Cryptographically strong random - /dev/urandom ?

Luke Gorrie luke@REDACTED
Wed Apr 20 12:33:36 CEST 2005


Roger Larsson <roger.larsson@REDACTED> writes:

> On Monday 18 April 2005 18.57, klacke@REDACTED wrote:
> > On Mon, Apr 18, 2005 at 12:58:50PM +0300, joel reymont wrote:
> > > Folks,
> > >
> > > I understand that SSL in Erlang is based on OpenSSL. That library also
> > > comes with a cryptographically strong random implementation but that
> > > bit is not included in Erlang SSL.
> > >
> > > Is there a cryptographically strong implementation for Erlang?
> >
> > We do:
> >
> >
> > random_ascii_str(Length) ->
> >     random_ascii_str(Length, os:cmd("dd if=/dev/urandom count=1"), [], 0).
> 
> from "man urandom"
>        When  read,  /dev/urandom  device  will  return  as  many  bytes as are
>        requested.  As a result, if there is  not  sufficient  entropy  in  the
>        entropy  pool,  the  returned  values are theoretically vulnerable to a
>        cryptographic attack on the algorithms used by the  driver.   Knowledge
>        of how to do this is not available in the current non-classified liter‐
>        ature, but it is theoretically possible that such an attack may  exist.
>        If this is a concern in your application, use /dev/random instead.

The boring thing with /dev/random is that it can block until you
wiggle the mouse :-)

-Luke (not somebody to take any cryptography advice from)





More information about the erlang-questions mailing list