I don't exactly know as I took the Fortuna code from here: https://github.com/wxfz/fortuna
There it reads "My implementation of Fortuna (See Wikipedia <http://en.wikipedia.org/wiki/Fortuna_%28PRNG%29> ) uses 64-pools of entropy gathered from the browser's clock, mouse position and DOM content. Entropy is gathered also collected at random intervals and from mouse movement. There is of course a lot of SHA256 and AES gnashing in the background." I looked through the code, too and it seems to exactly do this. Best regards Martin Am 22.06.2013 22:32, schrieb Nils K: > Am 22.06.2013 14:23, schrieb Dr. M. Weihrauch: >> Maybe it is cryptographically not secure enough, but I leave this up to >> discussion. > The problem does not lie in Fortuna but in how you seed it. > So how do you seed it? > > _______________________________________________ > > http://openpgpjs.org > -- --------------------------------- Priv.-Doz. Dr. med. Martin Weihrauch Facharzt für Innere Medizin, Hämatologie und intern. Onkologie VSCO.NET Elsternweg 6 50997 Köln GERMANY Tel: 02233-6278658 Fax: 02233-6278659 Mob: 0163-9600829 [email protected]
_______________________________________________ http://openpgpjs.org

