>>>>> not intimidating for them IMHO.
>>>>>
>>>>> M. K. Shen
>>>>
>>>> It is not an unfortunate situation. In contrast these test suites
>>>> are of
>>>> great help in revealing weak or even totally useless PRNG's for the
>>>> common people - let alone in terms of cryptography.
>>>>
>>>> So now you're promoting another cryptographic scheme for the
>>>> obfuscation
>>>> of your little sisters diary? - as Bruce Schneier called it once.
>>>
>>> If the volume of materials available for analyze is small, then
>>> exploiting tiny biases would be more difficult, isn't it?
>>>
>> Depending on how heavy the bias of the PRNG in question is. You might
>> notice that the most recent break of RC4 was basically managed with very
>> tiny ciphertexts.
>
> I don't yet know that recent break. How tiny? Could you give a
> reference?
>
Just tiny short 16-character cookies.

http://www.rc4nomore.com/

http://www.youtube.com/watch?v=d8MtmKrXlKQ

http://www.rc4nomore.com/vanhoef-usenix2015.pdf

> BTW, you wrote earlier:
> "In the past I have already demonstrated that one of your PRNG's,
> namely PERMPOLYPRNG which passed the Maurer test, is massively flawed."
> The latest version of that software is 3.1, so at least its first
> version was fairly unsatisfactory even to myself. However, all the
> revisions were based on thoughts of myself, not of any other person. It
> can certainly not be excluded that even the latest version may indeed
> be "massively flawed". But where is your "demonstration"?? I just
> checked and found that the thread in the group where PERMPOLYPRNG is
> published is exceptionally short and all posts in it were from me and
> not from any other person.
>
Over here are some visual results displaying the massive bias as well as
the source code and test tools used
http://www.freecx.co.uk/crypto/cryptanalysis/PERMPOLYPRNG/

Especially these two images are mostly interesting in regards of
displaying the bias

http://www.freecx.co.uk/crypto/cryptanalysis/PERMPOLYPRNG/permpolyprng_1MB.bin_rnd.jpg

http://www.freecx.co.uk/crypto/cryptanalysis/PERMPOLYPRNG/permpolyprng_4MB.bin_rnd.jpg

The original posting is over here
http://s13.zetaboards.com/Crypto/single/?p=8045140&t=7392575

> M. K. Shen
>>
>>
>>> Views could indeed be entirely different. Schneier demanded also that
>>> one who is interested in crypto should first be proficient in analyzing
>>> the diverse classical schemes. If everyone follows that advice, I am
>>> quite sure that a non-trivial percentage of persons currently in the
>>> crypto groups would have been absent because they haven't yet been able
>>> to finish the work that they are required to do.
>>>
>> This would hold mostly true for you then.
>>
>>
>>> M. K. Shen
>>>
>>
>>
>

--
cHNiMUBACG0HAAAAAAAAAAAAAABIZVbDdKVM0w1kM9vxQHw+bkLxsY/Z0czY0uv8/Ks6WULxJVua
zjvpoYvtEwDVhP7RGTCBVlzZ+VBWPHg5rqmKWvtzsuVmMSDxAIS6Db6YhtzT+RStzoG9ForBcG8k
G97Q3Jml/aBun8Kyf+XOBHpl5gNW4YqhiM0=

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Mok-Kong Shen
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 14:04 UTC
References: 1 2 3 4 5 6 7 8 9 10
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: mok-kong.shen@t-online.de (Mok-Kong Shen)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Thu, 13 Jul 2017 16:04:48 +0200
Organization: albasani.net
Lines: 158
Message-ID: <ok7ulv$p9$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me>
<ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net>
<ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net>
<ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net>
<ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net z9ssYj5S4kWPcyFLeAstMXjHSMaD8AX0xo8y4CN9cqzhnq0o5luf4WTO7mx+8qGfCgmTnqPkiBnB3/f+RkUALEH0t8tbONFj2iTH5/BddlYzzyJ3JfjmXC8TlGV/k5pV
NNTP-Posting-Date: Thu, 13 Jul 2017 14:04:47 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="xH5pbclw6XQ1usNgsAkGi1PJFQDORTW5IcjcGNhKEBwtewvo7vIWHgZcsc+x2lr9+DqCrJxUJMztrzI3GjraIGFo6m2fAYZ2cAZzDQLsUp3qzaT4S3LHwId9CxIM4V0JNUiwDlxL+SA1YWV3CSm8WRvZuQ5bgkcDSMzy0dhWQDs="; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
Thunderbird/52.2.1
In-Reply-To: <ok7nrc$j9a$1@news.albasani.net>
Cancel-Lock: sha1:Vuy1lJfuCiatsAN9bPZSrbxj4P8=
View all headers

