[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Entropy Estimator



At 12:19 AM 4/12/96 -0400, [email protected] wrote:

>I just added a feature to my entropy graphing program that 
>estimates the number of bits of entropy in the file,

Hey, that's just what I need.  I have these two 8-million byte 
files.  One is a recording made by a geiger counter, every bit 
is uncorrelated with anything else in the universe and each bit 
is equally likely to be a one or a zero.  The second file is an 
IDEA encryption of all the four-byte numbers 
from one to two-million.

Here's my problem.  I can't remember which file is which, and I've 
forgotten sixty-four bits of the key I used to produce the encrypted file.

That's where your technique come in.  The first file has sixty-four 
million bits of entropy.  The second file has only sixty-four bits 
of entropy, total (the missing key bits).  Surely, your technique can 
tell me which file is which.

Estimating entropy can be difficult, and I don't expect perfection.
But any measuring technique that is not a complete HOAX must be able 
to clearly find a difference of six orders of magnitude.  If you tried 
to give me a ruler that couldn't detect the difference between a 
millimeter and a kilometer, I might think you misunderstood 
something about the concept of distance.  If encouraged me to use a 
clock that could not measure the difference between a minute and a year, 
many would conclude that you were not an expert in chronology.

So, if your technique is worth anything at all, it should be able to 
accomplish this easy task.

PS.  I think it is your patriotic duty to report this technique to the 
Federal government.  They frequently need to distinguish between 
ciphertext and just plain random digits.  A breakthrough like this 
would have a major impact on national security.  They might be 
willing to remove ITAR restrictions from cryptography, out of 
gratitude to the cypherpunks.