Random: Difference between revisions
From Hackepedia
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''. This method is assumed to be pretty good. Weak randomness can often lead to the system compromisable. | Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''. This method is assumed to be pretty good, more on this at [[RFC]] 4086. Weak randomness can often lead to the system compromisable. | ||
=== Random sources === | === Random sources === | ||
Sound cards and their white noise are a good means of randomness. Some CPU's provide random number generators which the Operating System may use. Crypto-accelerating cards usually provide a source of randomness. | Sound cards and their white noise are a good means of randomness. Some CPU's provide random number generators which the Operating System may use. Crypto-accelerating cards usually provide a source of randomness. |
Revision as of 05:23, 10 October 2005
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces /dev/random, /dev/arandom and /dev/urandom. This method is assumed to be pretty good, more on this at RFC 4086. Weak randomness can often lead to the system compromisable.
Random sources
Sound cards and their white noise are a good means of randomness. Some CPU's provide random number generators which the Operating System may use. Crypto-accelerating cards usually provide a source of randomness.