Method of Operation
Microsoft-provided cryptography providers share the same implementation of CryptGenRandom, currently based on an internal function called RtlGenRandom. Only a general outline of the algorithm had been published as of 2007:
generates as specified in FIPS 186-2 appendix 3.1 with SHA-1 as the G function. And with entropy from:
- The current process ID (GetCurrentProcessID).
- The current thread ID (GetCurrentThreadID).
- The tick count since boot time (GetTickCount).
- The current time (GetLocalTime).
- Various high-precision performance counters (QueryPerformanceCounter).
- An MD4 hash of the user's environment block, which includes username, computer name, and search path.
- High-precision internal CPU counters, such as RDTSC, RDMSR, RDPMC
Read more about this topic: Crypt Gen Random
Famous quotes containing the words method of, method and/or operation:
“I do not know a method of drawing up an indictment against a whole people.”
—Edmund Burke (17291797)
“There is no method but to be very intelligent.”
—T.S. (Thomas Stearns)
“Waiting for the race to become official, he began to feel as if he had as much effect on the final outcome of the operation as a single piece of a jumbo jigsaw puzzle has to its predetermined final design. Only the addition of the missing fragments of the puzzle would reveal if the picture was as he guessed it would be.”
—Stanley Kubrick (b. 1928)