Crypt Gen Random - Method of Operation

Method of Operation

Microsoft-provided cryptography providers share the same implementation of CryptGenRandom, currently based on an internal function called RtlGenRandom. Only a general outline of the algorithm had been published as of 2007:

generates as specified in FIPS 186-2 appendix 3.1 with SHA-1 as the G function. And with entropy from:

  • The current process ID (GetCurrentProcessID).
  • The current thread ID (GetCurrentThreadID).
  • The tick count since boot time (GetTickCount).
  • The current time (GetLocalTime).
  • Various high-precision performance counters (QueryPerformanceCounter).
  • An MD4 hash of the user's environment block, which includes username, computer name, and search path.
  • High-precision internal CPU counters, such as RDTSC, RDMSR, RDPMC
Source: Writing Secure Code, Second Edition. ISBN 0-7356-1722-8.

Read more about this topic:  Crypt Gen Random

Famous quotes containing the words method of, method and/or operation:

    Too poor for a bribe, and too proud to importune,
    He had not the method of making a fortune.
    Thomas Gray (1716–1771)

    in the absence of feet, “a method of conclusions”;
    “a knowledge of principles,”
    in the curious phenomenon of your occipital horn.
    Marianne Moore (1887–1972)

    An absolute can only be given in an intuition, while all the rest has to do with analysis. We call intuition here the sympathy by which one is transported into the interior of an object in order to coincide with what there is unique and consequently inexpressible in it. Analysis, on the contrary, is the operation which reduces the object to elements already known.
    Henri Bergson (1859–1941)