Random: Difference between revisions
From Hackepedia
Jump to navigationJump to search
No edit summary |
|||
Line 1: | Line 1: | ||
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''. This method is assumed to be pretty good, more on this at [[RFC]] 4086. Weak randomness can often lead to | Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''. This method is assumed to be pretty good, more on this at [[RFC]] 4086. Weak randomness can often lead to a system compromise. | ||
=== Entropy sources === | === Entropy sources === | ||
Sound cards and their white noise are a good means of entropy. Some CPU's provide random number generators which the Operating System may use. Crypto-accelerating cards usually provide a source of entropy. | Sound cards and their white noise are a good means of entropy. Some CPU's provide random number generators which the Operating System may use. Crypto-accelerating cards usually provide a source of entropy. |
Revision as of 09:07, 10 October 2005
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces /dev/random, /dev/arandom and /dev/urandom. This method is assumed to be pretty good, more on this at RFC 4086. Weak randomness can often lead to a system compromise.
Entropy sources
Sound cards and their white noise are a good means of entropy. Some CPU's provide random number generators which the Operating System may use. Crypto-accelerating cards usually provide a source of entropy.