We are attempting to add the random K back into an implementation of the DSA algorithm that doesn't currently have it. It uses a 20 byte K seed that it uses to compute a K but that number never changes. We would like to toss that out and use a random 20 byte number. I looked around and found the NSPR method PR_GetRandomNoise. Would that be ok to use for this purpose or is there something better?

Thanks,
Dave
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to