Timeline for Relation between seed entropy of a CSPRNG and the output entropy
Current License: CC BY-SA 4.0
3 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jan 21, 2024 at 14:40 | vote | accept | Rand0mMan | ||
| Jan 21, 2024 at 14:40 | |||||
| Jan 21, 2024 at 14:40 | comment | added | Rand0mMan | Ok. That's makes sense. So the Linux CSPRNG cannot give out more than 256bits of entropy and we can't really implement an encryption algorithm on Linux using getrandom exclusively and requiring a key of more than 256 bits (of entropy). But that's okay because 256 bits is already extremely secure. | |
| Jan 20, 2024 at 15:22 | history | answered | Paul Uszak | CC BY-SA 4.0 |