Random Number Generators and Information Security

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
m (Random Number Generator moved to Random Number Generators and Information Security: the change in title was necessary to precisely summarize the contents of the wiki page)
m
Line 7: Line 7:
== Vulnerability ==
== Vulnerability ==
-
== True or Pseudo Randomness ==
+
== Two Kinds of Randomness ==
-
=== Physical Methods ===
+
=== True Randomness ===
-
=== Computational Methods ===
+
==== Physical Methods ====
-
=== Pros and Cons ===
+
==== Examples ====
-
 
+
==== Pros and Cons ====
-
== Examples of True Random Number Generators ==
+
=== Pseudo-Randomness ===
-
=== RANDOM.org ===
+
==== Computational Methods ====
-
=== Hotbits ===
+
==== Examples ====
-
=== Lavarand ===
+
==== Pros and Cons ====
-
 
+
=== Verdict ===
-
== Pseudo-Random Number Generators ==
+
-
=== Middle-squared Method ===
+
-
=== Blum Blum Shug ===
+
-
=== CryptGenRandom ===
+
== Conclusion ==
== Conclusion ==

Revision as of 23:56, 1 December 2007

Contents

What is a Random Number Generator?

Relevance to Information Security

Image:crypt.JPG Image:NSprotocol.JPG

Vulnerability

Two Kinds of Randomness

True Randomness

Physical Methods

Examples

Pros and Cons

Pseudo-Randomness

Computational Methods

Examples

Pros and Cons

Verdict

Conclusion

Personal tools