Am 13.07.2017 um 14:08 schrieb Karl.Frank:
> On 13.07.17 13:29, Mok-Kong Shen wrote:
>> Am 13.07.2017 um 11:39 schrieb Karl.Frank:
>>> On 13.07.17 08:36, Mok-Kong Shen wrote:
>>>> Am 13.07.2017 um 02:15 schrieb Karl.Frank:
>>>>> On 12.07.17 22:44, Mok-Kong Shen wrote:
>>>>>> Am 12.07.2017 um 18:44 schrieb Karl.Frank:
>>>>>>> On 12.07.17 17:37, Mok-Kong Shen wrote:
>>>>>>>> Am 11.07.2017 um 22:01 schrieb William Unruh:
>>>>>>>>> You are repeating yourself. Do you think that if you say it three
>>>>>>>>> times
>>>>>>>>> (as with the Bellman) it will suddenly become worthwhile?
>>>>>>>>> As I have said, this is a horrible scheme. text has many long
>>>>>>>>> range
>>>>>>>>> correlations (from charater pairs to paragraphs, etc) , which
>>>>>>>>> would
>>>>>>>>> mess up the random stream. (make it non-random).
>>>>>>>>> Bad idea.
>>>>>>>>> And you might want to look at what Shannon and others actually
>>>>>>>>> did.
>>>>>>>>>
>>>>>>>>> Note that even if the letters really were completely random, your
>>>>>>>>> method
>>>>>>>>> of combining them would make the output non-random.
>>>>>>>>
>>>>>>>> See the reference I gave of the paper about entropy and the test
>>>>>>>> statistic of Maurer's test.
>>>>>>>>
>>>>>>> Did it ever occur to you that verifying randomness only by the
>>>>>>> Maurer
>>>>>>> test is not sufficient?
>>>>>>>
>>>>>>> What about ENT, test for bias or, much more important, Pierre
>>>>>>> L'Ecuyer's
>>>>>>> TestU01 suite?
>>>>>>>
>>>>>>> In the past I have already demonstrated that one of your PRNG's,
>>>>>>> namely
>>>>>>> PERMPOLYPRNG which passed the Maurer test, is massively flawed.
>>>>>>
>>>>>> The unfortunate situation with PRN generation in general is that
>>>>>> there
>>>>>> are lots of different tests. I don't have expertise in such and use
>>>>>> just
>>>>>> one test for the sake of convenience. Further, my targeted users, the
>>>>>> common people who need security protection of their personal
>>>>>> communications, have only very limited volumes, so cryptanalytical
>>>>>> risks
>>>>>> associated with assumptions of large volumes of encrypted materials
>>>>>> are
>>>>>> not intimidating for them IMHO.
>>>>>>
>>>>>> M. K. Shen
>>>>>
>>>>> It is not an unfortunate situation. In contrast these test suites
>>>>> are of
>>>>> great help in revealing weak or even totally useless PRNG's for the
>>>>> common people - let alone in terms of cryptography.
>>>>>
>>>>> So now you're promoting another cryptographic scheme for the
>>>>> obfuscation
>>>>> of your little sisters diary? - as Bruce Schneier called it once.
>>>>
>>>> If the volume of materials available for analyze is small, then
>>>> exploiting tiny biases would be more difficult, isn't it?
>>>>
>>> Depending on how heavy the bias of the PRNG in question is. You might
>>> notice that the most recent break of RC4 was basically managed with very
>>> tiny ciphertexts.
>>
>> I don't yet know that recent break. How tiny? Could you give a
>> reference?
>>
> Just tiny short 16-character cookies.
>
> http://www.rc4nomore.com/
>
> http://www.youtube.com/watch?v=d8MtmKrXlKQ
>
> http://www.rc4nomore.com/vanhoef-usenix2015.pdf
>
>
>> BTW, you wrote earlier:
>> "In the past I have already demonstrated that one of your PRNG's,
>> namely PERMPOLYPRNG which passed the Maurer test, is massively flawed."
>> The latest version of that software is 3.1, so at least its first
>> version was fairly unsatisfactory even to myself. However, all the
>> revisions were based on thoughts of myself, not of any other person. It
>> can certainly not be excluded that even the latest version may indeed
>> be "massively flawed". But where is your "demonstration"?? I just
>> checked and found that the thread in the group where PERMPOLYPRNG is
>> published is exceptionally short and all posts in it were from me and
>> not from any other person.
>>
> Over here are some visual results displaying the massive bias as well as
> the source code and test tools used
> http://www.freecx.co.uk/crypto/cryptanalysis/PERMPOLYPRNG/
>
> Especially these two images are mostly interesting in regards of
> displaying the bias
>
> http://www.freecx.co.uk/crypto/cryptanalysis/PERMPOLYPRNG/permpolyprng_1MB.bin_rnd.jpg
>
>
> http://www.freecx.co.uk/crypto/cryptanalysis/PERMPOLYPRNG/permpolyprng_4MB.bin_rnd.jpg
>
>
>
>
> The original posting is over here
> http://s13.zetaboards.com/Crypto/single/?p=8045140&t=7392575

Ok, I forgot that history, as it laid quite a time back. From the date
of that post of yours, you were testing version 1.0 not the later
versions.

I dont have the opinion that any crypto scheme be justified only by its
passing a single statistical test. When some other plausible reasoning
are available in the positive direction, then such a test gives in my
view substantial support for its goodness. Formal proof of security
would be ideal, but in practice that's a difficult to attain goal.
I can't remember/know now how much work I had spent to check version
1.0 with Maurer's test and whether I might have done mistakes there and
so any bad behavior of Version 1.0 should not be interpreted to be
non-sensitiveness of Maurer's test. In fact, in the current case of
TESTCOMBINE-SP, certain arguments seemed to indicate that its resulting
sequences would be fairly biased though Maurer's test came out always to
be ok and I started to doubt the sensitivity of Maurer's test. But, if
my later computations are correct, this can be explained by the fact
that the underlying factors of the said arguments turned out not to
be strong enough in their influence in practice and hence Maurer's test
can't be blamed in that context.

M. K. Shen
>
>
>
>> M. K. Shen
>>>
>>>
>>>> Views could indeed be entirely different. Schneier demanded also that
>>>> one who is interested in crypto should first be proficient in analyzing
>>>> the diverse classical schemes. If everyone follows that advice, I am
>>>> quite sure that a non-trivial percentage of persons currently in the
>>>> crypto groups would have been absent because they haven't yet been able
>>>> to finish the work that they are required to do.
>>>>
>>> This would hold mostly true for you then.
>>>
>>>
>>>> M. K. Shen
>>>>
>>>
>>>
>>
>
>

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Mok-Kong Shen
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 14:23 UTC
References: 1 2 3 4 5 6 7 8 9 10
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: mok-kong.shen@t-online.de (Mok-Kong Shen)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Thu, 13 Jul 2017 16:23:28 +0200
Organization: albasani.net
Lines: 9
Message-ID: <ok7vov$taq$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me>
<ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net>
<ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net>
<ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net>
<ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net 3KwQPdUzhNKPAGn+JAQaapSG2D8zcbnNyDDbLQtG24o87odDthbOpZkoioIxBy/2YpEer3vnI0mRWObbWtRTgJgD94J0Fm7oXi74AXMZnH56rQl9yqB9oM6hTBQy30Bu
NNTP-Posting-Date: Thu, 13 Jul 2017 14:23:27 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="EOi0jWuO433xlh6205xJelSz7hBohrQXPkJhf2aaw9v9G6hxthjQmImDUF6LbUuV0BsjUg0AoUInZHGIsn1tvWr88doWd69D+CoVhtueYmPn1iKaxSLmguxAo2592t5RUTZU2NUAkhjYuc3r5leFAunTEQyaKtnaWO5hNbVtTM4="; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
Thunderbird/52.2.1
In-Reply-To: <ok7nrc$j9a$1@news.albasani.net>
Cancel-Lock: sha1:IqfRXnkGBtjMS04mE15HVsUZc0U=
View all headers

Concerning the reference you gave of the break of RC-4, I read there
"Our attack is not limited to decrypting cookies. Any data or
information that is repeatedly encrypted can be recovered".

Do you know how much is this the special fault of RC-4? I mean, would
other PRNGs also be liable to that attack just as effectively?

