I'm trying to find out the differences between /dev/random
and /dev/urandom
files
/dev/random
and /dev/urandom
? The /dev/urandom device provides a reliable source of random output, however the output will not be generated from an equal amount of random input if insufficient input is available. Reads from the /dev/urandom device always return the quantity of output requested without blocking.
/dev/urandom and /dev/random use the same random number generator. They both are seeded by the same entropy pool. They both will give an equally random number of an arbitrary size. They both can give an infinite amount of random numbers with only a 256 bit seed.
/dev/random uses a lot of system entropy, and so produces only a slow data stream. /dev/urandom is less secure, and faster, but it's still geared towards smaller chunks of data - it's not meant to provide a continuous stream of high speed random numbers.
The /dev/random and /dev/urandom files are special files that are a source for random bytes generated by the kernel random number generator device. The /dev/random and /dev/urandom files are suitable for applications requiring high quality random numbers for cryptographic purposes.
Using /dev/random
may require waiting for the result as it uses so-called entropy pool, where random data may not be available at the moment.
/dev/urandom
returns as many bytes as user requested and thus it is less random than /dev/random
.
As can be read from the man page:
random
When read, the
/dev/random
device will only return random bytes within the estimated number of bits of noise in the entropy pool./dev/random
should be suitable for uses that need very high quality randomness such as one-time pad or key generation. When the entropy pool is empty, reads from/dev/random
will block until additional environmental noise is gathered.
urandom
A read from the
/dev/urandom
device will not block waiting for more entropy. As a result, if there is not sufficient entropy in the entropy pool, the returned values are theoretically vulnerable to a cryptographic attack on the algorithms used by the driver. Knowledge of how to do this is not available in the current unclassified literature, but it is theoretically possible that such an attack may exist. If this is a concern in your application, use/dev/random
instead.
For cryptographic purposes you should really use /dev/random
because of nature of data it returns. Possible waiting should be considered as acceptable tradeoff for the sake of security, IMO.
When you need random data fast, you should use /dev/urandom
of course.
Source: Wikipedia page, man page
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With