[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Python Random Number Generator for OTP



>  Why not use /dev/random, instead of "ensuring you have entropy"

/dev/random limits the output size to the estimated entropy. So it has
abysmal performance unless there are high performance entropy sources
available. After the initial seeding this gains very little security in
practice.
/dev/urandom unblocks before it has sufficient entropy on some systems. So
it's not guaranteed to be secure and sometimes fails in practice.

What you normally want is a source that blocks after boot until it has
accumulated enough initial entropy (say 256 bits), and then never blocks
again.
It's not like a good PRNG gets weaker as more data is read from it when
your adversaries are computationally bounded.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20130723/2dff84c5/attachment.html>