HTTPsec provides cryptographically strong security at the application layer.
If we didn't have a one-time pad, we could instead use a cryptographically strong pseudorandom number generator.
Examples that are not considered cryptographically strong include:
So instead what's done is that a random number is picked, just out of the air, a big cryptographically strong, really high-quality random number.
And that is the definition of a good cryptographically strong digest, or a hash.
Remember that when you're doing a digital signature you take a document, and you hash it using a cryptographically strong hashing algorithm.
How did you - what are you using for your random algorithms that you know they're cryptographically strong?
A cryptographically strong prime has to be much larger than this example.
A computationally large safe prime is likely to be a cryptographically strong prime.
However most modern operating systems offer cryptographically strong random number generators that are suitable for password generation.