I don't exactly know as I took the Fortuna code from here:

https://github.com/wxfz/fortuna

There it reads "My implementation of Fortuna (See Wikipedia
<http://en.wikipedia.org/wiki/Fortuna_%28PRNG%29> ) uses 64-pools of
entropy gathered from the browser's clock, mouse position and DOM
content. Entropy is gathered also collected at random intervals and from
mouse movement. There is of course a lot of SHA256 and AES gnashing in
the background."

I looked through the code, too and it seems to exactly do this.

Best regards

Martin

Am 22.06.2013 22:32, schrieb Nils K:
> Am 22.06.2013 14:23, schrieb Dr. M. Weihrauch:
>> Maybe it is cryptographically not secure enough, but I leave this up to
>> discussion.
> The problem does not lie in Fortuna but in how you seed it.
> So how do you seed it?
>
> _______________________________________________
>
> http://openpgpjs.org
>


-- 
---------------------------------
Priv.-Doz. Dr. med. Martin Weihrauch
Facharzt für Innere Medizin,
Hämatologie und intern. Onkologie
VSCO.NET
Elsternweg 6
50997 Köln
GERMANY
Tel: 02233-6278658
Fax: 02233-6278659
Mob: 0163-9600829
[email protected]

_______________________________________________

http://openpgpjs.org

Reply via email to