bram (bram@gawth.com)
Fri, 21 Aug 1998 19:10:33 -0700 (PDT)
On Sat, 22 Aug 1998, Dutra de Lacerda wrote:
> TRUE RANDOM No-Hardware Routine (in Pseudocode)
>
> This routine is based on Keyboard Input and Keyboard latency.
> Can be modified so each KeyPressed creates one new 32bits word.
> Idle Transforms have been influenced by TEA algorithm.
I would like to reiterate that the proper way to use random numbers for
cryptographic purposes is to conservatively estimate the amount of entropy
in the source and then hash everything when the appropriate amount of
entropy is available. Using RNG values raw for cryptographic purposes is
very, very foolish.
-Bram
The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:11:00