Use, Production, and Testing of Pseudo-Random Numbers

Firstly, the generator algorithm must be assumed to be public knowledge. This will help build a system that is secure even against insider hacks. Secondly, the generator must have a very large number of states to protect against a brute force attack, an attempt to find the state value by trying all possibilities. ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download