On Fri, Apr 26, 2013 at 08:57:45PM +0100, Ian Collier wrote:
> On Fri, Apr 26, 2013 at 02:17:49PM -0500, Derek Martin wrote:
> > Using /dev/urandom on systems that have it isn't without its own
> > problems... if your system doesn't have enough entropy, reading from
> > /dev/urandom will block until it does.
> 
> On systems with a Linux kernel, /dev/urandom does not block but produces
> lower entropy pseudorandom numbers instead.  The /dev/random device
> does block, and is used when full entropy is essential.

Sorry, yes, you're correct.  It's not just Linux... it's basically
every major Unix variant in production today, though
implementations vary.  Also:

  http://en.wikipedia.org/wiki//dev/random

    In 2004, Landon Curt Noll, Simon Cooper, and Mel Pleasant
    tested a variety of random number generators, including the
    /dev/random implementations in FreeBSD 5.2.1, Linux 2.4.21-20,
    Solaris 8 patch 108528-18, and Mac OS X 10.3.5.[7] They
    indicated that none of these /dev/random implementations were
    cryptographically secure because their outputs had uniformity
    flaws.

So, using the microsecond-resolution system clock is probably as
good, if not better.

Like I said, this is an annoyingly hard problem.

-- 
Derek D. Martin    http://www.pizzashack.org/   GPG Key ID: 0xDFBEAD02
-=-=-=-=-
This message is posted from an invalid address.  Replying to it will result in
undeliverable mail due to spam prevention.  Sorry for the inconvenience.

Attachment: pgp6s_yDHJD31.pgp
Description: PGP signature

Reply via email to