20 or the extent to which the number is random).</p><p>In Symbian platform, the |
20 or the extent to which the number is random).</p><p>In Symbian platform, the |
21 CSPRNG is implemented in the kernel. This provides the kernel and user-level |
21 CSPRNG is implemented in the kernel. This provides the kernel and user-level |
22 threads and processes easy access to secure random numbers. For an overview |
22 threads and processes easy access to secure random numbers. For an overview |
23 of the various APIs by means of which the CSPRNG can be accessed, see <xref href="GUID-BAA558C1-8613-43A0-899E-F53DCAA68F4B.dita">APIs for Accessing Random |
23 of the various APIs by means of which the CSPRNG can be accessed, see <xref href="GUID-BAA558C1-8613-43A0-899E-F53DCAA68F4B.dita">APIs for Accessing Random |
24 Number Generator</xref>.</p> </section> |
24 Number Generator</xref>.</p> </section> |
25 <section id="GUID-B5BD3E1A-AFBB-5526-B5EA-8FA51A17E596-GENID-1-12-1-17-1-1-11-1-5-1-19-1-2-2"><title>Description</title> <p>The |
25 <section id="GUID-B5BD3E1A-AFBB-5526-B5EA-8FA51A17E596-GENID-1-12-1-18-1-1-11-1-5-1-19-1-2-2"><title>Description</title> <p>The |
26 CSPRNG uses Hash_DRBG algorithm to generate pseudo-random number. Hash_DRBG |
26 CSPRNG uses Hash_DRBG algorithm to generate pseudo-random number. Hash_DRBG |
27 algorithm is a standard recommended by National Institute of Secure Technology |
27 algorithm is a standard recommended by National Institute of Secure Technology |
28 (<xref href="http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf" scope="external">NIST SP800-90</xref>), which uses cryptographic hash functions |
28 (<xref href="http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf" scope="external">NIST SP800-90</xref>), which uses cryptographic hash functions |
29 (SHA-256) to generate random numbers. The strength of CSPRNG not only depends |
29 (SHA-256) to generate random numbers. The strength of CSPRNG not only depends |
30 on the generation algorithm, but also on the strength of entropy input. </p><p>A |
30 on the generation algorithm, but also on the strength of entropy input. </p><p>A |