TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Predicting the rand() and using Cryptographic Random Numbers

3 点作者 shantanugoel大约 16 年前

2 条评论

gliptic大约 16 年前
Bad article. The seed of a cryptographic generator isn't unknown to the programmer. That's not what makes cryptographic generators different. What makes them different is that it's computationally infeasible to derive the seed from the output, or even distinguish the output from random, e.g. tell whether a certain sequence came from this generator.
duskwuff大约 16 年前
There appears to be a distinct lack of actual discussion of "predicting" in this article. It's actually fairly easy to determine the state of simple RNGs by observing their output... I was expecting the article to be about that, not just reiterating the (obvious) fact that using secret data for the seed is good. :)