Date: 2002-11-27 11:34 am (UTC)
You're throwing out way more information than you have to. Normalizing the input directly is a little silly, you should instead simply estimate how much entropy is in being produced, then hash up all the information you get until it reaches 160 bits, and spit out the sha1 of that in one burst.

It's also a unnecessary to get your bits directly from the source - it's much more efficient to get a seed of 'truly' random bits, then use either AES in counter mode or mersenne twister (depending on your cryptographic needs, or lack thereof) to generate later random numbers.

I'm very bitter about /dev/random blocking unnecessarily. It's a good example of something really basic which the crypto community as a whole can't get its act together on.

(will be screened)
(will be screened if not validated)
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org

Profile

ciphergoth: (Default)
Paul Crowley

January 2025

S M T W T F S
   1234
5678 91011
12131415161718
19202122232425
262728293031 

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Aug. 11th, 2025 04:02 am
Powered by Dreamwidth Studios