On Wed, 15 Apr 2015 08:30:04 -0700
David Christensen <dpchr...@holgerdanske.com> wrote:

...

> /dev/random is for cryptographically secure random numbers, such as for 
> cryptographic keys.  It requires a source of entropy to operate, and 
> will block until entropy is available.  Thus, on most desktop computers, 
> it is only suitable for small amounts of random numbers.

...

> /dev/urandom is for non-cryptographic/ low-security random numbers, such 
> as for games.  It will use entropy as available, otherwise it will 
> mathematically generate pseudo-random numbers.  It does not block and 
> can generate large amounts of random data quickly, but is vulnerable to 
> attack.

I don't think it's quite this simple:

1) OpenSSl thinks /dev/urandom is good enough for crypto:
https://www.openssl.org/support/faq.html#USER1

2) Perl's Math::Random::Secure also thinks it's generally good enough:
http://search.cpan.org/~mkanat/Math-Random-Secure-0.06/lib/Math/Random/Secure.pm#Making_Math::Random::Secure_Even_More_Secure

3) Read these guys (don't know how correct they are):

http://www.2uo.de/myths-about-urandom/
http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/

Celejar


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20150416215613.b9117149f674e461d19e4...@gmail.com

Reply via email to