how to implement random number generator according to mouse move and type keyboard
Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
how to implement random number generator according to mouse move and type keyboard
Hi,
I implementing a RSA cyptographic program. But I am not going to use the SecureRandom that Java supplied. Do I have alternative way to generate a random number based on mouse moving or inputing keyboard?
Linux's PRNG already uses keyboard and mouse inputs as seed values; among other activity (such as disk access). Keyboard and mouse values are not terribly good sources of entropy however, as the English language doesn't have a lot of randomness to it and mouse movement is going to be regulated by whatever task the user is performing.
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660
Rep:
Do not write your own PRNG!!!
Most of the time it's done completely incorrectly, and they're very, very, very easy to screw up and get wrong, leading to very weak keys being generated. Use a vetted PRNG from a commercial security vendor (like, ahem, RSA) or use the operating system's built-in PRNG device. Make sure you do a lot of testing of the OS's PRNG device to ensure that it always generates a sufficient amount of entropy.
The only system that i have seen to be extremely random used 2 microphones as the entropy source. 1 in the server room and 1 outside of the building listening to the environment. 2 completely different sources and non predictable.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.