PGP source code and internals
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Cryptographic Design Vulnerabilities
Computer
The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks
MMNS '01 Proceedings of the 4th IFIP/IEEE International Conference on Management of Multimedia Networks and Services: Management of Multimedia on the Internet
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
A Practice-Oriented Treatment of Pseudorandom Number Generators
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
ssmail: Opportunistic Encryption in sendmail
LISA '99 Proceedings of the 13th USENIX conference on System administration
An embedded domain-specific language for type-safe server-side web scripting
ACM Transactions on Internet Technology (TOIT)
An efficient high quality random number generator for multi-programmed systems
Journal of Computer Security
A model and architecture for pseudo-random generation with applications to /dev/random
Proceedings of the 12th ACM conference on Computer and communications security
Analysis of non-linear pseudo-noise sequences
Enhanced methods in computer security, biometric and artificial intelligence systems
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
An open-source cryptographic coprocessor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Understanding data lifetime via whole system simulation
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Cryptanalysis of the windows random number generator
Proceedings of the 14th ACM conference on Computer and communications security
Pseudo-randomness Inside Web Browsers
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
PRNG based on new HCI devices entropy sources: Wii remote study case
Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
Cryptanalysis of the random number generator of the Windows operating system
ACM Transactions on Information and System Security (TISSEC)
Towards multilaterally secure computing platforms-with open source and trusted computing
Information Security Tech. Report
Mining your Ps and Qs: detection of widespread weak keys in network devices
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Hi-index | 0.00 |
Although much thought usually goes into the design of encryption algorithms and protocols, less consideration is often given to equally important issues such as the selection of cryptographically strong random numbers, so that an attacker may find it easier to break the random number generator than the security system it is used with. This paper provides a comprehensive guide to designing and implementing a practically strong random data accumulator and generator which requires no specialised hardware or access to privileged system services. The performance of the generator on a variety of systems is analysed, and measures which can make recovery of the accumulator/generator state information more difficult for an attacker are presented. The result is an easy-to-use random number generator which should be suitable even for demanding cryptographic applications.