M. K. Shen

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: William Unruh
Newsgroups: sci.crypt.random-numbers
Organization: A noiseless patient Spider
Date: Thu, 13 Jul 2017 15:40 UTC
References: 1 2 3 4 5 6 7 8 9 10 11
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: unruh@invalid.ca (William Unruh)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Thu, 13 Jul 2017 15:40:08 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <ok848o$dv7$1@dont-email.me>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me>
<ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net>
<ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net>
<ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net>
<ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net>
<ok7vov$taq$1@news.albasani.net>
Injection-Date: Thu, 13 Jul 2017 15:40:08 -0000 (UTC)
Injection-Info: mx02.eternal-september.org; posting-host="358b32350a030fd07570d963a3e57e7c";
logging-data="14311"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19qLYiJ5QLJF9kmBYekPuAX"
User-Agent: slrn/1.0.1 (Linux)
Cancel-Lock: sha1:6lqoNdldJ6RvoFTKzp9Ex6BMBj4=
View all headers

On 2017-07-13, Mok-Kong Shen <mok-kong.shen@t-online.de> wrote:
> Concerning the reference you gave of the break of RC-4, I read there
> "Our attack is not limited to decrypting cookies. Any data or
> information that is repeatedly encrypted can be recovered".
>
> Do you know how much is this the special fault of RC-4? I mean, would
> other PRNGs also be liable to that attack just as effectively?

It is in that case a fault of RC4. It had long been known that RC4 had
biases, especially in the first bytes that came out of RC4. These
attacks show that those biases are
useable in an attack. RC4 is broken.
Note that your scheme here seems to be using 4 text files as a "key" Ie,
to encrypt 1000 plaintexts you need to find 4000 different text fiels to
use, and you have to communicate to the recipient what those files are
without also telling the attacker what those files are. Plus as I said,
your ouput will have loads of biases in it simply because of hthe strong
long range correlations in any text file.

> M. K. Shen
>

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Karl.Frank
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 16:02 UTC
References: 1 2 3 4 5 6 7 8 9 10 11
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: Karl.Frank@Freecx.co.uk (Karl.Frank)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality pseudo-random
sequences in practice
Date: Thu, 13 Jul 2017 18:02:19 +0200
Organization: albasani.net
Lines: 200
Message-ID: <ok85ic$f00$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me> <ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net> <ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net> <ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net> <ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net> <ok7ulv$p9$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net wfEXGEpd55LRjXyFSqJ6pSBBGXAkiUlT8f9ixpN3RVar0Ap8mFwDvmu3xmt4Tvnvsqh/CRkxy1B6hyuGlXI2UhCP9tiqwRgFwmtAhPazUiD+83wIv8oszRmXFzGkwLpF
NNTP-Posting-Date: Thu, 13 Jul 2017 16:02:20 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="//xWMO+J0wU/Pr9ICMevJ6AoTh8UILZ6ytIcZ0b6JOdXFTo3SJ67kbZAlHPL8Et2yK7S5irRR9vLMO0EGlw6y2z6YUI+MRThc5OdSn+LmceUHetUs4N3XnkX+Kd2mbXi"; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.0
In-Reply-To: <ok7ulv$p9$1@news.albasani.net>
Cancel-Lock: sha1:nr7UpELYtsWnddTLmVJdnpE9iFc=
View all headers

On 13.07.17 16:04, Mok-Kong Shen wrote:
> Am 13.07.2017 um 14:08 schrieb Karl.Frank:
>> On 13.07.17 13:29, Mok-Kong Shen wrote:
>>> Am 13.07.2017 um 11:39 schrieb Karl.Frank:
>>>> On 13.07.17 08:36, Mok-Kong Shen wrote:
>>>>> Am 13.07.2017 um 02:15 schrieb Karl.Frank:
>>>>>> On 12.07.17 22:44, Mok-Kong Shen wrote:
>>>>>>> Am 12.07.2017 um 18:44 schrieb Karl.Frank:
>>>>>>>> On 12.07.17 17:37, Mok-Kong Shen wrote:
>>>>>>>>> Am 11.07.2017 um 22:01 schrieb William Unruh:
>>>>>>>>>> You are repeating yourself. Do you think that if you say it three
>>>>>>>>>> times
>>>>>>>>>> (as with the Bellman) it will suddenly become worthwhile?
>>>>>>>>>> As I have said, this is a horrible scheme. text has many long
>>>>>>>>>> range
>>>>>>>>>> correlations (from charater pairs to paragraphs, etc) , which
>>>>>>>>>> would
>>>>>>>>>> mess up the random stream. (make it non-random).
>>>>>>>>>> Bad idea.
>>>>>>>>>> And you might want to look at what Shannon and others actually
>>>>>>>>>> did.
>>>>>>>>>>
>>>>>>>>>> Note that even if the letters really were completely random, your
>>>>>>>>>> method
>>>>>>>>>> of combining them would make the output non-random.
>>>>>>>>>
>>>>>>>>> See the reference I gave of the paper about entropy and the test
>>>>>>>>> statistic of Maurer's test.
>>>>>>>>>
>>>>>>>> Did it ever occur to you that verifying randomness only by the
>>>>>>>> Maurer
>>>>>>>> test is not sufficient?
>>>>>>>>
>>>>>>>> What about ENT, test for bias or, much more important, Pierre
>>>>>>>> L'Ecuyer's
>>>>>>>> TestU01 suite?
>>>>>>>>
>>>>>>>> In the past I have already demonstrated that one of your PRNG's,
>>>>>>>> namely
>>>>>>>> PERMPOLYPRNG which passed the Maurer test, is massively flawed.
>>>>>>>
>>>>>>> The unfortunate situation with PRN generation in general is that
>>>>>>> there
>>>>>>> are lots of different tests. I don't have expertise in such and use
>>>>>>> just
>>>>>>> one test for the sake of convenience. Further, my targeted users,
>>>>>>> the
>>>>>>> common people who need security protection of their personal
>>>>>>> communications, have only very limited volumes, so cryptanalytical
>>>>>>> risks
>>>>>>> associated with assumptions of large volumes of encrypted materials
>>>>>>> are
>>>>>>> not intimidating for them IMHO.
>>>>>>>
>>>>>>> M. K. Shen
>>>>>>
>>>>>> It is not an unfortunate situation. In contrast these test suites
>>>>>> are of
>>>>>> great help in revealing weak or even totally useless PRNG's for the
>>>>>> common people - let alone in terms of cryptography.
>>>>>>
>>>>>> So now you're promoting another cryptographic scheme for the
>>>>>> obfuscation
>>>>>> of your little sisters diary? - as Bruce Schneier called it once.
>>>>>
>>>>> If the volume of materials available for analyze is small, then
>>>>> exploiting tiny biases would be more difficult, isn't it?
>>>>>
>>>> Depending on how heavy the bias of the PRNG in question is. You might
>>>> notice that the most recent break of RC4 was basically managed with
>>>> very
>>>> tiny ciphertexts.
>>>
>>> I don't yet know that recent break. How tiny? Could you give a
>>> reference?
>>>
>> Just tiny short 16-character cookies.
>>
>> http://www.rc4nomore.com/
>>
>> http://www.youtube.com/watch?v=d8MtmKrXlKQ
>>
>> http://www.rc4nomore.com/vanhoef-usenix2015.pdf
>>
>>
>>> BTW, you wrote earlier:
>>> "In the past I have already demonstrated that one of your PRNG's,
>>> namely PERMPOLYPRNG which passed the Maurer test, is massively flawed."
>>> The latest version of that software is 3.1, so at least its first
>>> version was fairly unsatisfactory even to myself. However, all the
>>> revisions were based on thoughts of myself, not of any other person. It
>>> can certainly not be excluded that even the latest version may indeed
>>> be "massively flawed". But where is your "demonstration"?? I just
>>> checked and found that the thread in the group where PERMPOLYPRNG is
>>> published is exceptionally short and all posts in it were from me and
>>> not from any other person.
>>>
>> Over here are some visual results displaying the massive bias as well as
>> the source code and test tools used
>> http://www.freecx.co.uk/crypto/cryptanalysis/PERMPOLYPRNG/
>>
>> Especially these two images are mostly interesting in regards of
>> displaying the bias
>>
>> http://www.freecx.co.uk/crypto/cryptanalysis/PERMPOLYPRNG/permpolyprng_1MB.bin_rnd.jpg
>>
>>
>> http://www.freecx.co.uk/crypto/cryptanalysis/PERMPOLYPRNG/permpolyprng_4MB.bin_rnd.jpg
>>
>>
>>
>>
>> The original posting is over here
>> http://s13.zetaboards.com/Crypto/single/?p=8045140&t=7392575
>
> Ok, I forgot that history, as it laid quite a time back. From the date
> of that post of yours, you were testing version 1.0 not the later
> versions.
>
> I dont have the opinion that any crypto scheme be justified only by its
> passing a single statistical test. When some other plausible reasoning
> are available in the positive direction, then such a test gives in my
> view substantial support for its goodness. Formal proof of security
> would be ideal, but in practice that's a difficult to attain goal.
> I can't remember/know now how much work I had spent to check version
> 1.0 with Maurer's test and whether I might have done mistakes there and
> so any bad behavior of Version 1.0 should not be interpreted to be
> non-sensitiveness of Maurer's test. In fact, in the current case of
> TESTCOMBINE-SP, certain arguments seemed to indicate that its resulting
> sequences would be fairly biased though Maurer's test came out always to
> be ok and I started to doubt the sensitivity of Maurer's test. But, if
> my later computations are correct, this can be explained by the fact
> that the underlying factors of the said arguments turned out not to
> be strong enough in their influence in practice and hence Maurer's test
> can't be blamed in that context.
>
Any PRNG used for cryptographic purpose *HAS* to *pass* *all* of these
very harsh and intense tests for randomness quality, especially TestU01
"crush" and "big crush". This is the first ever measurement that a PRNG
designer has to take very seriously. If a proposed CSPRNG does not pass
these test it has to be dropped or re-designed, because a *failure* of
these test *indicate* a *non-random* *output* no matter what one
believes are the plausible reasons why it would still be "sufficiently
random" for cryptographic purposes.

If you would read the mentioned thread from the beginning you will
realised that my intention on starting it was my critique that the
Maurer test is seemingly not reliable, as even the keystream output of
one of the most miserably designed cipher algorithms, namely the
Crystalline cipher, passes the Maurer test. This indicates in my view
the importance not to rely solely on this result but always run the
whole bunch of available test tools.

Just one example of the Crystalline output by the Maurer test
http://www.freecx.co.uk/crypto/cryptanalysis/Crystalline/maurer-test-result_10MB.txt

....and that's what the simple test for bias reveals
http://www.freecx.co.uk/crypto/cryptanalysis/Crystalline/bias-result_(8)_10MB.txt

Both test results are based on the same keystream.


Click here to read the complete article
Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Mok-Kong Shen
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 17:33 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: mok-kong.shen@t-online.de (Mok-Kong Shen)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Thu, 13 Jul 2017 19:33:10 +0200
Organization: albasani.net
Lines: 30
Message-ID: <ok8ask$2a3$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me>
<ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net>
<ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net>
<ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net>
<ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net>
<ok7vov$taq$1@news.albasani.net> <ok848o$dv7$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net m7fEQtWoTzGVOgD5b09De/Z0OjZ31OJf3T3P8uZ8gYw3oa/zZeYA4PrQvpax5iPqUWkDEqHDrCLMf+qcC7+LpIHeX4C2xIZjIehAdjCBTPtL624SP0/wco3V3hsQfAm8
NNTP-Posting-Date: Thu, 13 Jul 2017 17:33:08 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="WLUEIHdTbA5IsCBsCLOT9wQt8F6kP/JQvXQxS1jciY1PvnY6Pto56Hk/ZHu3scfDmRqCNumMXTury5g5KLaPIFmiQlKx3SjYXkxb1bepi1yD279LIz8sv3tniQvVl1/uWTzViqoMjm+MYHOSLWTUQRPXaa2V72unrc6bGX3nLWI="; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
Thunderbird/52.2.1
In-Reply-To: <ok848o$dv7$1@dont-email.me>
Cancel-Lock: sha1:Nxe2G/uenRLjMP+oqXll8GRRTmU=
View all headers

Am 13.07.2017 um 17:40 schrieb William Unruh:
> On 2017-07-13, Mok-Kong Shen <mok-kong.shen@t-online.de> wrote:
>> Concerning the reference you gave of the break of RC-4, I read there
>> "Our attack is not limited to decrypting cookies. Any data or
>> information that is repeatedly encrypted can be recovered".
>>
>> Do you know how much is this the special fault of RC-4? I mean, would
>> other PRNGs also be liable to that attack just as effectively?
>
> It is in that case a fault of RC4. It had long been known that RC4 had
> biases, especially in the first bytes that came out of RC4. These
> attacks show that those biases are
> useable in an attack. RC4 is broken.
> Note that your scheme here seems to be using 4 text files as a "key" Ie,
> to encrypt 1000 plaintexts you need to find 4000 different text fiels to
> use, and you have to communicate to the recipient what those files are
> without also telling the attacker what those files are. Plus as I said,
> your ouput will have loads of biases in it simply because of hthe strong
> long range correlations in any text file.

In fact I had also done a simple counting to see whether the least
significant bit of my particular encoding of input letters leads to
strong bias, for it seems that that bit could be sensitive. It turned
out that the ratio of counts of 0 to total counts varies for the
individual files are in the range of [0.52, 0.57}. When 2 files are
combined with xor this range is reduced. With 4 files the range is
reduced to almost exactly 0.5.

