[vox-tech] random # gen seeds
Matt Holland
vox-tech@lists.lugod.org
Fri, 15 Mar 2002 09:38:35 -0800
The program is a fairly simple stochastic simulation -- it does the
simulation, collects the information I want, and spits it out to
standard output. I've been automating multiple runs of the simulation
from within a Perl script, which is how I noticed the 6 runs per second
phenomenon. I realize that I could change the design so that several
simulations are run from another block of C code that sets the seed less
frequently, but in my opinion the current design is the most natural,
and the most convenient from the perspective of automation.
Anyway, Mark's gettimeofday suggestion seems to have resolved the
problem. As long as I don't find a machine that can run sims more than
once per microsecond, I should be fine!
Matt
msimons@moria.simons-clan.com wrote:
> On Wed, Mar 13, 2002 at 08:46:07PM -0800, Mark K. Kim wrote:
>
>>gettimeofday returns a structure with seconds as well as microseconds.
>>You can use the microseconds portion as the seed. However, there is a
>>resolution issue with microseconds, which may or may not be a problem, so
>>you probably want to mix up the seconds with the microseconds somehow.
>>
>>Also, you can read /dev/random.
>>
>>On Wed, 13 Mar 2002, Matt Holland wrote:
>>
>>>I need to generate more than one random number generator seed per second
>>>within a C program (I have a program that runs about 6 times a second,
>>>and I need unique seeds for each run). time(0) only gives me a
>>>resolution of 1 second... any suggestions?
>>>
>
> Matt,
>
> Both of Mark's suggestions are good (gettimeofday, /dev/random)
>
> However, I doubt your application needs data from /dev/random and would
> recommend using urandom instead (man urandom(4) for details). When using
> /dev/random there is a risk that if you try to run get too much from it
> you will starve "the entropy pool" and your application will lock up
> waiting for more entropy.
> So if possible the best option would be reading data from /dev/urandom.
>
> I would also suggest that you reconsider how your overall application
> works... possibly try to restructure it so that you start one application
> which gets one random seed and does whatever you wanted to do 6 times
> a second itself, instead of starting hundreds of very short lived
> processes.
> Can you provide any more details about what you are doing?
>
> TTFN,
> Mike
>
>
> from urandom(4):
> # When read, the /dev/random device will only return random
> # bytes within the estimated number of bits of noise in the
> # entropy pool. /dev/random should be suitable for uses
> # that need very high quality randomness such as one-time
> # pad or key generation. When the entropy pool is empty,
> # reads to /dev/random will block until additional environ-
> # mental noise is gathered.
> #
> # When read, /dev/urandom device will return as many bytes
> # as are requested. As a result, if there is not sufficient
> # entropy in the entropy pool, the returned values are theo-
> # retically vulnerable to a cryptographic attack on the
> # algorithms used by the driver. Knowledge of how to do
> # this is not available in the current non-classified liter-
> # ature, but it is theoretically possible that such an
> # attack may exist. If this is a concern in your applica-
> # tion, use /dev/random instead.
> _______________________________________________
> vox-tech mailing list
> vox-tech@lists.lugod.org
> http://lists.lugod.org/mailman/listinfo/vox-tech
>