Hacker News new | past | comments | ask | show | jobs | submit login

None of this helps you if the random number generated that created your key is compromised.



Even if you use different random number generators?


I suppose you could, yes. If you wanted to make all this happen algorithmically you'd end up with a super-sized key that was a concatenation of all the keys you generated for each of the sub-algorithms, where the sub-algorithms would each consume their respective key chunks.


You don't have to concatenate your keys, simply XORing the random bitstreams together works fine (my intuition says that XORing them would provide a stronger result).




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: