Skip to content

Key generation #9

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
jevonearth opened this issue Nov 14, 2018 · 0 comments
Open

Key generation #9

jevonearth opened this issue Nov 14, 2018 · 0 comments

Comments

@jevonearth
Copy link
Contributor

jevonearth commented Nov 14, 2018

This is a placeholder issue related to key generation.

As part of the CII Best Practices which this project is enrolled in, it provides the following requirements around key generation. I have set this to "N/A" in our projects checklist, but this should be updated after this issue has been implemented.

The security mechanisms within the software produced by the project MUST generate all cryptographic keys and nonces using a cryptographically secure random number generator, and MUST NOT do so using generators that are cryptographically insecure. [crypto_random]
A cryptographically secure random number generator may be a hardware random number generator, or it may be a cryptographically secure pseudo-random number generator (CSPRNG) using an algorithm such as Hash_DRBG, HMAC_DRBG, CTR_DRBG, Yarrow, or Fortuna. Examples of calls to secure random number generators include Java's java.security.SecureRandom and JavaScript's window.crypto.getRandomValues. Examples of calls to insecure random number generators include Java's java.util.Random and JavaScript's Math.random.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant