"Salz, Rich" wrote:
> 
> >Can somebody tell me if this method of seeding the RNG secure enough?
> 
> It's not.  Not by a LONG shot.
> 
> If an adversary can figure out what random data you started with, then s/he
> could duplicate all your important functions -- session keys, keygen, etc.
> 
> In particular, the value of rand() depends only on the previous
> values of rand().  The first value of rand() depends on what you passed into
> srand().  So, all you are basically doing is seeding the random number
> generator with the current time.  Hardly random, hardly secure.
> 
> On Win32, there's a function to load the PRNG from the screenbuffer.

Yes, there is RAND_screen and RAND_event and I have tried those out.
but what if the application ran on an embedded win32 box ? On win32
there's
no random device, and on embedded systems no mouse or keyboard. Is
there a
freely available source of good random seed ?

Thanks,
Amit.




> 
> >additional seed in the form of PID, thread ID, system time, and
> >other private data.
> 
> Of the items you listed, all of them could be easily guessed. :)
>         /r$
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to