![]() ![]() Depending on how the generated pseudo-random data is applied, a CSPRNG might need to exhibit some (or all) of these properties: The strength of a cryptographic system depends heavily on the properties of these CSPRNGs. An RNG that is suitable for cryptographic usage is called a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG). The security of basic cryptographic elements largely depends on the underlying random number generator (RNG) that was used. Generating a nonce, initialization vector or cryptographic keying materials all require a random number. There are various steps in cryptography that call for the use of random numbers. My goal is for it to be a complimentary, security-focused addition to the JCA Reference Guide. This blog series should serve as a one-stop resource for anyone who needs to implement a crypto-system in Java. This entry covers Cryptographically Secure Pseudo-Random Number Generators. ![]() The first entry provided an overview and covered some architectural details, using stronger algorithms and some debugging tips. This is the second entry in a blog series on using Java cryptography securely. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |