Hacker News new | past | comments | ask | show | jobs | submit login

NIST is explicitly advocating its use in security applications.

I also have no trouble conceiving of a scenario in which the US government may want to make an invalid scientific paper appear valid.




At the bottom of the page:

    WARNING:
    DO NOT USE BEACON GENERATED
    VALUES AS SECRET
    CRYPTOGRAPHIC KEYS.
Can you point to where exactly do they advocate what you say?


I said "security", not "as secret cryptographic keys".

Am I the only one who read the entire page? There are three links prominently featured on the page under the "Uses" header:

http://www.nist.gov/itl/csd/ct/beacon-unpredict-sampling.cfm

http://www.nist.gov/itl/csd/ct/beacon-new-secure-auth-mechan...

http://www.nist.gov/itl/csd/ct/beacon-secure-multi-party-com...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: