Python Random Number Generator for OTP

CodesInChaos codesinchaos at gmail.com
Tue Jul 23 03:49:23 PDT 2013


>  Why not use /dev/random, instead of "ensuring you have entropy"

/dev/random limits the output size to the estimated entropy. So it has
abysmal performance unless there are high performance entropy sources
available. After the initial seeding this gains very little security in
practice.
/dev/urandom unblocks before it has sufficient entropy on some systems. So
it's not guaranteed to be secure and sometimes fails in practice.

What you normally want is a source that blocks after boot until it has
accumulated enough initial entropy (say 256 bits), and then never blocks
again.
It's not like a good PRNG gets weaker as more data is read from it when
your adversaries are computationally bounded.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 832 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20130723/2dff84c5/attachment-0001.txt>


More information about the cypherpunks mailing list