this post was submitted on 13 Jul 2025
86 points (96.7% liked)

Technology

73619 readers
3750 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 4 comments
sorted by: hot top controversial new old
[–] adespoton@lemmy.ca 61 points 3 weeks ago (2 children)

For decades, many computer scientists have presumed that for practical purposes, the outputs of good hash functions are generally indistinguishable from genuine randomness — an assumption they call the random oracle model.

Er, no. The falsity of this is taught in virtually all first year CS courses.

Computer programmers and other IT workers? Sure… but hash functions have never been considered a substitute fore pure randomness.

That’s why we have a random generator in each computer based on thermal variance, I/O input, and other actually random features. And even then, we have to be careful not to hash the randomness out of the source data.

[–] GreenCrunch 37 points 3 weeks ago

Or, if you're more fun, a giant wall of lava lamps! The coolest randomness in town!

(Cloudflare does this)

[–] solrize@lemmy.ml 34 points 3 weeks ago* (last edited 3 weeks ago)

This isn't about random vs pseudorandom numbers, it's about the use of hashing in protocols that are provably secure under the random oracle model (ROM) but turn out to have problems anyway. It's a pretty near certainty that first year CS courses don't explain what the random oracle model is. But basically, there have been known attacks for decades against protocols intentionally designed to be vulnerable in the standard model while still secure in the ROM. This is the first time such an attack has been found against a real world protocol.

Matthew Green had an explainer a few months ago that was more detailed than the Quanta article while still being readable: https://blog.cryptographyengineering.com/2025/02/04/how-to-prove-false-statements-part-1/

Anyway it sounds like caution is warranted but "ZOMG the sky is falling" is overreaction.

[–] LodeMike 12 points 3 weeks ago* (last edited 3 weeks ago)

Can somebody TLDR and determine if there's any useful information in this article. I refuse to read quanta magazine.

Edit: link to paper: https://eprint.iacr.org/2025/118