#randstuff
Explore tagged Tumblr posts
randsstuff · 11 months ago
Text
HII THIS IS MY ART. regretevator rp account ⁉️⁉️
OOC
hi drew on whiteboard with some friends 👍⁉️
Tumblr media Tumblr media Tumblr media Tumblr media
(two versions of the mark doodle because I don't know which one I like more)
271 notes · View notes
polinochka123 · 4 years ago
Photo
Tumblr media
‼️Внимание розыгрыш!‼️давно не было получайте Новый крутой и мегапопулярный ✌️общий проффессиональный💆‍♀️💆‍♂️балийский массаж тела (стоимость такого массажа 3000₽ это двух часовая программа), чтобы получить такой приз 🎖️надо соблюсти парочку условий: 🥇подписаться на мой профиль в Instagram и Tik tok @massajpolina и поставить ❤️под этим постом 🥉отметить друга и чем больше комментов, тем больше шансов выиграть 🏆🏆🏆ПОБЕДИТЕЛЬ Будет ВЫБРАН С ПОМОЩЬЮ #randstuff 20.08.2020 #розыгрыш #розыгрышмассажа #розыгрышподольск #балийскиймассаж #розыгрышбалийскогомассажа #розыгрышбалийскогомассажаподольск #подольск #краснаягорка #москва #бутово #щербинка #московскаяобласть #розыгрышмассаж #розыгрышмосковскаяобласть #розыгрышмосква #проффессиональныймассаж #розыгрышдомодедово #массажик #профмассаж #конкурс #конкурсподольск #подольск #краснаягорка #москва #халява #подарок #приз #популяныймассаж #конкурсы (at Podolsk) https://www.instagram.com/p/CDmXX5elYzE/?igshid=aqrj5wq9vwy
0 notes
romance-club-daily · 2 years ago
Text
Advent Calendar~ 2022
Day #1 (Artwork - Rules)
Tumblr media Tumblr media
Congratulations to everyone on the first day of winter!
And we begin it, as promised, with the launch of the holiday Advent calendar. What do you think might be behind all 25 balls?
Today we open the first ball for you!For now, you can think about what the message means:
"Hope for good luck and find time to bring victory to yourself."
The solution will appear at 15:00 Moscow time.
How does the Advent calendar work? Throughout the days, our furry assistants will remove one ball from the Christmas tree and give you clues. The events themselves, hidden in them, will be activated at the appointed time.
Behind the number 1 of our Advent calendar there is a festive repost contest!
We want to please you and help you earn as many diamonds as possible for the upcoming update!
Conditions of participation:
1. Be subscribed to our community (VK); 2. Repost this entry to your wall; 3. Your page must be opened to check the conditions of participation; 4. Be sure to believe in your victory and wait for the results!
The results of the competition will be announced on December 11.
500 participants, randomly identified through the specialized Randstuff website, will receive 100 diamonds each.
We wish all participants good luck!
Tumblr media
VK
11 notes · View notes
wicked-lyric · 5 years ago
Text
Jingle bells🎄
Думала и надумала, долго хотела сделать что-то подобное, но так как была в больнице, не было возможности. Поэтому новогодний подарочек становится рождественским.
Для того, чтобы участвовать, нужно:
💚 Сделать реблог с порядковым номером
💙 Быть моим читателем
🥂Иметь блог с постами (чтобы я могла иметь представление, кому я пишу, что можно написать и что можно положить в письмецо)
Пожалуйста, будьте внимательны с порядковым номером, чтобы потом не было путаницы и одинаковых номеров у разных людей.
Будет три победителя: первые два получат письма и разные милости, третий — стикеры на выбор в вк.
Победители будут выбраны случайным образом (с помощью randstuff) 16 декабря вечером.
