|
Lines 94-100
Link Here
|
| 94 |
and thus have some success in guessing the output of the routine. |
94 |
and thus have some success in guessing the output of the routine. |
| 95 |
Phil Karn (who devised this mechanism of using MD5 plus a counter |
95 |
Phil Karn (who devised this mechanism of using MD5 plus a counter |
| 96 |
to extract random numbers from an entropy pool) calls this |
96 |
to extract random numbers from an entropy pool) calls this |
| 97 |
"practical randomness", since in the worse case this is equivalent |
97 |
"practical randomness", since in the worst case this is equivalent |
| 98 |
to hashing MD5 with a counter and an undisclosed secret. If MD5 is |
98 |
to hashing MD5 with a counter and an undisclosed secret. If MD5 is |
| 99 |
a strong cryptographic hash, this should be fairly resistant to attack. |
99 |
a strong cryptographic hash, this should be fairly resistant to attack. |
| 100 |
.Ss Exported interfaces \(em output |
100 |
.Ss Exported interfaces \(em output |