M. K. Shen

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Mok-Kong Shen
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 18:10 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: mok-kong.shen@t-online.de (Mok-Kong Shen)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Thu, 13 Jul 2017 20:10:28 +0200
Organization: albasani.net
Lines: 42
Message-ID: <ok8d2i$f19$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me>
<ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net>
<ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net>
<ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net>
<ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net>
<ok7ulv$p9$1@news.albasani.net> <ok85ic$f00$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net Z+gR9qHlr/swMpPG9JdsVvAOcz25OqX1I3vii0rcElzK2HbyRfKFTDlgrL9YSRgdZcm15gF1sRb6rHTO4CthWTLDfcKwYPqXzSEUajokF2AsRFJ2xg7pRldWArfacjPw
NNTP-Posting-Date: Thu, 13 Jul 2017 18:10:26 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="vJvlKH5y76eZ4uuCiSKtkJCTEuvFzMk9WQnphBnZyeCI5u6Em42lNRTXLiPShCbKqcRYOWUvUEhDkiMIjYsM7SEu9i8tcaY9gxHyuD1ehwLN9/gmQh+qNwdb5vzQ96k5A21CYrvCXhTmfW//sGZdnioyNt3ELmZkIJRcunk88lA="; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
Thunderbird/52.2.1
In-Reply-To: <ok85ic$f00$1@news.albasani.net>
Cancel-Lock: sha1:gzixgYWXjNXfhpF6foiHi3maMf0=
View all headers

Am 13.07.2017 um 18:02 schrieb Karl.Frank:

> Any PRNG used for cryptographic purpose *HAS* to *pass* *all* of these
> very harsh and intense tests for randomness quality, especially TestU01
> "crush" and "big crush". This is the first ever measurement that a PRNG
> designer has to take very seriously. If a proposed CSPRNG does not pass
> these test it has to be dropped or re-designed, because a *failure* of
> these test *indicate* a *non-random* *output* no matter what one
> believes are the plausible reasons why it would still be "sufficiently
> random" for cryptographic purposes.
>
> If you would read the mentioned thread from the beginning you will
> realised that my intention on starting it was my critique that the
> Maurer test is seemingly not reliable, as even the keystream output of
> one of the most miserably designed cipher algorithms, namely the
> Crystalline cipher, passes the Maurer test. This indicates in my view
> the importance not to rely solely on this result but always run the
> whole bunch of available test tools.
>
> Just one example of the Crystalline output by the Maurer test
> http://www.freecx.co.uk/crypto/cryptanalysis/Crystalline/maurer-test-result_10MB.txt
>
>
> ...and that's what the simple test for bias reveals
> http://www.freecx.co.uk/crypto/cryptanalysis/Crystalline/bias-result_(8)_10MB.txt
>
>
> Both test results are based on the same keystream.
>
> Not sure if the latest version of your PERMPOLYPRNG or TESTCOMBINE-SP
> would pass these test.

I know naturally that, if one employs more different kinds of tests,
that's anyway better than less and that this is in fact true for all
field of science. Long time ago I thought of the NIST test suite.
However, my OS is Windows and I read on Internet that there were some
difficulties to have that test suite run on Windows and dropped the
idea. Which good alternatives in your experience run on Windows
straightforwardly?

M. K. Shen

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Karl.Frank
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 18:32 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: Karl.Frank@Freecx.co.uk (Karl.Frank)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality pseudo-random
sequences in practice
Date: Thu, 13 Jul 2017 20:32:27 +0200
Organization: albasani.net
Lines: 61
Message-ID: <ok8ebs$p82$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me> <ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net> <ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net> <ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net> <ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net> <ok7ulv$p9$1@news.albasani.net> <ok85ic$f00$1@news.albasani.net> <ok8d2i$f19$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net 6qmrTPhqR3KMnCZbi7N9irDZnmA0Cg4JEJDGVyPZ7A9dycMpVX7t8xb5CnsxpXGGD+iwgA4nSdYo8Hn/ISlnv1q99yaF4ytOIOUoyMkPVr0ugJlKfAl3v4skq33BH/PH
NNTP-Posting-Date: Thu, 13 Jul 2017 18:32:28 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="1+4NkTzdi6EqhlawSgIiGxDcdOEp05Iwg1Dm8gFk7IzW0JbNAgcPZhkB2bIcVufepTgITIs6YyOECgUKBrJfNGaxDtOmmY0KI2HXgbtNnHkz9E1IjtPybP390jPgvH0Y"; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.0
In-Reply-To: <ok8d2i$f19$1@news.albasani.net>
Cancel-Lock: sha1:XYlBR6NILtSlTcHWHCHSuInD18I=
View all headers

On 13.07.17 20:10, Mok-Kong Shen wrote:
> Am 13.07.2017 um 18:02 schrieb Karl.Frank:
>
>> Any PRNG used for cryptographic purpose *HAS* to *pass* *all* of these
>> very harsh and intense tests for randomness quality, especially TestU01
>> "crush" and "big crush". This is the first ever measurement that a PRNG
>> designer has to take very seriously. If a proposed CSPRNG does not pass
>> these test it has to be dropped or re-designed, because a *failure* of
>> these test *indicate* a *non-random* *output* no matter what one
>> believes are the plausible reasons why it would still be "sufficiently
>> random" for cryptographic purposes.
>>
>> If you would read the mentioned thread from the beginning you will
>> realised that my intention on starting it was my critique that the
>> Maurer test is seemingly not reliable, as even the keystream output of
>> one of the most miserably designed cipher algorithms, namely the
>> Crystalline cipher, passes the Maurer test. This indicates in my view
>> the importance not to rely solely on this result but always run the
>> whole bunch of available test tools.
>>
>> Just one example of the Crystalline output by the Maurer test
>> http://www.freecx.co.uk/crypto/cryptanalysis/Crystalline/maurer-test-result_10MB.txt
>>
>>
>> ...and that's what the simple test for bias reveals
>> http://www.freecx.co.uk/crypto/cryptanalysis/Crystalline/bias-result_(8)_10MB.txt
>>
>>
>> Both test results are based on the same keystream.
>>
>> Not sure if the latest version of your PERMPOLYPRNG or TESTCOMBINE-SP
>> would pass these test.
>
> I know naturally that, if one employs more different kinds of tests,
> that's anyway better than less and that this is in fact true for all
> field of science. Long time ago I thought of the NIST test suite.
> However, my OS is Windows and I read on Internet that there were some
> difficulties to have that test suite run on Windows and dropped the
> idea. Which good alternatives in your experience run on Windows
> straightforwardly?
>
> M. K. Shen
>
I am not aware of any randomness test tool running straightforwardly on
Windows. However on the TestU01 website you'll find a description of
what the requirements are and how to install the test battery

http://simul.iro.umontreal.ca/testu01/install.html

In my opinion the installation of cygwin is mostly recommended as
it enables the Windows user the execution of all those different test
tools for *NIX/BSD

http://www.cygwin.com/

--
cHNiMUBACG0HAAAAAAAAAAAAAABIZVbDdKVM0w1kM9vxQHw+bkLxsY/Z0czY0uv8/Ks6WULxJVua
zjvpoYvtEwDVhP7RGTCBVlzZ+VBWPHg5rqmKWvtzsuVmMSDxAIS6Db6YhtzT+RStzoG9ForBcG8k
G97Q3Jml/aBun8Kyf+XOBHpl5gNW4YqhiM0=

