Generating Random Numbers for Cryptography with Lava Lamps
Generating Random Numbers for Cryptography with Lava Lamps
Generating Random Numbers for Cryptography with Lava Lamps? Yes, this is a serious article.
Cryptography often requires random numbers. From seed values to cryptographic key material to data obfuscation values to actual keys, random numbers are incredibly important.
If there’s one thing that computers really suck at, it is generating random numbers. Computers are designed to carry out predictable behavior. We don’t want random things happening with our spreadsheets, with our data storage, with the keys that we press on the keyboard. So getting a computer not designed to generate a random number to actually generate a true random number is a challenge.
Sure there have been attempts. These have included methods as basic as taking the millisecond value of the current timestamp or the value of a CPU register or memory location, or even counting the number of files on the local hard drive at any given moment and dividing by pi. But these are poor attempts and do not generate truly random numbers. At best they are predictable.
There are also mathematical algorithms… but they’re dry and boring.
My favorite random number generator is also the most entertaining. It digitizes the current state of a set of Lava Lamps to generate a value. Aptly named Lavarand, it works on the basis that the state of several Lava Lamps at any moment in the future is not predictable and that the past state cannot be recreated in the future. Lavarand was originally created by Silicon Graphics and now makes its home (renamed as Lavarnd) at Cisco.
Be well and be safe!
Mike Danseglio -CISSP / CEH
Interface Technical Training – Technical Director and Instructor
You May Also Like
actual keys, CEH, CISSP, Cryptography, data obfuscation, IT Security, Lava Lamps, Lavarand, Lavarnd, random number generator, random numbers, Silicon Graphics
Windows 10 Managing, Deploying and Configuring – December 2, 2015
0 444 1In this recorded Windows 10 training webinar from December 2, 2015, Windows Server instructor Rick Trader presents the deployment and management of Windows 10 Enterprise and the new Provisioning capability in Windows 10. Learn how to manage Windows 10 deployments using System Center Configuration Manager, Mobile Device Management and Intune. Also included in his presentation … Continue reading Windows 10 Managing, Deploying and Configuring – December 2, 2015
JavaScript for C# Developers – September 24, 2014
0 491 3Is JavaScript worth taking the time to learn if I’m a server-side .NET developer? How much of C# carries over to JavaScript? In this recorded video from Dan Wahlin’s webinar on September 24,2014, Dan answers these questions and more while also discussing similarities between the languages, key differences, and the future of JavaScript (ES6). If … Continue reading JavaScript for C# Developers – September 24, 2014
Detailed Forensic Investigation of Malware Infections – April 21, 2015
4 647 5How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015