Yarrow-160: Notes On The Design and Analysis of The Yarrow Cryptographic Pseudorandom Number Generator
Yarrow-160: Notes On The Design and Analysis of The Yarrow Cryptographic Pseudorandom Number Generator
(h(v
Pt
|K), k).
4. Set C E
K
(0).
5. Reset all entropy estimate accumulators of the en-
tropy accumulator to zero.
6. Wipe the memory of all intermediate values
7. If a seed le is in use, the next 2k bits of output
from the generator are written to the seed le,
overwriting any old values.
Step 1 gathers the output from the entropy accumu-
lator. Step 2 uses an iterative formula of length P
t
to
make the reseeding computationally expensive if de-
sired. Step 3 uses the hash function h and a function
h
(m, k) we construct
s
0
:= m
s
i
:= h(s
0
| . . . |s
i1
) i = 1, . . .
h