diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2014-02-06 12:59:03 -0600 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2014-02-06 12:59:03 -0600 |
commit | bddc84f3b0244ca99022908df83e4b12918b4660 (patch) | |
tree | b17e104e87ce88a97a216eaa557c12db9b90ca08 /docs | |
parent | bf7dbbba339e33268c911a8f0c88f6d6895b490d (diff) | |
parent | cb157160f046e4e3051128c321f2f607c6f9995e (diff) | |
download | cryptography-bddc84f3b0244ca99022908df83e4b12918b4660.tar.gz cryptography-bddc84f3b0244ca99022908df83e4b12918b4660.tar.bz2 cryptography-bddc84f3b0244ca99022908df83e4b12918b4660.zip |
Merge pull request #570 from alex/use-urandom
Fixed #568 -- Document that users should use urandom for all their rando...
Diffstat (limited to 'docs')
-rw-r--r-- | docs/index.rst | 1 | ||||
-rw-r--r-- | docs/random-numbers.rst | 20 |
2 files changed, 21 insertions, 0 deletions
diff --git a/docs/index.rst b/docs/index.rst index 49e99be4..9114b895 100644 --- a/docs/index.rst +++ b/docs/index.rst @@ -59,6 +59,7 @@ The recipes layer :maxdepth: 2 fernet + random-numbers exceptions glossary diff --git a/docs/random-numbers.rst b/docs/random-numbers.rst new file mode 100644 index 00000000..c8f95fd8 --- /dev/null +++ b/docs/random-numbers.rst @@ -0,0 +1,20 @@ +Random number generation +======================== + +When generating random data for use in cryptographic operations, such as an +initialization vector for encryption in +:class:`~cryptography.hazmat.primitives.ciphers.modes.CBC` mode, you do not +want to use the standard :mod:`random` module APIs. This is because they do not +provide a cryptographically secure random number generator, which can result in +major security issues depending on the algorithms in use. + +Therefore, it is our recommendation to always use your operating system's +provided random number generator, which is available as ``os.urandom()``. For +example, if you need 16 bytes of random data for an initialization vector, you +can obtain them with: + +.. doctest:: + + >>> import os + >>> os.urandom(16) + '...' |