The reason DBMS_RANDOM should not be provided by PUBLIC when using it to generate a cryptographic key is because an attacker can use it to determine the initial values ββand / or patterns in generating keys that can be used to determine the key, the data is encrypted. This is why this can lead to a compromise of encrypted data. This, of course, is not an easy attack, but it is possible for someone with sufficient computing power.
DBMS_RANDOM should not be used for cryptography because it is too predictable. To generate a cryptographic key, you should use only a secure random function. These functions try to measure things like white noise and trigger values ββas randomly as possible.
Freedom_ben
source share