Thanks,
well I decided not to change the random generation method.
I've managed to solve my problem by counting how many random octets are
needed for key generation at various bitlengths, so now I can pass an array
of random octets to the worker thread at the beginning. The worker then
gets its random octets from this array.


2013/11/2 Tankred Hase <[email protected]>

> > So what you're saying in 1.) is have a JS pseudorandom generator that
> always uses one real random number as seed? Wouldn't this be less secure
> than generating n different real random numbers?
>
> All random numbers in a digital system are never really random.
> They're just hard to guess/predict...  which is good enough for
> crypto. If you seed a good PRNG with enough entropy you should be
> fine.
> _______________________________________________
>
> http://openpgpjs.org
> Subscribe/unsubscribe: http://list.openpgpjs.org
>
_______________________________________________

http://openpgpjs.org
Subscribe/unsubscribe: http://list.openpgpjs.org

Reply via email to