Random: Difference between revisions

From Hackepedia
Jump to navigationJump to search
No edit summary
 
No edit summary
Line 1: Line 1:
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''.  This method is assumed to be pretty good.  Weak randomness can often lead to the system compromisable.
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''.  This method is assumed to be pretty good, more on this at [[RFC]] 4086.  Weak randomness can often lead to the system compromisable.


=== Random sources ===
=== Random sources ===


Sound cards and their white noise are a good means of randomness.  Some CPU's provide random number generators which the Operating System may use.  Crypto-accelerating cards usually provide a source of randomness.
Sound cards and their white noise are a good means of randomness.  Some CPU's provide random number generators which the Operating System may use.  Crypto-accelerating cards usually provide a source of randomness.

Revision as of 05:23, 10 October 2005

Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces /dev/random, /dev/arandom and /dev/urandom. This method is assumed to be pretty good, more on this at RFC 4086. Weak randomness can often lead to the system compromisable.

Random sources

Sound cards and their white noise are a good means of randomness. Some CPU's provide random number generators which the Operating System may use. Crypto-accelerating cards usually provide a source of randomness.