|
You are here |
blog.cryptographyengineering.com | ||
| | | | |
www.2uo.de
|
|
| | | | | [AI summary] A technical deep-dive that debunks common myths about the Linux /dev/urandom and /dev/random devices, arguing that /dev/urandom is the preferred and secure choice for cryptographic applications on modern systems. | |
| | | | |
negativesign.com
|
|
| | | | | This one hits close to home. I can't imagine how the NIST staff involved in creating SP 800 (and more specifically, the SP 800-90A Dual Elliptic Curve Deterministic Random Bit Generation...bit) must feel. First of all, given the definition of a deterministic system, the title itself gives me pause. Maybe there's some next-level random number theory described in the standard, but I'm not sure I'd ever want a random number generator to exhibit deterministic behavior. | |
| | | | |
www.eliza-ng.me
|
|
| | | | | Introduction: Cryptography, the art of secure communication, relies on robust and trustworthy encryption algorithms to safeguard sensitive information. However, concerns about a potential backdoor in the NIST-approved Dual_EC_DRBG random number generator have plagued the encryption community for years. This article examines the history, suspicions, and implications surrounding the controversial algorithm. Background: Dual_EC_DRBG, based on elliptic curve cryptography, was included in NIST's SP 800-90A publication as one of the recommended random number generators for use in cryptography. However, from the beginning, doubts were raised about the algorithm's security and potential weaknesses. Later, it was publicly revealed that the United States National Secu... | |
| | | | |
craftofcoding.wordpress.com
|
|
| | | Visit the post for more. | ||