Random Number Generators and Information Security
From Computing and Software Wiki
Revision as of 23:59, 1 December 2007 by
Caoff
(
Talk
)
(
diff
)
← Older revision
|
Current revision
(
diff
) |
Newer revision →
(
diff
)
Jump to:
navigation
,
search
Contents
1
Relevance to Information Security
2
Vulnerability
3
Two Kinds of Randomness
3.1
True Randomness
3.1.1
Physical Methods
3.1.2
Examples
3.1.3
Pros and Cons
3.2
Pseudo-Randomness
3.2.1
Computational Methods
3.2.2
Examples
3.2.3
Pros and Cons
3.3
Verdict
4
Conclusion
Relevance to Information Security
Vulnerability
Two Kinds of Randomness
True Randomness
Physical Methods
Examples
Pros and Cons
Pseudo-Randomness
Computational Methods
Examples
Pros and Cons
Verdict
Conclusion
Views
Page
Discussion
View source
History
Personal tools
Log in
Navigation
Main Page
Community portal
Current events
Recent changes
Random page
Help
Search
Toolbox
What links here
Related changes
Special pages
Printable version
Permanent link