openssl - Should the same Random Number Generator be used for multiple crypto operations -
is recommendable instantiate openssl or crypto++ cryptographically secure random number generator, seed once, , use sequentially in multiple cryptographic operations generating keys, encryption, signing etc.?
will be secure enough handle multiple uses without compromising security?
is considered safe practice use different prngs each operation , seed them differently? there nuances should considered?
stay same cryptographically secure prng. know seems make more sense change, big mistake apply common sense when higher math called for. never "roll own" crypto, or change methods, or make "improvements" no matter how sense seem make. stick proven methods, tested algorithms, , open source code written people reputation.
cryptographically secure prngs different standard prngs used things monte carlo simulation. designed unpredictable when long sequence of values taken. if try "improve" on switching, more screw up.
also, hardware true rngs cryptographically secure nature, best possible option if have use random.org.
the worst possibly change prngs every key. you're not getting random sequence @ all, sequence hash function of seeds, , seeds , seeding function of each prng.
Comments
Post a Comment