Summary

  • Do use the system cryptographic pseudo-random number generator (CRNGs) when at all possible.

  • Do make sure that any other cryptographic generators are seeded with at least 64 bits of entropy, preferably 128 bits.

  • Do not use a noncryptographic pseudo-random number generator (noncrytographic PRNG).

  • Consider using hardware random number generators (RNGs) in high-assurance situations.



19 Deadly Sins of Software Security. Programming Flaws and How to Fix Them
Writing Secure Code
ISBN: 71626751
EAN: 2147483647
Year: 2003
Pages: 239

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net