Generating Random Numbers for Cryptography with Lava Lamps

Home > Blogs > Security > Generating Random Numbers for Cryptography with Lava Lamps

Generating Random Numbers for Cryptography with Lava Lamps

Like This Blog 0 Mike Danseglio
Added by May 2, 2013

Generating Random Numbers for Cryptography with Lava Lamps? Yes, this is a serious article.

Cryptography often requires random numbers. From seed values to cryptographic key material to data obfuscation values to actual keys, random numbers are incredibly important.

If there’s one thing that computers really suck at, it is generating random numbers. Computers are designed to carry out predictable behavior. We don’t want random things happening with our spreadsheets, with our data storage, with the keys that we press on the keyboard. So getting a computer not designed to generate a random number to actually generate a true random number is a challenge.

Sure there have been attempts. These have included methods as basic as taking the millisecond value of the current timestamp or the value of a CPU register or memory location, or even counting the number of files on the local hard drive at any given moment and dividing by pi. But these are poor attempts and do not generate truly random numbers. At best they are predictable.

There are also mathematical algorithms… but they’re dry and boring.

My favorite random number generator is also the most entertaining. It digitizes the current state of a set of Lava Lamps to generate a value. Aptly named Lavarand, it works on the basis that the state of several Lava Lamps at any moment in the future is not predictable and that the past state cannot be recreated in the future. Lavarand was originally created by Silicon Graphics and now makes its home (renamed as Lavarnd) at Cisco.

Be well and be safe!

Mike Danseglio -CISSP / CEH
Interface Technical Training – Technical Director and Instructor

Videos You May Like

Agile Methodology in Project Management

0 130 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 570 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 525 3

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.