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Karl.Frank
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 19:08 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: Karl.Frank@Freecx.co.uk (Karl.Frank)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality pseudo-random
sequences in practice
Date: Thu, 13 Jul 2017 21:08:17 +0200
Organization: albasani.net
Lines: 88
Message-ID: <ok8gf2$lk9$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me> <ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net> <ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net> <ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net> <ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net> <ok7vov$taq$1@news.albasani.net> <ok848o$dv7$1@dont-email.me> <ok8ask$2a3$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net PDCz9y0kcSMkL5MXO1BbL3/3cZ/0fkM+LtlsyO6kvUZiT+xD702t268cCKm4Oxtvpii0B0OuPf/nhuyF6rn2fwLukM+0pCFlMDmlhFQN/nx3rFkSVbLGcpWvOTR23+uo
NNTP-Posting-Date: Thu, 13 Jul 2017 19:08:18 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="QEURL3vcisWi6FELsP+7UKrRY0T8TP2kdktPnl+S3gtSpuwVAeKpQiVQuh0QJIjiFUN0ULXcARPuabbT25G86r1B8YcnaZkwGM1MH70dSbwF2pCeUQkisd1vonNtbm21"; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.0
In-Reply-To: <ok8ask$2a3$1@news.albasani.net>
Cancel-Lock: sha1:HTc2PrPscEvGVLf4bqwpsReIP6Y=
View all headers

On 13.07.17 19:33, Mok-Kong Shen wrote:
> Am 13.07.2017 um 17:40 schrieb William Unruh:
>> On 2017-07-13, Mok-Kong Shen <mok-kong.shen@t-online.de> wrote:
>>> Concerning the reference you gave of the break of RC-4, I read there
>>> "Our attack is not limited to decrypting cookies. Any data or
>>> information that is repeatedly encrypted can be recovered".
>>>
>>> Do you know how much is this the special fault of RC-4? I mean, would
>>> other PRNGs also be liable to that attack just as effectively?
>>
>> It is in that case a fault of RC4. It had long been known that RC4 had
>> biases, especially in the first bytes that came out of RC4. These
>> attacks show that those biases are
>> useable in an attack. RC4 is broken.
>> Note that your scheme here seems to be using 4 text files as a "key" Ie,
>> to encrypt 1000 plaintexts you need to find 4000 different text fiels to
>> use, and you have to communicate to the recipient what those files are
>> without also telling the attacker what those files are. Plus as I said,
>> your ouput will have loads of biases in it simply because of hthe strong
>> long range correlations in any text file.
>
> In fact I had also done a simple counting to see whether the least
> significant bit of my particular encoding of input letters leads to
> strong bias, for it seems that that bit could be sensitive. It turned
> out that the ratio of counts of 0 to total counts varies for the
> individual files are in the range of [0.52, 0.57}. When 2 files are
> combined with xor this range is reduced. With 4 files the range is
> reduced to almost exactly 0.5.
>
> M. K. Shen
>
Just counting the appearance of zeros and ones is not sufficient.
Important is how they are spread over the whole output. As an example
you might be interested in this particular explanation found on WikiPedia

Quote:
-------------------------------------------------------------------
These practical tests make it possible to compare the randomness of
strings. On probabilistic grounds, all strings of a given length have
the same randomness. However different strings have a different
Kolmogorov complexity. For example, consider the following two strings.

String 1:
0101010101010101010101010101010101010101010101010101010101010101

String 2:
1100100001100001110111101110110011111010010000100101011110010110

String 1 admits a short linguistic description, namely "32 repetitions
of '01'", which consists of 64 characters, and it can be efficiently
constructed out of some basis sequences. String 2 has no obvious simple
description other than writing down the string itself, which has 64
characters, and it has no comparably efficient basis function
representation. Using linear Hadamard spectral tests (see Hadamard
transform), the first of these sequences will be found to be of much
less randomness than the second one, which agrees with intuition.

https://en.wikipedia.org/wiki/Randomness_tests#Specific_tests_for_randomness
-------------------------------------------------------------------

As you can very easily determin String 1 is far from being random.

Of course there is the test for bit-wise statistics by Winston Rayburn
which a PRNG should obviously pass. But still it does only reveal if
there is some problematic deviance of the bit in a given file.

For instance if we look again on the bit-wise statistic result of the
before mentioned Crystalline cipher output we find a perfectly good
distribution of zeros and ones

http://www.freecx.co.uk/crypto/cryptanalysis/Crystalline/bitstat-result_10MB.txt

As you can see yourself, based on the Maurer test as well as on the bit
statistic it would lead us to the false conclusion that the output of
Crystalline is of perfect random quality.

However quick visual test soon reveals the disastrous output quality

http://www.freecx.co.uk/crypto/cryptanalysis/Crystalline/zero_4MB.bin.crystalline_rnd.jpg

http://www.freecx.co.uk/crypto/cryptanalysis/Crystalline/zero_10MB.bin.crystalline_rnd.jpg

--
cHNiMUBACG0HAAAAAAAAAAAAAABIZVbDdKVM0w1kM9vxQHw+bkLxsY/Z0czY0uv8/Ks6WULxJVua
zjvpoYvtEwDVhP7RGTCBVlzZ+VBWPHg5rqmKWvtzsuVmMSDxAIS6Db6YhtzT+RStzoG9ForBcG8k
G97Q3Jml/aBun8Kyf+XOBHpl5gNW4YqhiM0=

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Mok-Kong Shen
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 19:55 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13 14
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: mok-kong.shen@t-online.de (Mok-Kong Shen)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Thu, 13 Jul 2017 21:55:11 +0200
Organization: albasani.net
Lines: 14
Message-ID: <ok8j6u$e0o$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me>
<ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net>
<ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net>
<ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net>
<ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net>
<ok7vov$taq$1@news.albasani.net> <ok848o$dv7$1@dont-email.me>
<ok8ask$2a3$1@news.albasani.net> <ok8gf2$lk9$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net NUzINNKSy+XcuRai6Q6RtLa5CAiEM1gfiQaxfLwZsao7VaIrrsr/uKgvVQlTiPwDiQnAeHulblBiYiqUAI3ZDg==
NNTP-Posting-Date: Thu, 13 Jul 2017 19:55:10 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="H2m9gEKj+n71EH0DXBBFSJlMh2YRVniRuS03E9UPbhYRP3oExBaBoA0R29+Bx2pk3QRbu1UKq4mgRTAhz4COvWda3lkz4EIrRNtmkFKCUq1/J1jq8nCR0esUqQsM+ToC"; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
Thunderbird/52.2.1
In-Reply-To: <ok8gf2$lk9$1@news.albasani.net>
Cancel-Lock: sha1:8zrxineJejjqIPcA9/7pdngeHm0=
View all headers

Am 13.07.2017 um 21:08 schrieb Karl.Frank:

> Just counting the appearance of zeros and ones is not sufficient.
> Important is how they are spread over the whole output. As an example
> you might be interested in this particular explanation found on WikiPedia
[snip]

The correlation is to my knowledge commonly investigated with the
autocorrelation test. Maurer's test should in a sense be a superset
covering that test. To check that I'll code the autocorrelation test
and apply it to the result of my example and hope to be able to report
on that issue not later than tomorrow evening anyway.

