Weirdly enough it now turns out that certain things can be done nearly random, such as the Linux implementation of /dev/random , which uses pretty much random happenings to seed the generator, so that it cannot be duplicated elsewhere. Network traffic is a great source of randomness, which cannot be really replicated the same way for reverse engineering attack, because the time between packets, and collisions occuring are pretty much random, and besides you use other sources of entropy to seed the generator, so it never relies on just one source, and this makes it all the more random. There are now hardware random number generators, which actually are random, since their output is based on quatum events insode atoms, or some thermal charateristics are used as a seed, such as in Intel's Pentium III, so that the output is random in as far that it cannot be replicated on any other machine, becaus eeach chip is sufficiently diffrent at the nano level to guarantee a random output. this heralds in a new age, and could result in much stronger criptography, that is the current criptographic technigues are much harder to break, when they have a truly random number source to generate the keys. (And it means you no longer have to type on keyboard some nonsense, or move mouse spasmatically to generate a key, but it would still be bbetter to have two sources of random data, because that means even more randomness in overall scheme of things, which is always better for encryption, so do not expect that hand waving key generation ritual to go away any time soon. (Besides it has to be there for compatibility with things, that do not have hardware /dev/random.)
Last Modified:Don't go around saying the world owes you a living. The world owes you nothing. It was here first. -- Mark Twain