Message150570
For the record, here is what "man urandom" says about random seed size:
“[...] no cryptographic primitive available today can hope to promise
more than 256 bits of security, so if any program reads more than
256 bits (32 bytes) from the kernel random pool per invocation, or per
reasonable reseed interval (not less than one minute), that should be
taken as a sign that its cryptography is not skilfully implemented.”
In that light, reading a 64 bytes seed from /dev/urandom is already a lot, and 4096 bytes is simply insane. |
|
Date |
User |
Action |
Args |
2012-01-04 02:14:55 | pitrou | set | recipients:
+ pitrou, gvanrossum, barry, georg.brandl, terry.reedy, vstinner, christian.heimes, benjamin.peterson, Arfrever, alex, dmalcolm, PaulMcMillan |
2012-01-04 02:14:55 | pitrou | set | messageid: <1325643295.39.0.0632700309253.issue13703@psf.upfronthosting.co.za> |
2012-01-04 02:14:54 | pitrou | link | issue13703 messages |
2012-01-04 02:14:54 | pitrou | create | |
|