Random Number Generators and Information Security

From Computing and Software Wiki

Revision as of 00:29, 2 December 2007 by Caoff (Talk)
Jump to: navigation, search

Contents

Relevance to Information Security

Image:crypt.JPG Image:NSprotocol.JPG

Vulnerability

Two Kinds of Randomness

True Randomness

Physical Methods

Examples

Pros and Cons

Pseudo-Randomness

Computational Methods

Examples

Pros and Cons

Verdict

Conclusion

References

1. Bishop, M. 2004. Introduction to Computer Security. Prentice Hall PTR. 2. Wikipedia. 2007. Retrieved November 27, 2007. <http://wikipedia.org> 3. Haahr, M. 2007. Random.org. Retrieved November 27, 2007. <http://www.random.org>

See Also

External Links

--Caoff 19:00, 1 December 2007 (EST)

Personal tools