Talk:Unix directory structure: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Subpagination Bot
m (Add {{subpages}} and remove checklist (details))
imported>Alexander Wiebel
(→‎urandom and random: new section)
Line 1: Line 1:
{{subpages}}
{{subpages}}
== urandom and random ==
Are Unix and Linux different in this case? My man page says the following:
  When  read,  the  /dev/random  device  will only return random bytes
  within the estimated number of bits of  noise in the entropy pool.  /dev/random
  should be suitable for uses that need very high quality randomness such as one-time
  pad or key generation.  When the entropy pool is  empty,  reads
  from /dev/random will block until additional environmental noise is gathered.
  A  read from the /dev/urandom device will not block waiting for more entropy.
  As a result, if there is not sufficient entropy in the entropy pool,
  the returned values are theoretically vulnerable to a cryptographic
  attack on the algorithms used by the driver.  Knowledge of how to  do  this  is
  not  available  in  the current non-classified literature, but it is
  theoretically possible that such an attack may exist.  If this is a concern in
  your application, use /dev/random instead.
--[[User:Alexander Wiebel|Alexander Wiebel]] 10:30, 7 February 2008 (CST)

Revision as of 10:30, 7 February 2008

This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
To learn how to update the categories for this article, see here. To update categories, edit the metadata template.
 Definition A convention of the organization of the directory structure in Unix-like operating systems. [d] [e]
Checklist and Archives
 Workgroup category Computers [Categories OK]
 Talk Archive none  English language variant British English

urandom and random

Are Unix and Linux different in this case? My man page says the following:

 When  read,  the  /dev/random  device  will only return random bytes 
 within the estimated number of bits of   noise in the entropy pool.  /dev/random
 should be suitable for uses that need very high quality randomness such as one-time 
 pad or key generation.  When the entropy pool is  empty,  reads
 from /dev/random will block until additional environmental noise is gathered.
 A  read from the /dev/urandom device will not block waiting for more entropy.
 As a result, if there is not sufficient entropy in the entropy pool,
 the returned values are theoretically vulnerable to a cryptographic 
 attack on the algorithms used by the driver.  Knowledge of how to  do  this  is
 not  available  in  the current non-classified literature, but it is 
 theoretically possible that such an attack may exist.  If this is a concern in
 your application, use /dev/random instead.

--Alexander Wiebel 10:30, 7 February 2008 (CST)