Random Number Generators and Information Security

From Computing and Software Wiki

Revision as of 00:00, 2 December 2007 by Caoff (Talk)
Jump to: navigation, search

Contents

Relevance to Information Security

Image:crypt.JPG Image:NSprotocol.JPG

Vulnerability

Two Kinds of Randomness

True Randomness

Physical Methods

Examples

Pros and Cons

Pseudo-Randomness

Computational Methods

Examples

Pros and Cons

Verdict

Conclusion

References

See Also

External Links

--Caoff 19:00, 1 December 2007 (EST)

Personal tools