AcornSearch - Acorn and RISC OS information searching
RISC OS Search
containing
"Nutty quip goes here!"
Home  |  About  |  Filebase Archive  |  StrongHelp Manuals  |  Newsgroups  |  Module Database
Name:     draft-eastlake-randomness2-09
Title:     Randomness Requirements for Security
State:     Pending
Authors:     Donald Eastlake, Jeffrey Schiller,  Stephen Crocker
Group:     Individual Submissions (none)
Date:     2004-10-26

Security systems are built on strong cryptographic algorithms that foil 
pattern analysis attempts. However, the security of these systems is 
dependent on generating secret quantities for passwords, cryptographic 
keys, and similar quantities. The use of pseudo-random processes to 
generate secret quantities can result in pseudo- security. The 
sophisticated attacker of these security systems may find it easier to 
reproduce the environment that produced the secret quantities, searching 
the resulting small set of possibilities, than to locate the quantities in 
the whole of the potential number space.

[sh-index] Back to list of manuals