> Where can I get more information on the implementation of randomness > produced by the IM noise component?
ImageMagick randomness is nearly crytographically strong. Nearly because we took the code from a security application (which we wrote) but took out just a few of the seeding sources and we don't save/get entropy from a reservoir on disk. We seed the random reservoir with the current time in seconds and nano seconds, the process pid, and if its exists /dev/urandom. For crytographically strong applications one would use /dev/random. We munge the randomness with a nonce and generate a SHA-256 digest and finally generate a random value as a double-precision floating-point value uniformly distributed over the interval [0.0, 1.0) with a 2 to the 128th-1 period. We do not have a formal paper on this algorithm but consider it best-practices for nearly crytographically strong random numbers. You can assure yourself by using standard random number statistical test. Or take a look at ImageMagick-6.2.8-8/magick/random.c. _______________________________________________ Magick-users mailing list [email protected] http://studio.imagemagick.org/mailman/listinfo/magick-users
