Random Number Generators and Information Security

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 3: Line 3:
The many applications of randomness have led to many different methods for generating random data. These methods may vary as to how unpredictable or statistically random they are, and how quickly they can generate random numbers.<BR>
The many applications of randomness have led to many different methods for generating random data. These methods may vary as to how unpredictable or statistically random they are, and how quickly they can generate random numbers.<BR>
-
Before the advent of computational random number generators, generating large amount of sufficiently random numbers (important in statistics) required a lot of work. Results would sometimes be collected and distributed as random number tables. <ref>[http://en.wikipedia.org/wiki/Random_number_generation Wikipedia: Random Number Generation]</ref><BR>
+
Before the advent of computational random number generators, generating large amount of sufficiently random numbers (important in statistics) required a lot of work. Results would sometimes be collected and distributed as random number tables. <ref>http://en.wikipedia.org/wiki/Random_number_generation Wikipedia: Random Number Generation</ref><BR>
Line 25: Line 25:
== Conclusion ==
== Conclusion ==
== References ==
== References ==
-
{{Reflist}}
+
<references />
1. Bishop, M. 2004. Introduction to Computer Security. Prentice Hall PTR.<BR>
1. Bishop, M. 2004. Introduction to Computer Security. Prentice Hall PTR.<BR>
2. Wikipedia. 2007. Retrieved November 27, 2007. <http://wikipedia.org><BR>
2. Wikipedia. 2007. Retrieved November 27, 2007. <http://wikipedia.org><BR>

Revision as of 06:45, 2 December 2007

A random number generator (often abbreviated as RNG) is a computational or physical device designed to generate a sequence of numbers or symbols that lack any pattern, i.e. appear random. Computer-based systems for random number generation are widely used, but often fall short of this goal, though they may meet some statistical tests for randomness intended to ensure that they do not have any easily discernible patterns. Methods for generating random results have existed since ancient times, including dice, coin flipping, the shuffling of playing cards, the use of yarrow stalks in the I Ching, and many other techniques.

The many applications of randomness have led to many different methods for generating random data. These methods may vary as to how unpredictable or statistically random they are, and how quickly they can generate random numbers.

Before the advent of computational random number generators, generating large amount of sufficiently random numbers (important in statistics) required a lot of work. Results would sometimes be collected and distributed as random number tables. <ref>http://en.wikipedia.org/wiki/Random_number_generation Wikipedia: Random Number Generation</ref>


Contents

Relevance to Information Security

Image:crypt.JPG Image:NSprotocol.JPG

Vulnerability

Two Kinds of Randomness

True Randomness

Physical Methods

Examples

Pros and Cons

Pseudo-Randomness

Computational Methods

Examples

Pros and Cons

Verdict

Conclusion

References

<references /> 1. Bishop, M. 2004. Introduction to Computer Security. Prentice Hall PTR.
2. Wikipedia. 2007. Retrieved November 27, 2007. <http://wikipedia.org>
3. Haahr, M. 2007. Random.org. Retrieved November 27, 2007. <http://www.random.org>

See Also

External Links

--Caoff 19:00, 1 December 2007 (EST)

Personal tools