-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thursday, 2009-02-05 at 16:13 -0800, Randall R Schulz wrote:
On Thursday February 5 2009, Carlos E. R. wrote:
... They say /dev/random is faster.
I didn't come across that, but I did find someone saying that by using /dev/random you can expose things about the source of entropy on your system in such a way to increase the vulnerability of hashes based upon that random data.
It's all far more than the limits of my knowledge of cryptography and the underlying mathematics allows me to say I understand.
Ah, I was wrong, I think it is the other way round, urandom is the faster one, because it doesn't wait for more entropy. There is more info on random(4). And it is thus /dev/urandom the one that could theoretically be attacked, they mention it on that man page. - -- Cheers, Carlos E. R. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (GNU/Linux) iEYEARECAAYFAkmLjQYACgkQtTMYHG2NR9WC8QCfQQBF9XTD1aFpp6JDGlQAGUbY W3oAnj4uDXEGKEjItI5qyxV9iQL8kHfz =gw3P -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org