> Where can I get more information on the implementation of randomness
> produced by the IM noise component?

ImageMagick randomness is nearly crytographically strong.  Nearly because
we took the code from a security application (which we wrote) but took
out just a few of the seeding sources and we don't save/get entropy from a
reservoir on disk.  We seed the random reservoir with the current time in
seconds and nano seconds, the process pid, and if its exists /dev/urandom.
For crytographically strong applications one would use /dev/random.
We munge the randomness with a nonce and generate a SHA-256 digest and
finally generate a random value as a double-precision floating-point value
uniformly distributed over the interval [0.0, 1.0) with a 2 to the 128th-1
period.  We do not have a formal paper on this algorithm but consider it
best-practices for nearly crytographically strong random numbers.  You can
assure yourself by using standard random number statistical test.  Or
take a look at ImageMagick-6.2.8-8/magick/random.c.
_______________________________________________
Magick-users mailing list
[email protected]
http://studio.imagemagick.org/mailman/listinfo/magick-users

Reply via email to