Random Number Generators and Information Security
From Computing and Software Wiki
(Difference between revisions)
m (Random Number Generator moved to Random Number Generators and Information Security: the change in title was necessary to precisely summarize the contents of the wiki page) |
m |
||
| Line 7: | Line 7: | ||
== Vulnerability == | == Vulnerability == | ||
| - | == | + | == Two Kinds of Randomness == |
| - | === | + | === True Randomness === |
| - | === | + | ==== Physical Methods ==== |
| - | === | + | ==== Examples ==== |
| - | + | ==== Pros and Cons ==== | |
| - | == | + | === Pseudo-Randomness === |
| - | === | + | ==== Computational Methods ==== |
| - | === | + | ==== Examples ==== |
| - | === | + | ==== Pros and Cons ==== |
| - | + | === Verdict === | |
| - | == | + | |
| - | === | + | |
| - | === | + | |
| - | === | + | |
== Conclusion == | == Conclusion == | ||
Revision as of 23:56, 1 December 2007
Contents |
