Random Number Generators and Information Security
From Computing and Software Wiki
(Difference between revisions)
m (Random Number Generator moved to Random Number Generators and Information Security: the change in title was necessary to precisely summarize the contents of the wiki page) |
m |
||
Line 7: | Line 7: | ||
== Vulnerability == | == Vulnerability == | ||
- | == | + | == Two Kinds of Randomness == |
- | === | + | === True Randomness === |
- | === | + | ==== Physical Methods ==== |
- | === | + | ==== Examples ==== |
- | + | ==== Pros and Cons ==== | |
- | == | + | === Pseudo-Randomness === |
- | === | + | ==== Computational Methods ==== |
- | === | + | ==== Examples ==== |
- | === | + | ==== Pros and Cons ==== |
- | + | === Verdict === | |
- | == | + | |
- | === | + | |
- | === | + | |
- | === | + | |
== Conclusion == | == Conclusion == |
Revision as of 23:56, 1 December 2007
Contents |