Random Number Generators and Information Security

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
m
m (Relevance to Information Security)
Line 2: Line 2:
== Relevance to Information Security ==
== Relevance to Information Security ==
-
[[Image:crypt.jpg]]
+
[[Image:crypt.JPG]]
-
[[Image:NSprotocol.jpg]]
+
[[Image:NSprotocol.JPG]]
== Vulnerability ==
== Vulnerability ==

Revision as of 06:43, 1 December 2007

Contents

What is a Random Number Generator?

Relevance to Information Security

Image:crypt.JPG Image:NSprotocol.JPG

Vulnerability

True or Pseudo Randomness

Physical Methods

Computational Methods

Pros and Cons

Examples of True Random Number Generators

RANDOM.org

Hotbits

Lavarand

Pseudo-Random Number Generators

Middle-squared Method

Blum Blum Shug

CryptGenRandom

Conclusion

Personal tools