10-08-2004
Yes I will certainly not abandon interactive mode. Non-interactive mode will be in addition to interactive mode. In addition to gathering entropy from the user, I like to present the user with many passwords. Then the user can pick one that seems easy to remember or whatever.
And cryptographic strength in a random number generator does not mean that any encryption is happening. Take a look at my primary random number generator:
code:--------------------------------------------------------------------------------
#! /usr/bin/ksh
bc |&
typeset -Z16 Smaster_mwcrng
Smaster_mwcrng=0
Cmaster_mwcrng=0
Xmaster_mwcrng=0
function master_mwcrng {
print -p "999999*$Xmaster_mwcrng+$Cmaster_mwcrng"
read -p Smaster_mwcrng
Cmaster_mwcrng=${Smaster_mwcrng%????????}
Xmaster_mwcrng=${Smaster_mwcrng##????????*(0)}
[[ -z $Xmaster_mwcrng ]] && Xmaster_mwcrng=0
}
echo S=$Smaster_mwcrng C=$Cmaster_mwcrng X=$Xmaster_mwcrng
print -n "Enter a seed - "
read Xmaster_mwcrng
i=0
while ((i<30)) ; do
((i=i+1))
master_mwcrng
echo S=$Smaster_mwcrng C=$Cmaster_mwcrng X=$Xmaster_mwcrng
done
exit 0
S=0000000000000000 C=0 X=0
Enter a seed - 27
S=0000000026999973 C=00000000 X=26999973
S=0026999946000027 C=00269999 X=46000027
S=0045999981269972 C=00459999 X=81269972
S=0081269891190027 C=00812698 X=91190027
S=0091189936622671 C=00911899 X=36622671
S=0036622635289228 C=00366226 X=35289228
S=0035289193076998 C=00352891 X=93076998
S=0093076905275893 C=00930769 X=5275893
S=0005275888654876 C=00052758 X=88654876--------------------------------------------------------------------------------
The X's are random numbers. This generator will pass any random number test you throw at it. But suppose you knew the first three numbers:
26999973
46000027
81269972
You could have a database of the first three numbers for every possible seed. You could look up these three numbers. Now you know that the seed was 27. And so you can predict every other random number that this generator will output. Thus this random number generator is said to be cryptographically weak. A cryptographically strong RNG is unpredictable.
Just for the heck of it, I wanted a cryptographically strong RNG. So what I do is call the main RNG 500 times and load the results into an array. Then when a command is entered, one of 60 auxiliary RNG's is selected based loosely on the SECONDS variable. This RNG generates a number between 0 and 499. That element of the array is returned and the master RNG is called again to replace it. There's a lot more to it...this is the reader's digest version. Suffice it to say that if you give me the first n random numbers that it outputs, I cannot predict n+1. And it's not just that I don't have enough computers. Infinite computing resources still would not do it. I would also need to know what commands you are entering and the value of the system clock each time that you press return. In addition the automatic stuff that happens, there are user commands to restart the RNG's, scramble the arrays, etc.
In a command line driven version, I will have to select one auxiliary RNG and go with that. No it won't be as secure. The output will be just as good. The danger would come from an evil Perderabo on the system while the password generator is running. He *might* be able to to acquire enough information to guess the generated password.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello Friends,
I have a problem with install.can u tell me how can I install a programm?I use AIX(IBM) system.
And how can i access cd-rom?I can't mounted,coz i am not Root.(can u tell me another Command /way)?
Thanks all. (1 Reply)
Discussion started by: Christianto
1 Replies
2. UNIX for Dummies Questions & Answers
Hello Friends,
I have a problem with install.Can u tell me,how can i install a program?I am not a Root.n i use AIX(IBM) system.n how can i access a cdrom?I have been tried it,but didn't work.I can'n mounted(can u tell me another way or Command)?
thanks all. (3 Replies)
Discussion started by: Christianto
3 Replies
3. UNIX for Dummies Questions & Answers
Okee problems...!!
What is happening: Unix server with some programms, workstations are windows 2000, the workstations work good but when you start a programm on the Unix server the CPU of the workstations go to 100% usage resulting that the system gets very slow. The programm well its running so... (2 Replies)
Discussion started by: zerocool
2 Replies
4. Programming
Dear Export,
I want to begin an serial-communication application codes associated with TTY devices. But I don't know what key settings should be concerned after opening a TTY device file under UNIX plarform(SunOS 5.7)?
Could you give me some adivce? Thanks! (8 Replies)
Discussion started by: WayneYang
8 Replies
5. Programming
I have the programm, that says to STDERR(not to STDOUT!): "hello world!" and this programm is compiled and I have no sources.
When I try to open this programm in another using C:
=======================================
FILE *pp = popen("hello_to_stderr.exe", "r");
int c;
string a;
... (2 Replies)
Discussion started by: shalmoo
2 Replies
6. Shell Programming and Scripting
Hi,
How to embeded programme within perl programme.
Shankarao (2 Replies)
Discussion started by: shankarao
2 Replies
7. Shell Programming and Scripting
Problem with links programm.
Hi!
I write sctipt for aytomatic checking into IE stas.html ->
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8"/>
<script type="text/javascript" src="newdata.submit()"></script>
</head>
<body... (1 Reply)
Discussion started by: beckss
1 Replies
8. Shell Programming and Scripting
Hi guys,
i am new to shell can u please explain how to get those two outputs
in temp1
i have i/p like
abcd
edk
lkg
jkl
loop
i need o/p
abcd *********
edk**********
lkg ***********
jkl ***********
loop************
need o/p
abcd
*************** (2 Replies)
Discussion started by: ashokkrishna063
2 Replies
9. Shell Programming and Scripting
Hello
Any Unix programm can help me to solve thsi issue:
I have 2 venn digrams please checke the attached file for pictures of venn diagram for eg red is A yellow is B and green is C..Please see attached file for Venn diagrams
In one .....
I have 3 data set A , B and C
Venn diagram... (0 Replies)
Discussion started by: manigrover
0 Replies
ESD(1) Enlightened Sound Daemon ESD(1)
NAME
esd - The Enlightened Sound Daemon
DESCRIPTION
Starts up EsounD, which provides a sound mixing server.
USAGE
esd [options]
-d DEVICE force esd to use sound device DEVICE
-b run server in 8 bit sound mode
-r RATE run server at sample rate of RATE
-as SECS free audio device after SECS of inactivity (-1 to disable)
-unix use unix domain sockets instead of tcp/ip
-tcp use tcp/ip sockets instead of unix domain
-public make tcp/ip access public (other than localhost)
-promiscuous start unlocked and owned (disable authenticaton) NOT RECOMMENDED
-terminate terminate esd daemon after last client exits
-noterminate do not terminate esd daemon after last client exits
-nobeeps disable startup beeps
-beeps enable startup beeps
-trust start esd even if use of /tmp/.esd can be insecure
-port PORT listen for connections at PORT (only for tcp/ip)
-bind ADDRESS binds to ADDRESS (only for tcp/ip)
-v --version print version information
Possible devices are: /dev/dsp, /dev/dsp2, etc.
FILES
/etc/esd.conf daemon configuration file
SEE ALSO
esdcat(1), esddsp(1), esdloop(1), esdplay(1), esdsample(1), esd-config(1), esdctl(1), esdfilt(1), esdmon(1), esdrec(1)
3rd Berkeley Distribution EsounD 0.2.41 ESD(1)