Random Number Generators and Information Security

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 17: Line 17:
== Conclusion ==
== Conclusion ==
 +
== References ==
 +
== See Also ==
 +
== External Links ==
 +
--[[User:Caoff|Caoff]] 19:00, 1 December 2007 (EST)

Revision as of 00:00, 2 December 2007

Contents

Relevance to Information Security

Image:crypt.JPG Image:NSprotocol.JPG

Vulnerability

Two Kinds of Randomness

True Randomness

Physical Methods

Examples

Pros and Cons

Pseudo-Randomness

Computational Methods

Examples

Pros and Cons

Verdict

Conclusion

References

See Also

External Links

--Caoff 19:00, 1 December 2007 (EST)

Personal tools