|
On Wed, Apr 25, 2001 at 01:57:10PM +0100, Paul Cunnane wrote: > Caveat: every time you run this, you will get the same sequence of `random' > numbers. To get more truly pseudo-random numbers, seed the generator with > (say) the result of the TIME opcode. Does OS/400 have some source of truly random data? I'm think specifically of something analogous to many Unix implementations' /dev/random, which gives access to a small pool of bits derived from random sources like hardware interrupts and keypresses. In unix programming it is often customary to read a bute from /dev/random and use that byte to seed a psuedo-random number generator. Also, there exists a class of random number generators known as "cryptographically secure". These are programs that have a very large period and are difficult to invert. THey also tend to be slower than "normal" PRNGs. For more information, look at Bruce Schneier's book, _Applied Cryptography_. +--- | This is the RPG/400 Mailing List! | To submit a new message, send your mail to RPG400-L@midrange.com. | To subscribe to this list send email to RPG400-L-SUB@midrange.com. | To unsubscribe from this list send email to RPG400-L-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: david@midrange.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.