Add article on how to generate secure random numbers.

This commit is contained in:
Kevin Deldycke 2016-09-08 15:22:20 +02:00
parent d2fca3e5fa
commit 806df870a6
No known key found for this signature in database
GPG Key ID: C572BB01B1ED5A3A

View File

@ -78,6 +78,10 @@ A curated list of cryptography resources and links.
- [SHA1](https://en.wikipedia.org/wiki/SHA-1) - Cryptographic hash function designed by the NSA. SHA-1 produces a 160-bit hash value known as a message digest. SHA-1 is no longer considered secure against well-funded opponents.
- [SHA2](https://en.wikipedia.org/wiki/SHA-2) - Set of hash functions designed by the NSA. SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds.
### Articles
- [How to Generate Secure Random Numbers in Various Programming Languages](https://paragonie.com/blog/2016/05/how-generate-secure-random-numbers-in-various-programming-languages).
### Books
- [A Graduate Course in Applied Cryptography](https://crypto.stanford.edu/~dabo/cryptobook/) - The book covers many constructions for different tasks in cryptography.