A-Z Popular Blog Encyclopedia Search »
Information Security
Related Guides

Pseudorandom vs Random

 , updated on October 24, 2016
Pseudorandom is an approximated random number generated by software. Software running on regular hardware is highly deterministic, meaning that it runs the same every time. As such, it is difficult to generate a real random number in software as it runs too predictably to be considered random.
A true random number is a number selected from a range with each number in the range having equal and completely unpredictable chance of selection.

Pseudorandom Numbers vs True Random Numbers

Pseudorandom numbers depend on a random factor known as a seed to improve their randomness. In many cases, these are taken from the physical world. For example, recent touchscreen input or the state of a physical device such as a hard drive may be used. Seeds are often limited samples that are used to produce a large number of random numbers. As such, this process isn't perfect and numbers typically end up being theoretically predictable. It should be noted that properly implemented, pseudorandom numbers are random enough for most applications.
Hardware random number generators can produce numbers that are considered true random numbers. These have applications in areas that require extreme randomness such as science, statistical analysis, gaming and cryptography. These are typically simple devices that sample statistically random noise signals such as thermal noise that include no known patterns of predictability.
Pseudorandom vs Random
Pseudorandom NumberTrue Random Number
Definition (1)An approximation of a random number generated by software.A number selected from a range with equal chance of all numbers in the range being selected via an unpredictable method.
Definition (2)An approximation of a random number created by a biased or deterministic process.A number sequence generated by chance that contains no recognizable patterns or regularities.

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Data Breach
Data Remanence
Data Security
Deep Magic
Defense In Depth
Digital Identity
Failure Of Imagination
IoT Security
Key Stretching
Network Security
Operations Security
Overlay Network
Password Fatigue
Proof Of Work
Security Controls
More ...
If you enjoyed this page, please consider bookmarking Simplicable.


A list of coding considerations and techniques.

Emergence vs Big Design Up Front

The difference between emergence and big-design-up-front.

Deep Magic

An overview of deep magic, a technology term.

Principle Of Least Astonishment

An overview of the Principle Of Least Astonishment.

Pull vs Push

The difference between pull and push technology.

Binary vs Hexadecimal

A comparison of binary and hexadecimal.

End-User Computing

An overview of end-user computing.

Library vs API

The difference between a library and API explained.

Code Reuse

The common types of code reuse.

Code Freeze

The common types of code freeze.

Types of Technology

A reasonably comprehensive list of information technologies.


A list of gamification techniques.

Information Technology Problems

A list of common IT problems.

Types Of Cloud

The basic types of cloud computing.

Machine Data

The common types of machine data.

Types Of Software

The common types of software.

Proprietary Technology

A definition of proprietary technology with examples.

Systems Design

The common elements of a systems design.

Systems vs Applications

The difference between systems and applications explained.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map