Mersenne Twister Crack
It's regrettable that the question as-is seems to imply that it's OK to do whatever the OP suggested. A shame for future visitors who may not have the insight of actually checking the rest of the thread, and end up using a homebrewed, brittle, and perhaps profoundly insecure PRNG as though it were a CSPRNG.
I also like that you dismiss the entire field of cryptanalysis as if you were too good for it and just assume all your arguments are correct. Seriously, it's cool to be creative for experiments, but for a real project, no less an ONLINE CASINO GAME, you WANT to use best practices. – Dec 22 '13 at 13:52 •. You don't want to use something like the Mersenne Twister for gambling.
2.7 engine problems. The Encyclopedia of the Industrial Revolution in World History. Hendrickson, III, notes in his introduction: “Since the end of the nineteenth-century, industrialization has become a global phenomenon. Books.google.co.th - As editor Kenneth E. After the relative completion of the advanced industrial economies of the West after 1945, patterns of rapid economic change invaded societies.

The Mersenne Twister (MT) is a pseudorandom number generator (PRNG) developed by Makoto Matsumoto and Takuji Nishimura[1][2] during 1996-1997. MT has the following merits: It is designed with consideration on the flaws of various existing generators. Mersenne Twister. A Pseudo-Random Number Generator. Archana Jagannatam and Duyen Tran. Abstract —Pseudo random number generators have been widely used in numbers of applications, particularly simulation and cryptography. Among them is a Mersenne Twister.
It is not cryptographically secure. Given a small amount of output, it is relatively straightforward to compute all future outputs. These algorithms are designed for things like Monte-Carlo simulations and things of that ilk.

A better option is to select a 128-bit key at random and run AES in counter-mode. Another option is simply to pipe input from /dev/urandom. Either of these will give you a secure stream of bits you can use for your gaming application. @poncho: right, the output of AES-CTR is fine for most practical purposes, even though the distinguisher that I consider (no repeated output blocks) makes it technically not a CSPRNG. However, for certification purposes (of security devices, or one-armed bandits), who knows what kind of (admittedly pointless) red ink could be raised by not using a CSPRNG, where one is prescribed?
And for data encryption, the ability for an eavesdropper to distinguish constant plaintext from changing plaintext (which could translate to: idle link from active link) is close to a practical attack. – Dec 19 '13 at 18:03. Quoting: Well, the chief vulnerability is that if an attacker is given a large enough sample of Mersenne Twister output, he can then predict future (and past) outputs. This is a gross violation of the properties that a cryptographically secure random number generator is supposed to have (where you're supposed to not even be able to tell if the random bit string could have been produced by the RNG in question). In other words: you should not use something like the Mersenne Twister for your project.