On Jan 13, 2008 2:06 PM, Eduardo Tongson <[EMAIL PROTECTED]> wrote:
> On Jan 13, 2008 11:23 AM, fooler mail <[EMAIL PROTECTED]> wrote:
> > On Jan 13, 2008 12:00 AM, Drexx Laggui [personal] <[EMAIL PROTECTED]> wrote:
> > > 12Jan2008 (UTC +8)
> > >
> > > I guess that with regular PCs, "badblocks -c 512 -s -w -t random" will
> > > be good enough and a bit more useful. With with higher-risk computers
> > > however, I'd recommend the use of "dd if=/dev/urandom". For the truly
> > > secure machines that have the luxury of more preparation time, "dd
> > > if=/dev/random" is the way to go.
> >
> > i wont recommend badblocks with -t random parameter for scrubbing your
> > disk as it uses the C standard library random() function ... random()
> > function uses a non-linear additive feedback random generator as this
> > would easily for cryptanalyst to decrypt your data....
> >
> > ...
>
> In the RNG front:
> random(), srandom(), rand(), srand() are weak random number
> generators. A better random generator is arc4random(). If I am not
> mistaken there are patches for Glibc to incorporate arc4random().
>

that is correct that they are weak...here is the formula of GLIBC's PRNG...

r[0] = seed
r[i] = (16807 * r[i - 1]) mod 2147483647
where i = 1 to 30

for cryptanalyst or mathematicians (or even an average person with a
math know how) can easily get your sequence random number... for
decryption, even a typical desktop computer can decrypt it in a short
period of time as you can start from seed 0 to to 2^31 -1 (2147483647)
for brute force decryption..

fooler.
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph

Reply via email to