mirror of https://github.com/mkerrisk/man-pages
random.4: Mention PRNG used by urandom
/dev/urandom uses a pseudo-random number generator to replace missing entropy. Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de> Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
1734469103
commit
9949f5cb18
|
@ -63,8 +63,9 @@ will be set to
|
||||||
.LP
|
.LP
|
||||||
A read from the \fI/dev/urandom\fP device will not block
|
A read from the \fI/dev/urandom\fP device will not block
|
||||||
waiting for more entropy.
|
waiting for more entropy.
|
||||||
As a result, if there is not sufficient entropy in the
|
If there is not sufficient entropy, a pseudorandom number generator is used
|
||||||
entropy pool, the returned values are theoretically vulnerable to a
|
to create the requested bytes.
|
||||||
|
As a result, in this case the returned values are theoretically vulnerable to a
|
||||||
cryptographic attack on the algorithms used by the driver.
|
cryptographic attack on the algorithms used by the driver.
|
||||||
Knowledge of how to do this is not available in the current unclassified
|
Knowledge of how to do this is not available in the current unclassified
|
||||||
literature, but it is theoretically possible that such an attack may
|
literature, but it is theoretically possible that such an attack may
|
||||||
|
|
Loading…
Reference in New Issue