RandomLib Logo

RandomLib

0
Free
Visit Website

A library for generating random numbers and strings of various strengths. This library is useful in security contexts. Install Via Composer $ composer require ircmaxell/random-lib Usage Factory A factory is used to get generators of varying strength: $factory = new RandomLib\Factory; $generator = $factory->getGenerator(new SecurityLib\Strength(SecurityLib\Strength::MEDIUM)); A factory can be configured with additional mixers and sources but can be used out of the box to create both medium and low strength generators. Convenience methods are provided for creating high, medium, and low strength generators. Example: $generator = $factory->getMediumStrengthGenerator(); $factory->getLowStrengthGenerator() Convenience method to get a low strength random number generator. Low Strength should be used anywhere that random strings are needed in a non-cryptographical setting. They are not strong enough to be used as keys or salts. They are however useful for one-time use tokens. $factory->getMediumStrengthGenerator() Convenience method to get a medium strength random number generator. Medium Strength should be used for most needs of a cryptographic nature. They are strong enough to

FEATURES

ALTERNATIVES

A unified data security platform that discovers, classifies, monitors, and protects sensitive data across cloud, SaaS, and on-premises environments while ensuring compliance and automating security processes.

Commercial

StegCloak is a JavaScript steganography module for hiding secrets inside text using invisible characters.

Red October is a software-based two-man rule style encryption and decryption server.

A network-based panic button to overwrite LUKS header and shutdown the computer in emergencies, making data recovery impossible.

Obtain GraphQL API schema even if the introspection is disabled

A cloud-native, event-driven data pipeline toolkit for security teams with extensible data processing and serverless deployment.

SOPS is an editor of encrypted files supporting various formats and encryption methods.

Using high-quality entropy sources for CSPRNG seeding is crucial for security.

PINNED