Am 18.06.2012 01:48 schrieb Paul Rubin:
Steven D'Aprano<steve+comp.lang.pyt...@pearwood.info>  writes:
/dev/urandom isn't actually cryptographically secure; it promises not to
block, even if it has insufficient entropy. But in your instance...

Correct. /dev/random is meant to be used for long-lasting
cryptographically-significant uses, such as keys. urandom is not.

They are both ill-advised if you're doing anything really serious.

Hm?


> In practice if enough entropy has been in the system to make a key with
/dev/random, then urandom should also be ok.

Right.


> Unfortunately the sensible
interface is missing: block until there's enough entropy, then generate
data cryptographically, folding in new entropy when it's available.

What am I missing? You exactly describe /dev/random's interface.


Thomas
--
http://mail.python.org/mailman/listinfo/python-list

Reply via email to