|
You are here |
www.2uo.de | ||
| | | | |
www.thomas-huehn.com
|
|
| | | | | [AI summary] The article discusses the use of /dev/random and /dev/urandom in Linux systems for generating random numbers. It highlights that /dev/urandom is generally preferred over /dev/random due to its non-blocking nature and sufficient cryptographic security. The article also addresses misconceptions in the man pages and emphasizes that /dev/urandom is safe for most applications, including cryptographic uses, as long as the initial seeding is done properly. It mentions that while /dev/random is considered a legacy interface, it's not always necessary, and modern Linux distributions and syscalls like getrandom(2) provide better alternatives. | |
| | | | |
blog.cryptographyengineering.com
|
|
| | | | | In today's news of the weird, RSA (a division of EMC) hasrecommendedthat developers desist fromusingthe (allegedly) 'backdoored' Dual_EC_DRBG random number generator -- which happens to be thedefault in RSA's BSafe cryptographic toolkit. Youch. In case you're missing the story here, Dual_EC_DRBG (which I wrote about yesterday) is the random number generator voted most likely to... | |
| | | | |
paragonie.com
|
|
| | | | | A lesson on cryptographically secure pseudorandom number generators in PHP, and how to generate random integers and strings from a high quality entropy source like /dev/urandom to generate secure random passwords in PHP. | |
| | | | |
danielegrattarola.github.io
|
|
| | | Artificial intelligence scientist | ||