asciilifeform: proposed item is that if using 1 stream, knowledge of a segment of plaintext gives you something valuable to work with; if using 2+ -- nothing☟︎
asciilifeform: ftr i dun particularly like this style of mechanism. it is suggested solely as continuation of the theme from linked thread, where 'make best of a cpu-poor situation with existing algos'
asciilifeform: proposed mechanism is applicable to 'stacking' any but the most screamingly rubbish prng. elementarily if the seeds are independent ( and they are, having been birthed from FG, ideally even from separate physical units ) the value of the streams at whatever index are also uncorrelated; and the xor will have period no shorter than of the longest period prng.
asciilifeform: after 3 generations of dried dog shit, quite conceivably the last actual crytoanalyst ate nagant 30yrs ago.
asciilifeform: i dun buy the 'no one has proven rsa to be hard so it dun matter how to implement it, let's use wet noodles and dried shit' argument.☟︎
asciilifeform: let's take however the variant where they all use same type of hash (e.g. keccak) but with independently FG-generated seeds. you still remove the i+i==H(i) known-relation problem.
asciilifeform: who said i had 1 much less n to offer with this recipe. i learn from the masters!11
asciilifeform: !~later tell mircea_popescu i had a thought re your http://btcbase.org/log/2017-10-06#1722036 algo : instead of one stream generator, have N independent ones (each with own seed, and not necessarily all same hash fn) running in parallel, xor together. every rsagram changes a seed in ONE of these at a time. strength is bought by sending rsagrams moar often☝︎
asciilifeform: for some reason folx always go around 'i will get rich'-ing and somehow never 'i will find my quicklime pit'
asciilifeform: phf: it was part of the fiction where 'no we didn't surrender to americans, your rape is a traditional ancient greek, dontchaknow, rape style, nuffin to do with usa'
asciilifeform: asciilifeform's relatives are ~all elderly emigre type and read volkischer beobachter and so naturally 100% of mention bitcoin is 'hey didja hear, that bitcoin thing finally HACKED!11!! soon valueless, president of imf proclaimed!' etc snoar
asciilifeform: phf: curious -- in what light brought up
asciilifeform: my current understanding is that the ethertardium etc folx today target moneyed orcs, rather than homo-mmmicus .
asciilifeform: they also have 'problem' of having been inoculated with mmm
asciilifeform: i saw a little reportage, it was interestingly the ~exact same spamcarnival as seen prev in usa & elsewhere. oddly ~no homegrown orc scamola .
asciilifeform: the ukrs did in fact recently put on some public spectacle where they hosted 'up and coming' shitcoinists, ethertards, et al
asciilifeform: plus another where 'Ukraine will be the first country in the world to legalize Bitcoin, Altcoins, Cryptobanks & ICO Trading. Be a part of history! Earn up to 20%...'
asciilifeform: it's the universal pattern. 1 of the half dozen or so basic hammers in their toolkit, along with 'unhappeneding', 'taiwaning', etc
asciilifeform: and naturally no koch speech is complete without a 'the web of trust, he feels, is inherently broken. It is only explicable to geeks, and not to all of them, it publishes a global social graph, because signatures on keys imply physical meetings on known dates, and it doesn't scale.'
asciilifeform: '...the timings from the RSA HSM showed that a doubling of the key length increased the time required to sign nearly six-fold, and the time for verification even more. The timings from the Ed25519 HSM were agreeably small (all sub-50ms).' << this is precious
asciilifeform: 'So instead he's moving toward ECC ciphers, which are well-researched — more so than RSA, according to Koch. '
asciilifeform: 'Koch then moved into Elliptic Curve Cryptography (ECC), which he discussed at some length. RSA, he said, is not likely to stay secure for much longer without really large keys. Support for 4096-bit RSA keys has been in GnuPG for some time, but Koch contends that real security will require 16Kb keys; that makes keys, fingerprints, and signatures all unusably long, particularly for embedded devices and hardware security modules (HSMs)
asciilifeform: quite impressive -- it is as if man survived garbage truck rolling over him
asciilifeform: we have a different wasp here, no more than half of this size, but one time i personally witnesses the seemingly impossible -- it rose up after stomped on with boot, and flew as if nothing happened