%%% it under the terms of the GNU Library General Public License as
%%% published by the Free Software Foundation; either version 2 of the
%%% License, or (at your option) any later version.
%%% it under the terms of the GNU Library General Public License as
%%% published by the Free Software Foundation; either version 2 of the
%%% License, or (at your option) any later version.
%%% Catacomb is distributed in the hope that it will be useful,
%%% but WITHOUT ANY WARRANTY; without even the implied warranty of
%%% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
%%% GNU Library General Public License for more details.
%%% Catacomb is distributed in the hope that it will be useful,
%%% but WITHOUT ANY WARRANTY; without even the implied warranty of
%%% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
%%% GNU Library General Public License for more details.
%%% You should have received a copy of the GNU Library General Public
%%% License along with Catacomb; if not, write to the Free
%%% Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
%%% You should have received a copy of the GNU Library General Public
%%% License along with Catacomb; if not, write to the Free
%%% Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
superficially similar to (for example) the Linux and OpenBSD random number
generators, it introduces a number of its own innovations which improve
both security and performance.
superficially similar to (for example) the Linux and OpenBSD random number
generators, it introduces a number of its own innovations which improve
both security and performance.
The Catacomb generator uses an optional secret key, which can provide
additional security against forward state compromise extension. It uses a
catastrophic reseeding operation to prevent a compromise yielding
The Catacomb generator uses an optional secret key, which can provide
additional security against forward state compromise extension. It uses a
catastrophic reseeding operation to prevent a compromise yielding
\bibitem{cp:rand}
J.~Kelsey, B.~Schneier, D.~Wagner, and C.~Hall, ``Cryptographic Attacks on
Pseudorandom Number Generators'', \emph{Fast Software Encryption, Fifth
\bibitem{cp:rand}
J.~Kelsey, B.~Schneier, D.~Wagner, and C.~Hall, ``Cryptographic Attacks on
Pseudorandom Number Generators'', \emph{Fast Software Encryption, Fifth