Except, it’s not done. That is a disaster waiting to happen.
In the world of cryptography, . We are creatures of pattern. If you ask a human to create a "random" 32-character string, they will likely avoid repeating characters, never use the same letter twice in a row, and probably start with a letter in the middle of the alphabet. Except, it’s not done
// The ONLY way to generate a secure key in .NET using System.Security.Cryptography; public static string GenerateSecureKey(int byteLength, bool urlSafe = false) { // RandomNumberGenerator is the successor to RNGCryptoServiceProvider using (var rng = RandomNumberGenerator.Create()) { byte[] bytes = new byte[byteLength]; rng.GetBytes(bytes); // This pulls from Windows CryptGenRandom We are creatures of pattern
Use a dedicated, cryptographically secure —specifically one built on RNGCryptoServiceProvider or RandomNumberGenerator . Whether you are generating an AES-256 key for a database column or an HMAC secret for a JWT, the entropy source is the only thing that stands between your data and a breach. Whether you are generating an AES-256 key for
Attackers know this. They have dictionaries full of "human-random" guesses.
Vanaf dit punt worden cookies van derde partijen gebruikt,
deze zouden door de verschillende partijen kunnen gebruikt worden als tracking cookie.