M. K. Shen

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Karl.Frank
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 20:24 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: Karl.Frank@Freecx.co.uk (Karl.Frank)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality pseudo-random
sequences in practice
Date: Thu, 13 Jul 2017 22:24:37 +0200
Organization: albasani.net
Lines: 24
Message-ID: <ok8ku5$9mo$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me> <ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net> <ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net> <ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net> <ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net> <ok7vov$taq$1@news.albasani.net> <ok848o$dv7$1@dont-email.me> <ok8ask$2a3$1@news.albasani.net> <ok8gf2$lk9$1@news.albasani.net> <ok8j6u$e0o$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net U6f5nJaKQ30hhDR8Kirp0634DB72nchCVC/fQuirYpa+B0eWbYUR6PoL0K7g6BmmXObmLRLjRgYBAzn4+PG3dw==
NNTP-Posting-Date: Thu, 13 Jul 2017 20:24:37 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="WZENSdahs5zxcejy7EzjnY33kK7c/nvEYn3RmrDkTWr/kNFpu3a7ff7DAKKgd2SPMLMyof9Jr4R6fXoA9HROyePh6yDMAtf9YYwA2Cu4MuUEEuGti8+9B+1DsJ/mQK/5"; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.0
In-Reply-To: <ok8j6u$e0o$1@news.albasani.net>
Cancel-Lock: sha1:JGrzz30VJ3qxTCqDbbWzb4p6pTk=
View all headers

On 13.07.17 21:55, Mok-Kong Shen wrote:
> Am 13.07.2017 um 21:08 schrieb Karl.Frank:
>
>> Just counting the appearance of zeros and ones is not sufficient.
>> Important is how they are spread over the whole output. As an example
>> you might be interested in this particular explanation found on WikiPedia
> [snip]
>
> The correlation is to my knowledge commonly investigated with the
> autocorrelation test. Maurer's test should in a sense be a superset
> covering that test. To check that I'll code the autocorrelation test
> and apply it to the result of my example and hope to be able to report
> on that issue not later than tomorrow evening anyway.
>
> M. K. Shen

Perhaps you can upload a 1MB, a 4MB and a 10BM file of the output to
your website and post the link so I can give it a quick check.

--
cHNiMUBACG0HAAAAAAAAAAAAAABIZVbDdKVM0w1kM9vxQHw+bkLxsY/Z0czY0uv8/Ks6WULxJVua
zjvpoYvtEwDVhP7RGTCBVlzZ+VBWPHg5rqmKWvtzsuVmMSDxAIS6Db6YhtzT+RStzoG9ForBcG8k
G97Q3Jml/aBun8Kyf+XOBHpl5gNW4YqhiM0=

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Karl.Frank
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Thu, 13 Jul 2017 20:41 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: Karl.Frank@Freecx.co.uk (Karl.Frank)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality pseudo-random
sequences in practice
Date: Thu, 13 Jul 2017 22:41:08 +0200
Organization: albasani.net
Lines: 47
Message-ID: <ok8lt5$6rr$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me> <ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net> <ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net> <ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net> <ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net> <ok7vov$taq$1@news.albasani.net> <ok848o$dv7$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net bzJB7XKaJz2/7AwTaXxUk9Oj4Aj/nZkFdTpYZYRu9ywzNX20/INzeR4tmjwi/4xVGZ+crRohYmWmhEZFcT21Rg==
NNTP-Posting-Date: Thu, 13 Jul 2017 20:41:09 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="aUhH8zilFso2wN9g6uQ+gHqALrV+LDwYX29a7tZW/gMXfBrxZMhRSxcMnksVEpm+2aXoiciGnDLwz8rjdisQpMlv6qSDn2i8tMSw9e0iAfw+KPWJZjOT5t6w9jmrWw8U"; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.0
In-Reply-To: <ok848o$dv7$1@dont-email.me>
Cancel-Lock: sha1:jO81Z7FXJ3S4WgLsIdwMndKZ6FI=
View all headers

On 13.07.17 17:40, William Unruh wrote:
> On 2017-07-13, Mok-Kong Shen<mok-kong.shen@t-online.de> wrote:
>> Concerning the reference you gave of the break of RC-4, I read there
>> "Our attack is not limited to decrypting cookies. Any data or
>> information that is repeatedly encrypted can be recovered".
>>
>> Do you know how much is this the special fault of RC-4? I mean, would
>> other PRNGs also be liable to that attack just as effectively?
>
> It is in that case a fault of RC4. It had long been known that RC4 had
> biases, especially in the first bytes that came out of RC4. These
> attacks show that those biases are
> useable in an attack. RC4 is broken.
> Note that your scheme here seems to be using 4 text files as a "key" Ie,
> to encrypt 1000 plaintexts you need to find 4000 different text fiels to
> use, and you have to communicate to the recipient what those files are
> without also telling the attacker what those files are. Plus as I said,
> your ouput will have loads of biases in it simply because of hthe strong
> long range correlations in any text file.
>
>
This sounds like a generation of some sort of one-time-pad to me,
inheriting the key exchange problem as well as the necessity to keep
track of which files already used etc..., rendering it extremely useless
to the "common people" which it was originally designed for.

But regarding the bias I consider that it /might/ be possible to
generate a good pseudo-random encryption key if we would XOR four JPEG
files of nearly the same size and of which the header and footer is dropped.

Or even better, if we seed a regular PRNG and now cycle over these files
byte-wise, picking four byte based on four consecutive 8bit values drawn
from the PRNG on each step. Once we reached the end of the files we
start again at the top. Of course this implies a PRNG that has a very
long period and can be seeded with at least a 64bit seed. This way we
might share the four basic key files as innocent JPEG images.

