On Fri, Aug 17, 2012 at 04:38:06PM +0200, Zabrane Mickael wrote:The simple answer is as mentioned before in this thread
> Hi Samuel,
> Great feedbacks.
> I'll try to find out how to generate good seeds.
to use crypto:strong_rand_bytes/1, as it will with OS and library
support take care of the seeding itself. This will be
what is considered secure enough by the writers of OpenSSL.
strong_rand_bytes(N) -> binary()
Generates N bytes randomly uniform 0..255, and returns the
May throw exception low_entropy in case the random generator
> On Aug 17, 2012, at 12:53 PM, Samuel wrote:
> >> The second implementation is more secure in that sense, but still the
> >> So, how one can generate a secure un-predicatable seeds?
> > That's the tricky part :) At least you have to avoid generating
> > crypto:strong_rand_bytes strives for better security properties, and I
> > I am not a security expert by far, I just know some things that do not
> > Of course, whether that approach is advisable or not is more a
> >> We also moved to "Tiny Mersenne Twister"
> > As said, I am not a security expert, but as far as I can read, the
> > Anyway, you always need a seed no one can guess. Same seed, same
> > Regards
/ Raimo Niskanen, Erlang/OTP, Ericsson AB
You must Sign in before you can post messages.
To post a message you must first join this group.
Please update your nickname on the subscription settings page before posting.
You do not have the permission required to post.