[squeak-dev] Cryptography: Fortuna>>nextInt:
gazzaguru2 at btinternet.com
Tue Jul 6 17:19:10 UTC 2010
Well, wit as used by "old" Crypto package (3.9 era)... still useful in a
general sense to avoid blow-up for large requests.
Was just wondering if the current crypto use (prime generation) would run
into similar problems.
----- Original Message -----
From: "C. David Shaffer" <cdshaffer at acm.org>
To: <squeak-dev at lists.squeakfoundation.org>; "Squeak Cryptography"
<cryptography at lists.squeakfoundation.org>
Sent: Tuesday, July 06, 2010 5:52 PM
Subject: Re: [squeak-dev] Cryptography: Fortuna>>nextInt:
> On 07/06/10 12:05, Gary Chambers wrote:
>> Having dealt with rather large encryption keys (2048 bit) here's the
>> fix we've had for Random>>nextInt:
>> nextInt: anInteger
>> "Answer a random integer in the interval [1, anInteger].
>> Handle large numbers too (for cryptography)."
>> anInteger strictlyPositive ifFalse: [ self error: 'Range must be
>> positive' ].
>> anInteger asFloat isInfinite
>> ifTrue: [^(self next asFraction * anInteger) truncated + 1].
>> ^ (self next * anInteger) truncated + 1
>> Regards, Gary
> This looks like a proposed patch to the base image's Random.
> Cryptography doesn't use this random generator. Maybe this should be
> added to the source.squeak.org inbox?
More information about the Squeak-dev