The strength of any cryptosystem depends in large part on the unpredictability of the data used in the encryption process. Unfortunately, some of today’s most commonly used sources of “random” data depend on inputs that have the potential to inject predictable data, and therefore weakness, into the process.
This whitepaper explains:
- Why random matters
- Common approaches and their weaknesses
- How to roll out enterprise-wide encryption management