This article mainly introduces the CSPRNG function in PHP. Interested friends can refer to it. I hope it will be helpful to everyone.
1. What is CSPRNG
Quoting Wikipedia, a cryptographically secure pseudo-random number generator (Cryptographically Secure Pseudorandom Number Generator, abbreviated CSPRNG) is a pseudo-random number generator. Random number generator (PRNG), which generates pseudo-random numbers suitable for cryptographic algorithms.
CSPRNG may be mainly used for:
Key generation (for example, generating complex keys)
Generate random passwords for new users
Encryption system
Get A key aspect of high-level security is high-quality randomness
2. CSPRNG in PHP7
PHP 7 introduces two new functions that can be used to implement CSPRNG: random_bytes and random_int.
random_bytes function returns a string and accepts an int input parameter representing the number of bytes of the returned result.
Example:
$bytes = random_bytes('10'); var_dump(bin2hex($bytes)); //possible ouput: string(20) "7dfab0af960d359388e6"
random_int function returns an int number within the specified range.
Example:
var_dump(random_int(1, 100)); //possible output: 27
##3. Background running environment
The randomness of the above functions varies depending on the environment:On windows, CryptGenRandom() is always used.
On other platforms, arc4random_buf() will be used if available (established on BSD series or systems with libbsd)
If none of the above is true, a Linux system call getrandom(2) will be used.
-
If not, /dev/urandom will be used as the last available tool
If none of the above works, the system will throw an error
A good random number generation system ensures appropriate generation "quality". To check this quality, a series of statistical tests are usually performed. Without delving into complex statistics topics, comparing a known behavior to the results of a number generator can help with quality assessment.
A simple test is the dice game. Assume that the probability of rolling a dice once to get a result of 6 is 1/6, then if I roll 3 dice at the same time 100 times, the result will be roughly as follows:
0 6 = 57.9 times
1 6 = 34.7 times 2 6s = 6.9 times
3 6s = 0.5 times
The following is the code to implement rolling dice 1,000,000 times:
$times = 1000000; $result = []; for ($i=0; $i<$times; $i++){ $dieRoll = array(6 => 0); //initializes just the six counting to zero $dieRoll[roll()] += 1; //first die $dieRoll[roll()] += 1; //second die $dieRoll[roll()] += 1; //third die $result[$dieRoll[6]] += 1; //counts the sixes } function roll(){ return random_int(1,6); } var_dump($result);
Using PHP7's random_int and simple rand function may get the following results
If you see rand and random_int first, more For a good comparison we can apply a formula and plot the results on a graph. The formula is: (php result-expected result)/expected result raised to the 0.5 power.
The result graph is as follows:
(values close to 0 are better)
Although the results of 3 6's do not perform well, and This test is too simple for practical applications. We can still see that random_int performs better than rand.
Furthermore, the security level of our application is due to the unpredictability and repeatable behavior of the random number generator. promote.
Summary: The above is the entire content of this article, I hope it will be helpful to everyone's study.
Related recommendations:
Execution Cycle Example Analysis of PHP Principles
##Detailed explanation of PHP source code directory structure and function description
##
The above is the detailed content of CSPRNG function in PHP. For more information, please follow other related articles on the PHP Chinese website!

To protect the application from session-related XSS attacks, the following measures are required: 1. Set the HttpOnly and Secure flags to protect the session cookies. 2. Export codes for all user inputs. 3. Implement content security policy (CSP) to limit script sources. Through these policies, session-related XSS attacks can be effectively protected and user data can be ensured.

Methods to optimize PHP session performance include: 1. Delay session start, 2. Use database to store sessions, 3. Compress session data, 4. Manage session life cycle, and 5. Implement session sharing. These strategies can significantly improve the efficiency of applications in high concurrency environments.

Thesession.gc_maxlifetimesettinginPHPdeterminesthelifespanofsessiondata,setinseconds.1)It'sconfiguredinphp.iniorviaini_set().2)Abalanceisneededtoavoidperformanceissuesandunexpectedlogouts.3)PHP'sgarbagecollectionisprobabilistic,influencedbygc_probabi

In PHP, you can use the session_name() function to configure the session name. The specific steps are as follows: 1. Use the session_name() function to set the session name, such as session_name("my_session"). 2. After setting the session name, call session_start() to start the session. Configuring session names can avoid session data conflicts between multiple applications and enhance security, but pay attention to the uniqueness, security, length and setting timing of session names.

The session ID should be regenerated regularly at login, before sensitive operations, and every 30 minutes. 1. Regenerate the session ID when logging in to prevent session fixed attacks. 2. Regenerate before sensitive operations to improve safety. 3. Regular regeneration reduces long-term utilization risks, but the user experience needs to be weighed.

Setting session cookie parameters in PHP can be achieved through the session_set_cookie_params() function. 1) Use this function to set parameters, such as expiration time, path, domain name, security flag, etc.; 2) Call session_start() to make the parameters take effect; 3) Dynamically adjust parameters according to needs, such as user login status; 4) Pay attention to setting secure and httponly flags to improve security.

The main purpose of using sessions in PHP is to maintain the status of the user between different pages. 1) The session is started through the session_start() function, creating a unique session ID and storing it in the user cookie. 2) Session data is saved on the server, allowing data to be passed between different requests, such as login status and shopping cart content.

How to share a session between subdomains? Implemented by setting session cookies for common domain names. 1. Set the domain of the session cookie to .example.com on the server side. 2. Choose the appropriate session storage method, such as memory, database or distributed cache. 3. Pass the session ID through cookies, and the server retrieves and updates the session data based on the ID.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Linux new version
SublimeText3 Linux latest version

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Dreamweaver Mac version
Visual web development tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software