From owner-freebsd-security Sat Mar 3 19:41: 2 2001 Delivered-To: freebsd-security@freebsd.org Received: from zogbe.tasam.com (hc6526bd1.dhcp.vt.edu [198.82.107.209]) by hub.freebsd.org (Postfix) with ESMTP id 09EA137B718 for ; Sat, 3 Mar 2001 19:41:00 -0800 (PST) (envelope-from clash@fireduck.com) Received: from battleship (hc6526bd1.dhcp.vt.edu [198.82.107.209]) by zogbe.tasam.com (8.11.2/8.11.2) with SMTP id f243ewh81362 for ; Sat, 3 Mar 2001 22:40:59 -0500 (EST) Message-ID: <000b01c0a45c$edec3280$0b2d2d0a@fireduck.com> From: "Joseph Gleason" To: Subject: random numbers Date: Sat, 3 Mar 2001 22:40:58 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4522.1200 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4522.1200 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Would /dev/urandom be acceptable for use in a one time pad encryption system? Such a system is only as strong as the random number generator used to generate the keys. I get the feeling that /dev/random would be a much better choice, but key generation with that would be much slower. Does anyone know of any hardware that isn't to expensive and generates good random numbers? Thanks for your time. Joseph Gleason To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message