Re: strengthening /dev/urandom

From: Mok-Kong Shen (mok-kong.shen_at_t-online.de)
Date: 09/02/04


Date: Thu, 02 Sep 2004 09:07:03 +0200


Guy Macon wrote:
> Mok-Kong Shen <mok-kong.shen@t-online.de> says...
>
>
>>if we all agree that e.g.
>>AES in CTR is secure enough, are there any 'objective'
>>reasons against employing such good pseudo-randomness in
>>lieu of hardware randomness from, say, /dev/random?
>
>
> "/dev/random should be suitable for uses that need very
> high quality randomness such as one-time pad or key
> generation."
> -/dev/random man page

But this is from /dev/random itself and hence is a rather
'subjective' opinion. (Cf. a manufacturer's booklet on its
products.)

M. K. Shen



Relevant Pages

  • Re: A Simple Encryption Mode that "Feels" Secure
    ... > Some people feel that modes like counter mode, or output-feedback mode, ... What do you mean by "secure"? ... For those who care to look at it for a second knows that CTR provides ... reducible security in privacy. ...
    (sci.crypt)
  • Re: Are natural languages secure ciphers?
    ... > The one-time pad is secure only in a theoretical sense. ... > might as well transfer the cleartext itself instead, ... just sent messages by courier instead of using the OTP carried by couriers? ...
    (sci.crypt)
  • need advice
    ... I am looking for a simple, yet cryptographically secure way to send ... should use a 1-26 system, modulo 26, or a five-digit system, or if i ... to Solitaire encryption, and i can manipulate it just fine, but i wasn't ...
    (sci.crypt)
  • Re: 50 year challenge.
    ... and which must remain available but secure for 50 years. ... How would you encrypt it? ... Use the one-time pad. ... That's about the only cipher to survive the next ...
    (sci.crypt)
  • Re: Are natural languages secure ciphers?
    ... and in those cases the one-time pad was used ... > cryptosystems. ... > rot 13 as far as a secure system is concerned. ... Very few situations require total security. ...
    (sci.crypt)