Quantcast
Channel: Is a rand from /dev/urandom secure for a login key? - Information Security Stack Exchange
Browsing latest articles
Browse All 5 View Live

Answer by Tom Hale for Is a rand from /dev/urandom secure for a login key?

Be aware of edge-cases if you're using Linux or NetBSD.On Linux, you'd want make sure that enough entropy has been gained after boot to properly seed the CSPRNG, or use the getrandom() system call to...

View Article



Answer by Buktop for Is a rand from /dev/urandom secure for a login key?

From http://www.linuxfromscratch.org/hints/downloads/files/entropy.txt"Generating true entropy in a computer is fairly difficult because nothing,outside of quantum physics, is random. The Linux kernel...

View Article

Answer by D.W. for Is a rand from /dev/urandom secure for a login key?

Yes, it's a great way.@Thomas's explanation nails it. And he is completely right to criticize the /dev/urandom man page. Spot on.But skip "checking if it already exists". That check is pointless. It...

View Article

Answer by Thomas Pornin for Is a rand from /dev/urandom secure for a login key?

The short answer is yes. The long answer is also yes. /dev/urandom yields data which is indistinguishable from true randomness, given existing technology. Getting "better" randomness than what...

View Article

Is a rand from /dev/urandom secure for a login key?

Lets say I want to create a cookie for a user. Would simply generating a 1024 bit string by using /dev/urandom, and checking if it already exists (looping until I get a unique one) suffice?Should I be...

View Article

Browsing latest articles
Browse All 5 View Live




Latest Images