Random: Difference between revisions
From Hackepedia
Jump to navigationJump to search
No edit summary |
|||
Line 1: | Line 1: | ||
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''. This method is assumed to be pretty good, more on this at [[RFC]] 4086. Weak randomness can often lead to the system compromisable. | Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces ''/dev/random'', ''/dev/arandom'' and ''/dev/urandom''. This method is assumed to be pretty good, more on this at [[RFC]] 4086. Weak randomness can often lead to the system compromisable. | ||
=== | === Entropy sources === | ||
Sound cards and their white noise are a good means of | Sound cards and their white noise are a good means of entropy. Some CPU's provide random number generators which the Operating System may use. Crypto-accelerating cards usually provide a source of entropy. |
Revision as of 05:26, 10 October 2005
Randomness in some UNIX operating system can be achieved through cryptographically achieved randomness such as arc4random(3) which uses the interfaces /dev/random, /dev/arandom and /dev/urandom. This method is assumed to be pretty good, more on this at RFC 4086. Weak randomness can often lead to the system compromisable.
Entropy sources
Sound cards and their white noise are a good means of entropy. Some CPU's provide random number generators which the Operating System may use. Crypto-accelerating cards usually provide a source of entropy.