Is it recommendable to instantiate a random number generator (in OpenSSL or in Crypto++), seed it once, and use it sequentially in multiple cryptographic operations like generating keys, encryption, signing etc.?
Or is it better to use different PRNGs for each operation and seed them differently? What is the standard practice or industry-accepted norm?
Aucun commentaire:
Enregistrer un commentaire