Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Seed restriction in profanity-brute-force #26

Open
purgenetik opened this issue Dec 4, 2024 · 0 comments
Open

Seed restriction in profanity-brute-force #26

purgenetik opened this issue Dec 4, 2024 · 0 comments

Comments

@purgenetik
Copy link

Hi to all expects!

I have the following question related to initial seed in Dispatcher::createSeed() method.

In the original profanity code, seed generation is implemented as

std::random_device rd;
std::mt19937_64 eng(rd());

and in the current brute-force code, this is changed to:

std::random_device rd;
uint seed = rd();
seed = (1 << 18) + (seed) % (1 << 18);
std::mt19937_64 eng(seed);

which compresses the original 2^32 phase-space to 2^19

Could somebody explain, for what purpose it is done, and how is it then stated that we generate “all public keys using the profanity method” if squeezed phase space is used for initial seed generation in brute-force code in comparasion with original code?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant