Random: Difference between revisions

From Hackepedia
Jump to navigationJump to search
No edit summary
Line 1: Line 1:
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''.  This method is assumed to be pretty good, more on this at [[RFC]] 4086.  Weak randomness can often lead to the system compromisable.
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''.  This method is assumed to be pretty good, more on this at [[RFC]] 4086.  Weak randomness can often lead to a system compromise.


=== Entropy sources ===
=== Entropy sources ===


Sound cards and their white noise are a good means of entropy.  Some CPU's provide random number generators which the Operating System may use.  Crypto-accelerating cards usually provide a source of entropy.
Sound cards and their white noise are a good means of entropy.  Some CPU's provide random number generators which the Operating System may use.  Crypto-accelerating cards usually provide a source of entropy.

Revision as of 09:07, 10 October 2005

Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces /dev/random, /dev/arandom and /dev/urandom. This method is assumed to be pretty good, more on this at RFC 4086. Weak randomness can often lead to a system compromise.

Entropy sources

Sound cards and their white noise are a good means of entropy. Some CPU's provide random number generators which the Operating System may use. Crypto-accelerating cards usually provide a source of entropy.