|
You are here |
deut-erium.github.io | ||
| | | | |
hilarymason.com
|
|
| | | | | I travel quite a lot, and I've developed the habit of always texting myself my hotel room number so I don't forget it (unfortunately, I really do stay in that many hotels). I recently looked at my texts to myself and realized it seems like a reasonable set of random numbers. Hello, hotel-based entropy*! What... | |
| | | | |
negativesign.com
|
|
| | | | | This one hits close to home. I can't imagine how the NIST staff involved in creating SP 800 (and more specifically, the SP 800-90A Dual Elliptic Curve Deterministic Random Bit Generation...bit) must feel. First of all, given the definition of a deterministic system, the title itself gives me pause. Maybe there's some next-level random number theory described in the standard, but I'm not sure I'd ever want a random number generator to exhibit deterministic behavior. | |
| | | | |
www.arch13.com
|
|
| | | | | You cannot have good encryption without random numbers, but few people realize the Raspberry Pi (all versions) have a random number generator right on their silicon. Unfortunately, the Raspberry Pi OS's do not utilize it without a set of tools not installed by default. As a result, you end up with a much smaller pool [...] | |
| | | | |
blog.k3170makan.com
|
|
| | | Hacking,Information Security,Penetration Testing,Google Hacking,Google Dorking,Keith Makan,Black Hat,Security Research,InfoSec,Web Site Security | ||