25:
152:
For a seed to be used in a pseudorandom number generator, it does not need to be random. Because of the nature of number generating algorithms, so long as the original seed is ignored, the rest of the values that the algorithm generates will follow
160:
A pseudorandom number generator's number sequence is completely determined by the seed: thus, if a pseudorandom number generator is reinitialized with the same seed, it will produce the same sequence of numbers.
197:, so two or more systems using matching pseudorandom number algorithms and matching seeds can generate matching sequences of non-repeating numbers which can be used to synchronize remote systems, such as
209:
319:
343:
338:
312:
108:
213:
46:
305:
146:
89:
285:
61:
42:
68:
35:
154:
75:
240:
57:
138:
235:
225:
183:
172:
165:
142:
289:
230:
82:
179:
332:
204:
Random seeds are often generated from the state of the computer system (such as the
176:
24:
259:
194:
169:
134:
205:
198:
18:
164:
The choice of a good random seed is crucial in the field of
182:, having the seed will allow one to obtain the key. High
16:
Value used to initialize a pseudo-random number generator
293:
210:
cryptographically secure pseudorandom number generator
260:
Web's random numbers are too weak, researchers warn
49:. Unsourced material may be challenged and removed.
186:is important for selecting good random seed data.
313:
8:
320:
306:
193:seed is deliberately shared, it becomes a
109:Learn how and when to remove this message
252:
7:
273:
271:
47:adding citations to reliable sources
344:Theoretical computer science stubs
292:. You can help Knowledge (XXG) by
14:
214:hardware random number generator
23:
34:needs additional citations for
339:Pseudorandom number generators
1:
147:pseudorandom number generator
286:theoretical computer science
360:
270:
201:satellites and receivers.
157:in a pseudorandom manner.
155:probability distribution
288:–related article is a
241:Initialization vector
43:improve this article
236:Cryptographic nonce
226:Salt (cryptography)
301:
300:
166:computer security
119:
118:
111:
93:
351:
322:
315:
308:
277:P ≟ NP
272:
262:
257:
231:Pseudorandomness
168:. When a secret
114:
107:
103:
100:
94:
92:
51:
27:
19:
359:
358:
354:
353:
352:
350:
349:
348:
329:
328:
327:
326:
279:
268:
266:
265:
258:
254:
249:
222:
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
357:
355:
347:
346:
341:
331:
330:
325:
324:
317:
310:
302:
299:
298:
281:
275:
264:
263:
251:
250:
248:
245:
244:
243:
238:
233:
228:
221:
218:
177:pseudorandomly
117:
116:
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
356:
345:
342:
340:
337:
336:
334:
323:
318:
316:
311:
309:
304:
303:
297:
295:
291:
287:
282:
278:
274:
269:
261:
256:
253:
246:
242:
239:
237:
234:
232:
229:
227:
224:
223:
219:
217:
215:
211:
207:
202:
200:
196:
192:
187:
185:
181:
178:
174:
171:
167:
162:
158:
156:
150:
148:
144:
140:
136:
132:
128:
124:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
58:"Random seed"
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
294:expanding it
283:
276:
267:
255:
203:
190:
189:If the same
188:
163:
159:
151:
130:
126:
122:
120:
105:
99:October 2021
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
123:random seed
333:Categories
247:References
212:or from a
195:secret key
170:encryption
143:initialize
141:) used to
129:, or just
127:seed state
69:newspapers
180:generated
220:See also
184:entropy
133:) is a
83:scholar
280:
191:random
139:vector
135:number
85:
78:
71:
64:
56:
284:This
208:), a
90:JSTOR
76:books
290:stub
206:time
137:(or
131:seed
125:(or
62:news
199:GPS
175:is
173:key
45:by
335::
216:.
149:.
145:a
121:A
321:e
314:t
307:v
296:.
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.