I was going through the Crypto++ library RNG page and I was wondering is there any issues with using something like
std::srand(std::time(nullptr)); //using the current time as seed
compared to the one of the rng in crypto library?
I'm beginner in cryptography, but one possible argument could be that the crypto rng functions are collision resistant ? However, I'm not sure how much better/stronger they are quantitively
Non-cryptographic "random" sources are not suitable for cryptographic purposes because while they may produce values which are indeed different, the values may at least..
size_t
and then target a 16 or 32-bit microcontroller)m_random.c
for an extreme case)