Knowledge (XXG)

Random seed

Source 📝

25: 152:
For a seed to be used in a pseudorandom number generator, it does not need to be random. Because of the nature of number generating algorithms, so long as the original seed is ignored, the rest of the values that the algorithm generates will follow
160:
A pseudorandom number generator's number sequence is completely determined by the seed: thus, if a pseudorandom number generator is reinitialized with the same seed, it will produce the same sequence of numbers.
197:, so two or more systems using matching pseudorandom number algorithms and matching seeds can generate matching sequences of non-repeating numbers which can be used to synchronize remote systems, such as 209: 319: 343: 338: 312: 108: 213: 46: 305: 146: 89: 285: 61: 42: 68: 35: 154: 75: 240: 57: 138: 235: 225: 183: 172: 165: 142: 289: 230: 82: 179: 332: 204:
Random seeds are often generated from the state of the computer system (such as the
176: 24: 259: 194: 169: 134: 205: 198: 18: 164:
The choice of a good random seed is crucial in the field of
182:, having the seed will allow one to obtain the key. High 16:
Value used to initialize a pseudo-random number generator
293: 210:
cryptographically secure pseudorandom number generator
260:
Web's random numbers are too weak, researchers warn
49:. Unsourced material may be challenged and removed. 186:is important for selecting good random seed data. 313: 8: 320: 306: 193:seed is deliberately shared, it becomes a 109:Learn how and when to remove this message 252: 7: 273: 271: 47:adding citations to reliable sources 344:Theoretical computer science stubs 292:. You can help Knowledge (XXG) by 14: 214:hardware random number generator 23: 34:needs additional citations for 339:Pseudorandom number generators 1: 147:pseudorandom number generator 286:theoretical computer science 360: 270: 201:satellites and receivers. 157:in a pseudorandom manner. 155:probability distribution 288:–related article is a 241:Initialization vector 43:improve this article 236:Cryptographic nonce 226:Salt (cryptography) 301: 300: 166:computer security 119: 118: 111: 93: 351: 322: 315: 308: 277:P ≟ NP 272: 262: 257: 231:Pseudorandomness 168:. When a secret 114: 107: 103: 100: 94: 92: 51: 27: 19: 359: 358: 354: 353: 352: 350: 349: 348: 329: 328: 327: 326: 279: 268: 266: 265: 258: 254: 249: 222: 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 357: 355: 347: 346: 341: 331: 330: 325: 324: 317: 310: 302: 299: 298: 281: 275: 264: 263: 251: 250: 248: 245: 244: 243: 238: 233: 228: 221: 218: 177:pseudorandomly 117: 116: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 356: 345: 342: 340: 337: 336: 334: 323: 318: 316: 311: 309: 304: 303: 297: 295: 291: 287: 282: 278: 274: 269: 261: 256: 253: 246: 242: 239: 237: 234: 232: 229: 227: 224: 223: 219: 217: 215: 211: 207: 202: 200: 196: 192: 187: 185: 181: 178: 174: 171: 167: 162: 158: 156: 150: 148: 144: 140: 136: 132: 128: 124: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 58:"Random seed" 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 294:expanding it 283: 276: 267: 255: 203: 190: 189:If the same 188: 163: 159: 151: 130: 126: 122: 120: 105: 99:October 2021 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 123:random seed 333:Categories 247:References 212:or from a 195:secret key 170:encryption 143:initialize 141:) used to 129:, or just 127:seed state 69:newspapers 180:generated 220:See also 184:entropy 133:) is a 83:scholar 280:  191:random 139:vector 135:number 85:  78:  71:  64:  56:  284:This 208:), a 90:JSTOR 76:books 290:stub 206:time 137:(or 131:seed 125:(or 62:news 199:GPS 175:is 173:key 45:by 335:: 216:. 149:. 145:a 121:A 321:e 314:t 307:v 296:. 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Random seed"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
number
vector
initialize
pseudorandom number generator
probability distribution
computer security
encryption
key
pseudorandomly
generated
entropy
secret key
GPS
time
cryptographically secure pseudorandom number generator
hardware random number generator
Salt (cryptography)
Pseudorandomness
Cryptographic nonce

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.