X-Authentication-Info: Submitted using SMTP AUTH PLAIN at fep03-mail.bloor.is.net.cable.rogers.com from [24.112.191.113] using ID <david.gamey@rogers.com> at Thu, 21 Feb 2002 22:45:08 -0500
Errors-To: icon-group-errors@cs.arizona.edu
Status: RO
Well that really depends upon the application. Most (pseudo) random
number generators (PRNG) such as Icon/Unicon are intended for
applications such as simulations and games. There are volumes of
information about this available, such as Knuth's Semi-numerical
algorithms, and some good sites on random number generation. They
describe not only how to construct them and characteristics, but also
good tests or randomness. Simple tests include chi-squares of
distributions, correlations by plotting n-tuples of numbers in an
n-dimensional space and looking for patterns. There are also some more
advanced tests, such as the spectral test.
If memory servers, there was an article on the Icon generator in the
Analyst within the last four years or so. It has the odd (pardon the
pun in advance) characteristic that it produces two independant
repeating sequences depending upon it's input. Odd seeds produce one
sequence, even another. For more info see
http://www.cs.arizona.edu/icon/library/src/procs/random.icn which
CC: Benjamin Pharr <bnpharr@olemiss.edu>, icon-group@cs.arizona.edu
Subject: Re: Seeding the Random Number Generator (correction)
X-Authentication-Info: Submitted using SMTP AUTH PLAIN at fep01-mail.bloor.is.net.cable.rogers.com from [24.112.191.113] using ID <david.gamey@rogers.com> at Thu, 21 Feb 2002 22:49:53 -0500
Errors-To: icon-group-errors@cs.arizona.edu
Status: RO
Ooops. While Clint suggested this, I beleive that Ralph Griswold and/or
Gregg Townsend deserve original credit (since they wrote random.icn). My
CC: Benjamin Pharr <bnpharr@olemiss.edu>, icon-group@cs.arizona.edu
Subject: Re: Seeding the Random Number Generator (more on cryptographic PNRG's)
X-Authentication-Info: Submitted using SMTP AUTH PLAIN at fep02-mail.bloor.is.net.cable.rogers.com from [24.112.191.113] using ID <david.gamey@rogers.com> at Thu, 21 Feb 2002 23:02:43 -0500
Errors-To: icon-group-errors@cs.arizona.edu
Status: RO
I just found this in sci.crypt that might be of interest.
I'll stop (hopefully) before I'm guilty of too much information.
David
--------------------
Zeljko Vrba wrote:
>> Given a sequence of consecutive pseudo-random numbers and a known method
>> (e.g. linear congruential method), is it possible to recover the random
>> seed and how many (minimally) consecutive numbers from the sequence are needed
>> so that the seed can be determined uniquely?
>>
>> Any pointers to the subject are appreciated.
>
The difficulty of the problem depends on the details of the pseudo-random
number generating algorithm. For the case of linear congruential sequences,
I believe the original work was by J. Boyar and Donald Knuth --- a google
search on "boyar knuth" is fruitful. Another famously insecure PRNG is
the linear-feedback shift register, whose state can be found from a number
of output bits equal to the length of the register.
A cryptographically strong PRNG must have the property that knowing
past outputs and future outputs will not help to find present outputs.
Some good examples appear in the appendices of the FIPS 186
standard (http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf).
- Peter
p p e a r s o n (at) r c n (dot) c o m
From icon-group-sender Fri Feb 22 08:11:36 2002
Return-Path: <icon-group-sender>
Received: (from root@localhost)
by baskerville.CS.Arizona.EDU (8.11.1/8.11.1) id g1MFBT229341
for icon-group-addresses; Fri, 22 Feb 2002 08:11:29 -0700 (MST)
On Fri, 2002-08-02 at 12:21, Christopher Browne wrote:
...
> Something that can show off the features of Icon.
> Here are some suggestions...
> A HTML optimizer -- in fact this was the subject of a programming contest. You feed in an HTML stream, it verifies it and optimizes it (for example <b>something<b>yadayada</b></b> can be reduced).
...
Maybe we should enter one or more teams into this programming contest (http://icfpcontest.cse.ogi.edu/). This is the 5th year of the competitions, and even though I participated mostly by myself last year, it was great fun (in addition to great frustration at times). They offer prizes ranging from $100 to $1,000, but the biggest prize would be when "the contest judges agree to state at least once during the presentation of the awards that the winning team's programming language is 'the programming tool of choice for discriminating hackers.'" Anyway it would be some good PR.
Although I am just a middlin' Icon programmer, I have used it to good effect for utilities in the past, and think (memory fails me) that I used it for the contest last year. I see no problem with Icon holding its own against the other entries. I'll probably use it myself this year.
My $.02
Steve Graham
From icon-group-sender Mon Aug 5 09:09:08 2002
Return-Path: <icon-group-sender>
Received: (from root@localhost)
by baskerville.CS.Arizona.EDU (8.11.1/8.11.1) id g75G95w06084
for icon-group-addresses; Mon, 5 Aug 2002 09:09:05 -0700 (MST)
I've been reading icon's mailing list lately and, of course, I've read all about the wish list thread. Among the things suggested by Frank, he wrote about better interfacing to external programs (calling C from Icon) which is kinda awkward right now in Icon. The features itself works on the platforms it's been implemented, but the interface makes it itchy to sucessfully develop your own library.
Anyway, I was searching materials for some Icon things I've got to do and I found, in IPD236, the following change (section 2.5, other changes):
"The ability to configure Icon so that Icon procedures can
be called from a C program has been eliminated."
Two questions rose in my mind. First, why this yet desirable feature has been pulled out? Secondly, I was rather currious about it's implementation, probably found in version 8 of the source code, but I did *not* found any icon source code archives! If someone could point me out where I can obtain, let's say, v8 of the source code, please, email me.
regards,
ian
From icon-group-sender Mon Aug 12 09:23:05 2002
Return-Path: <icon-group-sender>
Received: (from root@localhost)
by baskerville.CS.Arizona.EDU (8.11.1/8.11.1) id g7CGN2w08668
for icon-group-addresses; Mon, 12 Aug 2002 09:23:02 -0700 (MST)