From: Tom St Denis on
On Jan 20, 11:50 am, jmorton123 <jmorton...(a)rock.com> wrote:
> I've made available on my website several basic random number utility
> programs all of which are freeware.  One is a true random number
> generator.  Of course to implement a true random number generator you
> must have a random source phenomenon.  That's where you come in:  YOU
> are the random source.  Here's how it works in a nutshell:

You do realize the most modern OSes trap interrupts and events to
harvest entropy from right? Even Windows has a CSP function
CryptGenRandom() [or something like that] for reading RNG output. In
most *NIX OSes you'd use /dev/urandom.

Tom
From: Dave -Turner on
great, now you've blown the secret :)


From: jmorton123 on
The clock time used is 1000 ticks per second. If there is a bias it
must be incrediblly small because a computer cannont fuction with any
significant clock bias nor can an operating system. Furthermore, any
insignifiant bias which you indicate that may be present is completely
washed out by the randomness of the click moments entered by the
user. Lastly, you need to ask youself: can these random numbers be
reproduced? I think not. Thank you.

I cosmetically updated 4 of the utility programs by changing the
wording on a button from "Character" to "Decimal" and / or added the
word "decimal" in the instructions to these files:

BinaryToCharacter.exe
ButtonRows.exe
RandomClick.exe
RandomClick_True.exe



On Jan 20, 9:00 am, unruh <un...(a)wormhole.physics.ubc.ca> wrote:
> On 2010-01-20, jmorton123 <jmorton...(a)rock.com> wrote:
>
>
>
>
>
> > Nine years ago I used to frequent this group regularly.  On 9/11 I
> > took down my site.  To cut to the chase:
>
> > Everyone knows that the key (pun intended) to encryption security is
> > having a source of random numbers.  True random number generators have
> > been discussed often enough.
>
> > I've made available on my website several basic random number utility
> > programs all of which are freeware.  One is a true random number
> > generator.  Of course to implement a true random number generator you
> > must have a random source phenomenon.  That's where you come in:  YOU
> > are the random source.  Here's how it works in a nutshell:
>
> > When you start the  program it saves the system time.  Each time you
> > click the mouse or press the enter key, the time is once again
> > stored.  Then the start time is subtracted from the mouse click time.
> > Then this difference is used to access an array that contains the
> > binary numbers from 0 - 255.
>
> That does nothing for the randomness.
> That time is liable to have large biases in it, that this will not
> eliminate,
>
>
>
> > So with each click the time difference will continuously vary and thus
> > the array access will continuously vary and the generated number will
> > continuously vary.  I recommend that you vary your click rate perhaps
> > by varying which fingers you use and by changing up between the mouse
> > click and the enter key press.
>
> I sure would not trust this to deliver random numbers with very high
> entropy.
>
> What you need to do is to analyse the generators so as to be able to
> estimate their "randomness".
>
>
>
>
>
> > Some of the other utilities available may be useful to you for general
> > purposes such as a utility that reads a binary file and exports the
> > same file in character format.  Or a utility that will append one file
> > to a second file.  Or a utility that will XOR any one file with
> > another.  Again, all of these utilities are freeware and there is
> > nothing for sale on the website.  Just click and download.
>
> > Here's the URL:  http://www.kingkonglomerate.com Detailed
> > instructions of each utility program are on the download page and
> > included within each freeware program.- Hide quoted text -
>
> - Show quoted text -- Hide quoted text -
>
> - Show quoted text -

From: Noob on
Tom St Denis wrote:

> You do realize the most modern OSes trap interrupts and events to
> harvest entropy from right? Even Windows has a CSP function
> CryptGenRandom() [or something like that] for reading RNG output. In
> most *NIX OSes you'd use /dev/urandom.

Or /dev/random depending on the situation.

http://en.wikipedia.org/wiki//dev/random
From: Tom St Denis on
On Jan 21, 11:03 am, Noob <r...(a)127.0.0.1> wrote:
> Tom St Denis wrote:
> > You do realize the most modern OSes trap interrupts and events to
> > harvest entropy from right?  Even Windows has a CSP function
> > CryptGenRandom() [or something like that] for reading RNG output.  In
> > most *NIX OSes you'd use /dev/urandom.
>
> Or /dev/random depending on the situation.
>
> http://en.wikipedia.org/wiki//dev/random

There's usually no real need to use random over urandom [hint: they're
both adequate but equally miserably written].

Tom