entropy of /dev/random vs. openssl rand

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


I need to create a moderate amount of v3 keys for loop-aes and wonder
how/if the "openssl rand" implementation differs significantly from
/dev/random concerning entropy.

In case /dev/random and "openssl rand" are somewhat comparable, I
would just use the latter to create the keys.

However, I certainly don't want to use a /dev/urandom look-alike.

Any feedback appreciated.

left blank, right bald

Attachment: pgpXzMs16iTs5.pgp
Description: PGP signature

[Home]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]     [Network Security Reading]

Add to Google