Надеюсь, что все же наберётся людей :3
Tumblr media
102 notes · View notes
lindasims2 · 6 years ago
Photo
Tumblr media Tumblr media Tumblr media
Подвески с надписью!) Немного осваиваю создание мешей для аксессуаров. :) 
КОНКУРС! (^3^)
Хотите вашим симочкам подвеску с уникальной 3D надписью? ;) Я устраиваю конкурс! Условия конкурса: 1) быть подписчиком/читать https://lindasims2.tumblr.com/ 2) сделать реблог данной записи в свой tumblr 3) ждать результатов 17.05.2019 Конкурс будет проходить с 09.05.2019 по 16.05.2019. Победителя (1место) объявлю 17.05.2019 в течении дня с видео-записью в VK и TUMBLR. Как буду определять победителя? 1) запишу имена и порядковый номер в блокнот 2) проверю реблог tumblr этого поста (без реблога участие аннулируется) 3) сделаю определение по числам с помощью сайта генератора "randstuff" Что получит победитель? - (1шт) подвеску с надписью на выбор 1 цвета (золото, серебро, черный металл) -подвеска будет с блеском в игре, с иконкой в CAS, для женщин, для взрослых, студентов и пожилых. Это будет мой первый конкурс :)))  надеюсь в будущем буду делать такое чаще. 
Ну а вам, мои дорогие, желаю удачи!  (^3^)*
39 notes · View notes
studiofloristic · 4 years ago
Photo
Tumblr media
И снова розыгрыш😉 ⠀ Понедельник - а это значит, самое время запустить новый розыгрыш от Studio Floristic ❤ Главный приз - букет из любых цветов, приблизительная стоимость которого составит 1000 ₽, а доставим 💐 совершенно бесплатно! ⠀ Для участия в розыгрыше нужно👇🏻 🔸Поставить лайк этому посту. 🔸Поставить лайки предыдущим 10 постам. 🔸Подписаться на нас @ sfloristic 🔸Отметить в одном комментарии 3 друзей. Чем больше комментариев, тем больше шансов на победу❗ ⠀ Каждому комментарию мы присвоим номер. А в воскресенье с помощью приложения RandStuff определим случайным образом число, которое будет соответствовать победителю. ⠀ Скорее участвуйте, и возможно именно вам в этот раз улыбнется удача🌸
0 notes
nxfury · 4 years ago
Text
Designing Custom Cryptographic Systems: Part 3
This post has been long in coming. For those who haven't read the previous posts in this series, below are links to bring you up to speed.
In Part 1, we covered the basic mathematical information and technical information required to understand and begin to implement your own cryptography. Part 1: HERE
In Part 2, we set up a Cryptographically Secure Pseudo-Random Number Generator to be used by our cryptographic algorithms. Part 2: HERE
If you're stuck, the previous posts may help with bringing you up to speed. Now, let's add in the hashing algorithm!
Hashing? What's that?
A Hashing Algorithm is this carefully crafted program that takes a string as an input, performs a bunch of cryptographic functions on it, and spits out a fixed-length string that appears to be random. However, if you compute the hash again with the same string, you will achieve the same output.
A sample hashing function could be a simple XOR operator. You take random bytes to produce "entropy" for the hashing function, saving the information somewhere. Then you could just XOR the string with the saved random bytes, chopping the hash off at a fixed length. This is known to be highly insecure as performing an XOR against itself is effectively an inverse operation and will undo the work of creating a hash.
Since we are simply using a hashing function on our CSPRNG to produce more useful randomness (effectively increasing the efficiency), we can afford to use a hashing algorithm that has been compromised as there's no user data flowing through it.
Wait, Compromised?
Yes. Remember that we're simply using SHA512 to produce more bytes of pseudorandom information that our cryptographic system can utilize, by feeding it small amounts of pseudorandom characters (characters are actually integers from 0-255 in C).
Due to this, performance matters more than security. SHA512 isn't the most performant, but it's high bit modulus means that the algorithm will have some level of security as well. However, the REAL security will come from our encrypted asymmetric keys. Some argue that this is entirely unnecessary and in the final version of this program, we may even eliminate this bit of code if deemed not necessary.
The Implementation
For our hashing algorithm, we are going to borrow the Free Software Foundation's implementation of SHA512 and take a look at a sample implementation by ggaarder on GitHub, located here.
We notice that SHA512 uses 64 bit integers, and for compatibility, a custom headerfile was included to allow other architectures to process 64 bit numbers as if they were uint64_t (Thanks, Paul Eggert for your contribution to Open Source Software!).
Along with these two things, sample usage of the program is provided:
#include <inttypes.h> #include <stdio.h> #include <stdint.h> #include "sha512.h" #define F "sha512.c" #define F1 "sha512.cp" void psum(char *out) { char *p; for (p = out; p < out+64; p += 8) { // 8 byte is 64 bit printf("%lx", *(uint64_t*)p); } } int main(void) { FILE *fp = fopen(F, "rb"); char out[64]; sha512_stream(fp, out); psum(out); putchar('\n'); fp = fopen(F1, "rb"); sha512_stream(fp, out); psum(out); }
As we can see, this code involved the opening of the file SHA512.c in binary read-only mode, computing a sha512 stream using the contents of the file pointer and assigning it to a char array of size 64. the psum() function allows the printing of the array to standard output. So if we integrated this with our CSPRNG (so we can produce pseudorandom characters), we would need to make our CSPRNG produce pseudorandom strings and then use those for SHA512.
We would need to do something like this:
#include <stdio.h> #include <string.h> #include <stdlib.h> #include <inttypes.h> #include <stdint.h> #include <string.h> #include "duthomhas/csprng.h" #define MESSAGE "message.txt" extern int csprng_get(CSPRNG, void* dest, unsigned long long size); extern CSPRNG csprng_destroy(CSPRNG); // Our implementation of the CSPRNG void * randstuff(void * x) { CSPRNG rng = csprng_create( rng ); // create CSPRNG if (!rng) { //if the CSPRNG fails to load fprintf( stderr, "%s\n", "No CSPRNG! Crap." ); exit(1); //crash and return an error } csprng_get(rng, &x, sizeof(x)); // use CSPRNG rng = csprng_destroy(rng); // destroy the CSPRNG return x; } // Print out Hash void psum(char *out) { char *p; for (p = out; p < out+64; p += 8) { // 8 byte is 64 bit printf("%lx", *(uint64_t*)p); } } // Main function int main(void) { char rand[64]; //To be filled with random garbage char hash[64]; //To hold the hash int errchk; FILE * fp; // Wipe the values in allocated memory before assignment. memset(rand, '\0', sizeof(rand)); memset(hash, '\0', sizeof(hash)); strcpy(rand, randstuff(rand)); // assign randstuff to rand. /* CREATE TEMPFILE FOR SHA512 */ fp = fopen(MESSAGE, "w+"); // open message.txt for writing for (int i=0; i<(sizeof(rand)/sizeof(char)); i++) { //loop through each item in rand, creating a tempfile //with pseudorandom content. fprintf(fp, "%c", rand[i]); } fclose(fp); /* CALCULATE SHA512 HASH */ fp = fopen(MESSAGE, "rb"); // Open file called message.txt sha512_stream(fp, out); psum(out); fclose(fp); errchk = remove(MESSAGE); if(errchk != 0) { printf("Error deleting entropy file. CSPRNG may be compromised.\n"); } return 0; }
Note that this code doesn't have error checking, and it's just the raw algorithm. We will fix that in a coming post.
To explain what was added, we utilized the same CSPRNG code from before and assigned it to an array called rand. Since the SHA512 calculation requires a FILE data type (an Input/Output stream), we need to write the contents of rand to a temporary text file character by character. In doing so, we can calculate the SHA512 hash of the randomness, print it to standard output courtesy of the psum() function, and then remove the temporary file by calling the remove() funtion.
In the future, it might be smart to create a second temporary file to write the SHA512 hash to and delete the first, but time will tell if we need to make this change.
With this code tested and working, we can proceed onward to the design and implementation of our Elliptic Curve Diffie Hellman Algorithm to allow for asymmetric encryption!
Liked This Content? Check Out Our Discord Community and Become an email subscriber!
0 notes
andru67 · 7 years ago
Photo
Tumblr media
🏆Конкурс. 🎁Приз: Сутки бесплатного проживания в квартире. г. Новокузнецк. . 📒Как принять участие? ✏Подпишись, поставь лайк и просто отметь, в комментариях (через @) ОДНОГО друга или просто хорошего человека.🙌 . 🎲При подведении итогов, каждому комментарию будет (заочно) присвоен номер, в хронологическом порядке (первый комментарий - номер один, второй комментарий - номер два и т.д.) ⛳ВНИМАНИЕ! Номера не выдаются. . 🚨Все комментарии, кроме отметок, будут удалены, а аккаунты забанены.🛑 . 🥇Чтобы увеличить шансы, отмечай несколько друзей. НО НЕ ЗАБЫВАЙ! Один комментарий одна отметка. . 🎎Розыгрыш проведу  02.05.18 в прямом эфире. С помощью сервиса случайных чисел randstuff и выложу запись в instagram.👥 . 🎉Желаю удачи!!! P.S. Не забывай подписаться на страницу. (at Novokuznetsk)
0 notes
romance-club-daily · 2 years ago
Text
Advent Calendar~ 2022
Day #14 (Contest!)
Tumblr media Tumblr media
Let's open the ball for 14 days! What do we have here? So, today the message reads:
"For fortune to choose you, Follow the conditions, wait until the end."
Tumblr media
Many of you were right, and behind the figure was a contest of reposts! We want to see as many happy people as possible for the coming New Year, and therefore we will help you earn as many diamonds as possible for renewal! 
Conditions of participation:
1. Be subscribed to our community; 2. Repost this entry to your wall; 3. Your page must be opened to check the conditions of participation; 4. Be sure to believe in your victory and wait for the results!
The results of the competition will be announced on December 24.
500 participants, randomly identified through the specialized Randstuff website, will receive 100 diamonds each.
We wish all participants good luck! 
VK
4 notes · View notes
imam-spb-blog · 8 years ago
Photo
Tumblr media
✨ 🎉 КОНКУРС от интернет-магазина 🎉 I❤MAM ✨ Для участия НЕОБХОДИМО: ✅ ВСТУПИТЬ в группу I❤MAM ✅ Сделать РЕПОСТ этой записи у себя на стене https://vk.com/imam_spb?w=wall-133058... 🎁 ПРИЗ – подгузники Pampers Premium Care нужной вам номер 🚚Доставка приза бесплатно по СПБ 🇷🇺 Счастливчика узнаем 1.06.2017 г. с помощью приложения Randstuff 20:00 + 📹 Видеоотчет Для заказа и по все вопросам пишите📝 vk.com/mma__elita или 📲 8-999-669-7147 Viber/WhatsApp/Директ 🍼👶 Весь ассортимент товаров: vk.com/market-133058294 а так же на сайте imam-spb.ru Ассортимент Магазина пополняется - уточняйте нужный Вам товар (его могли просто еще не успеть внести на в каталоги) #imamspb #imam #подгузники #подгузникисдоставкой #ямама #будумамой #мамапринцессы #СПБ #СанктПетербург #spb #ямама #беременна #одежданавыписку #выписка #модныймалыш #ждумалыша #ябеременна #роддом #винтересномположении #моймалыш #скоромама #моябеременность #9месяцев
0 notes
pn-printninja · 8 years ago
Photo
Tumblr media
🎁‼ НЕРЕАЛЬНО КРУТОЙ РОЗЫГРЫШ‼ ⭐ 😃 ПОРТРЕТ НА ХОЛСТЕ С ПОДРАМНИКОМ 🏆🏆 MEDIUM размер 90х60 см. ⬇ УСЛОВИЯ КОНКУРСА ПРОСТЫ⬇ ▶ Быть нашим подписчиком ‎ФОТОСУВЕНИРЫ | ПЕЧАТЬ НА ХОЛСТЕ ЕКАТЕРИНБУРГ‎ ✔ ⭐ Нажмите ❤"Мне нравится" и 📢"Рассказать друзьям" ‼ Победителя виберем с помощью 👉 randstuff 👍 15 февраля 2017 года. Всем удачи🍀 Участвовать можно из любого города 🌎 P.S. доставка Екатеринбург, Челябинск, Асбест бесплатно. Остальные города за счет победителя по тарифам ТК #конкурс #розыгрыш #приз #зарепост #лайк #класс #печатьнахолсте #подарок #бесплатно #Екатеринбург #Челябинск #Асбест
0 notes
nxfury · 5 years ago
Text
Rolling Custom Cryptographic Systems: Part 2
For those who haven't read my original post (located HERE, we will be picking up where we left off in the design and implementation of our very own cryptosystem by implementing a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG).
What's The Point Of This?
For any of our cryptographic functions to have any use whatsoever, we need a stream of random information we can feed our algorithms so we can properly perform hashing functions, symmetrical and asymmetrical encryption.
The "secret sauce" behind encryption is that it looks like random, garbled data or can pose as data belonging to something else.
Why Can't I Just Use The random() Function?
Sadly, the random() function, as implemented in many languages, is not Cryptographically Secure and is actually rather predictable based on a variety of factors, like CPU performance and timings.
In the same vein, CSPRNGs are also rather methodical due to the nature of the hardware and need thorough testing.
Cool, So What Are We Going to Do?
Since efficiency and using stable code is key to making everything work properly, we will want to utilize an already existing library. In our case, we'll use Duthomhas's CSPRNG, located here. This will give us an API to work with, without worrying about how we'll generate random numbers.
But How Do CSPRNGs Work???
Generally, a CSPRNG would gather entropy (randomness) through a variety of sources, for example the difference in microseconds between keystrokes or the noise of a transmission, and use fancy mathematics like the modulus operator and exponentiation to produce much, much more entropic data quickly.
However, since we're lazy (Guilty is Charged!!!), we don't want to spend weeks developing a Cryptographically Secure Pseudo-Random Number Generator, we want to work on encryption.
Adding The API
The sample source code explains the usage of the C headers by adding the code and then using the following code sample to generate pseudo-random numbers:
include <stdio.h>
include <duthomhas/csprng.h>
int main() { CSPRNG rng = csprng_create( rng ); // Constructor if (!rng) { fprintf( stderr, "%s\n", "No CSPRNG! Fooey!" ); return 1; }
long n = csprng_get_int( rng ); // Get an int
double f; // Get a double csprng_get( rng, &f, sizeof(f) );
int xs[ 20 ]; // Get an array csprng_get( rng, xs, sizeof(xs) );
void* p = malloc(20); // et cetera csprng_get( rng, p, 20 ); free( p );
rng = csprng_destroy( rng ); // Destructor return 0; }
This Code sample shows us that we can dynamically call csprng_get() to fill different data types with pseudo-random information. This will fit our needs immensely in a separate function, as such:
include <stdio.h>
include <string.h>
include <stdlib.h>
include "duthomhas/csprng.h"
extern int csprng_get(CSPRNG, void* dest, unsigned long long size); extern CSPRNG csprng_destroy(CSPRNG);
// Our implementation of the CSPRNG void * randstuff(void * x) { CSPRNG rng = csprng_create( rng ); // create CSPRNG if (!rng) { //if the CSPRNG fails to load fprintf( stderr, "%s\n", "No CSPRNG! Crap." ); exit(1); //crash and return an error }
csprng_get(rng, &x, sizeof(x)); // use CSPRNG rng = csprng_destroy(rng); // destroy the CSPRNG
return x; }
// Main function int main(void) { char rand[50]; //To be filled with random garbage
strcpy(rand, randstuff(rand));
return 0; }
This sample of code sadly isn't enough to get the CSPRNG working, as there's a slight flaw in the API we were provided in the csprng.c file. To fix this we need to swap the line that says #include <duthomhas/csprng.h> with #include "duthomhas/csprng.h" and everything should compile.
Alright, So What Did You Do?
We took sample code, and modified it to suit our purposes. Of course, our program doesn't yet work 100% and we're getting segmentation faults. However, this is a great first step as we're now able to produce pseudo-randomness at will.
To be more precise, we created a function called randstuff() that allows us to produce pseudorandom binary data at will. On top of this, we made the functions take the void * data type, allowing us to pass any form of data that we please into the function. This is somewhat dangerous and we'll need to explicitly convert our data to use the function later down the road... However, it provides us with the facilities necessary to create random information necessary for encryption.
Finally, since all this is placed into a separate function, we can call it anywhere we need randomness.
Be sure to stick around for Part 3, where we implement a hashing function!
Liked This Content? Check Out Our Discord Community and Become an email subscriber!
0 notes