Random: Difference between revisions

From Hackepedia
Jump to navigationJump to search
No edit summary
Line 1: Line 1:
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''.  This method is assumed to be pretty good, more on this at [[RFC]] 4086.  Weak randomness can often lead to the system compromisable.
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''.  This method is assumed to be pretty good, more on this at [[RFC]] 4086.  Weak randomness can often lead to the system compromisable.


=== Random sources ===
=== Entropy sources ===


Sound cards and their white noise are a good means of randomness.  Some CPU's provide random number generators which the Operating System may use.  Crypto-accelerating cards usually provide a source of randomness.
Sound cards and their white noise are a good means of entropy.  Some CPU's provide random number generators which the Operating System may use.  Crypto-accelerating cards usually provide a source of entropy.

Revision as of 05:26, 10 October 2005

Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces /dev/random, /dev/arandom and /dev/urandom. This method is assumed to be pretty good, more on this at RFC 4086. Weak randomness can often lead to the system compromisable.

Entropy sources

Sound cards and their white noise are a good means of entropy. Some CPU's provide random number generators which the Operating System may use. Crypto-accelerating cards usually provide a source of entropy.