>> M. K. Shen
>>

--
cHNiMUBACG0HAAAAAAAAAAAAAABIZVbDdKVM0w1kM9vxQHw+bkLxsY/Z0czY0uv8/Ks6WULxJVua
zjvpoYvtEwDVhP7RGTCBVlzZ+VBWPHg5rqmKWvtzsuVmMSDxAIS6Db6YhtzT+RStzoG9ForBcG8k
G97Q3Jml/aBun8Kyf+XOBHpl5gNW4YqhiM0=

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Karl.Frank
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Fri, 14 Jul 2017 09:32 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: Karl.Frank@Freecx.co.uk (Karl.Frank)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality pseudo-random
sequences in practice
Date: Fri, 14 Jul 2017 11:32:18 +0200
Organization: albasani.net
Lines: 71
Message-ID: <oka333$1go$1@news.albasani.net>
References: <ok25b3$c5g$4@news.albasani.net> <ok3ark$hqs$2@dont-email.me> <ok5fo6$os9$1@news.albasani.net> <ok5jlb$hgk$1@news.albasani.net> <ok61n1$fdj$1@news.albasani.net> <ok6e3o$egv$1@news.albasani.net> <ok74e6$63o$1@news.albasani.net> <ok7f4t$a4b$1@news.albasani.net> <ok7lie$p6v$1@news.albasani.net> <ok7nrc$j9a$1@news.albasani.net> <ok7vov$taq$1@news.albasani.net> <ok848o$dv7$1@dont-email.me> <ok8lt5$6rr$1@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net rwQ9RyjFDwnXpT2ZXvuOIFclXS7RX+5x0Wa6k28+aMtTxH4SkbOIpkfFKlVJLrj+NhFO/ZbtvzOxYc9JR36Euw==
NNTP-Posting-Date: Fri, 14 Jul 2017 09:32:19 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="0M82bB52F2We/RRCe9rTQBgNZUYVclrUDfBOZEneN3BUx6AC8QCGdh1d/iIW7vQuDas/hdta0UCRgd0E6PklFM7UD47a9BzinuhaJFJ2G03I+gQOZnKL9KSrFy+H+gvg"; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.0
In-Reply-To: <ok8lt5$6rr$1@news.albasani.net>
Cancel-Lock: sha1:udIUDrYkA2hrnso/ZGG/pp2h6Ek=
View all headers

On 13.07.17 22:41, Karl.Frank wrote:
> On 13.07.17 17:40, William Unruh wrote:
>> On 2017-07-13, Mok-Kong Shen<mok-kong.shen@t-online.de> wrote:
>>> Concerning the reference you gave of the break of RC-4, I read there
>>> "Our attack is not limited to decrypting cookies. Any data or
>>> information that is repeatedly encrypted can be recovered".
>>>
>>> Do you know how much is this the special fault of RC-4? I mean, would
>>> other PRNGs also be liable to that attack just as effectively?
>>
>> It is in that case a fault of RC4. It had long been known that RC4 had
>> biases, especially in the first bytes that came out of RC4. These
>> attacks show that those biases are
>> useable in an attack. RC4 is broken.
>> Note that your scheme here seems to be using 4 text files as a "key" Ie,
>> to encrypt 1000 plaintexts you need to find 4000 different text fiels to
>> use, and you have to communicate to the recipient what those files are
>> without also telling the attacker what those files are. Plus as I said,
>> your ouput will have loads of biases in it simply because of hthe strong
>> long range correlations in any text file.
>>
>>
> This sounds like a generation of some sort of one-time-pad to me,
> inheriting the key exchange problem as well as the necessity to keep
> track of which files already used etc..., rendering it extremely useless
> to the "common people" which it was originally designed for.
>
> But regarding the bias I consider that it /might/ be possible to
> generate a good pseudo-random encryption key if we would XOR four JPEG
> files of nearly the same size and of which the header and footer is
> dropped.
>
> Or even better, if we seed a regular PRNG and now cycle over these files
> byte-wise, picking four byte based on four consecutive 8bit values drawn
> from the PRNG on each step. Once we reached the end of the files we
> start again at the top. Of course this implies a PRNG that has a very
> long period and can be seeded with at least a 64bit seed. This way we
> might share the four basic key files as innocent JPEG images.
>
>
Sounds intriguing, doesn't it?

But does anybody realised why the above mentioned construct is a very
bad idea?

Just imaging the four key files were images having a very similar
motive, .i.e lost of blue sky. If we XOR them all those similar parts
would clearly eliminating the byte values making them all zero. And this
would lead to the ciphertext being exactly the plaintext with no
encryption at all.

And now imagine what would happen when you XOR text files. In my opinion
there is a great chance that you run into the same problem having no
encryption at all.

Additionally the range of possible byte value when XORing text files
might be extremely limited.

>
>>> M. K. Shen
>>>
>
>

--
cHNiMUBACG0HAAAAAAAAAAAAAABIZVbDdKVM0w1kM9vxQHw+bkLxsY/Z0czY0uv8/Ks6WULxJVua
zjvpoYvtEwDVhP7RGTCBVlzZ+VBWPHg5rqmKWvtzsuVmMSDxAIS6Db6YhtzT+RStzoG9ForBcG8k
G97Q3Jml/aBun8Kyf+XOBHpl5gNW4YqhiM0=

Subject: Re: A software for combining text files to obtain high quality pseudo-random sequences in practice
From: Mok-Kong Shen
Newsgroups: sci.crypt.random-numbers
Organization: albasani.net
Date: Fri, 14 Jul 2017 15:38 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!reader01.eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.albasani.net!.POSTED!not-for-mail
From: mok-kong.shen@t-online.de (Mok-Kong Shen)
Newsgroups: sci.crypt.random-numbers
Subject: Re: A software for combining text files to obtain high quality
pseudo-random sequences in practice
Date: Fri, 14 Jul 2017 17:38:32 +0200
Organization: albasani.net
Lines: 9
Message-ID: <ef0003d8-f750-488c-12fc-6e77d21ec10c@t-online.de>
References: <ok25b3$c5g$4@news.albasani.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: news.albasani.net kcOqsXSnvQx7rWMSTz4/PwmMYojK2JnM4nrqWFzwU0cuO0GG4t/xWZ0caivtUYCsHEWdg+hVkA7fHkHUOKWrl2kPwMmGslxssO3NVTm+2RrUOg9/YdMOnJXr+Y7Nu1wE
NNTP-Posting-Date: Fri, 14 Jul 2017 15:38:30 +0000 (UTC)
Injection-Info: news.albasani.net; logging-data="NNo77qlQgsbDaiPQUR7lZGmSAKqwRW21KmCIAeDSYVJRAUauav51bVs13ER0lw/FgTofw3Z46oiII7nH2FRbjTZFi4emHduNvMOYaQuSCoOETw/siann0xKB83jx5A6qQoyIXyBy4Z8rNCy+BtJ3WIodwf5cvAhvRZ4hZZcL9UQ="; mail-complaints-to="abuse@albasani.net"
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101
Thunderbird/52.2.1
Cc: Karl.Frank@Freecx.co.uk
In-Reply-To: <ok25b3$c5g$4@news.albasani.net>
Cancel-Lock: sha1:kYc2JarwKXghk/qi2ieCaSDA5cc=
View all headers

I am extremely sorry to say that I was unfortunately misled by some
erroneous
computations in the design stage such that I like to retract this software
(instead of attempting certain more complicated redesign) and sincerely ask
for pardon from readers of this thread for having wasted their precious
time.

M. K. Shen

1

rocksolid light 0.9.8
clearnet tor