For those in a hurry, this is NOT related to the controversial Dual_EC_DRBG
planted inside NIST's SP800-90A.
About the two RNGs:
The Microsoft BCRYPT layer based one is over their C API.
BCryptGenRandom
is following NIST SP800-90A'sCTR_DRBG
(i.e. uses an approved block cipher, AES, to create random bits). However it is unclear if it uses a hardware random source as seed (or part of the seed)...The Microsoft .NET
RNGCryptoServiceProvider
is C# based. Looking at the .NET source code (or here), I see it end up calling the C++ methodCapiNative.GenerateRandomBytes()
. There should have been a P/Invoke stub for the C#=>C++ transition but I couldn't find it anywhere in the framework source. So I have no idea how it's actually implemented.
Does anyone have additional information on these two random number generators? Do either/both use HW random seeds (either via diode noise in older intels or the controversial RDRAND
in the latest intels).
PS: Not sure it this should be at Security, StackOverflow or Cryptography ...
Microsoft
RNGCryptoServiceProvider
is mentioned in RFC 4086:Not exactly, the managed framework class is just a thin wrapper over the Crypto api built into Windows. All the System.Security.Cryptography classes whose name end with
ServiceProvider
are wrappers for the native API. Those whose name ends inManaged
are implemented in pure managed code. Accordingly, theXxxServiceProvider
classes use FIPS validated cryptogaphy, and theXxxManaged
classes are not.It is not exactly pinvoke, it uses a common mechanism to make direct calls in CLR code. The jitter consults a table with addresses of C++ functions and compiles the CALL machine code instruction directly. The mechanism is described in this answer. Having a look at the actual code isn't possible, it isn't included in the SSCLI20 distribution and was altered to use the QCall mechanism in .NET 4.
So the assertion is unprovable, but it is pretty likely that RNGCryptoServiceProvider and the algorithm provider you pass to BCryptGenRandom() use the same source for random numbers. Which in Windows is an unnamed exported function in advapi.dll, this answer gives an excellent summary of what it uses.
If this truly concerns you and you want a reliable source of information then don't take advice from a free Q+A web site for your security needs. Call Microsoft Support.