[Python-ideas] Should our default random number generator be secure?

Sturla Molden sturla.molden at gmail.com
Tue Sep 15 16:54:13 CEST 2015

On 15/09/15 16:20, M.-A. Lemburg wrote:

> http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/SFMT/M062821.pdf
> (which again refers to this paper:
> http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/ARTICLES/HONGKONG/hong-fin4.pdf)

You seem to be confusing the DCMT with the SFMT which is a fast SIMD 
friendly Mersenne Twister.

The DCMT is intended for using the Mersenne Twister in parallel 
computing (i.e. one Mersenne Twister per processor). It is not a 
Mersenne Twister accelerated with parallel hardware. That would be the 


The period for the DC Mersenne Twisters they report are long enough, 
e.g. 2^127-1 or 2^521-1, but much shorter than the period of MT19937 
(2^19937-1). This does not matter because the period of MT19937 is 
excessive. In scientific computing, the sequence is long enough for most 
practical purposes if it is larger than 2^64. 2^127-1 is more than 
enough, and this is the shortest period DCMT reported in the paper. So 
do we care? Probably not.


More information about the Python-ideas mailing list