I am back as the author of this posting. Finally to respond !!
The "cryptographic" is important form the standpoint of some
games like computer backgammon that use some neural net learning algorithm. The game algorithm may be hacking the Pseudo Random Number generator's algorithm rather than game
strategy itself or a combination of both. So by randomizing the seed (gathering entropy ) from Current Time, process ID, Memory info, and so on, (As described about for
CryptGenRandom() API that CAPICOM uses) a human or machine
has a harder time figuring out what LCRNG you are using.
Remember, a random number generator is no longer random if its seed and algorithm are known.
The srand documentation shows a simple unix entropy example:
srand(time ^ $$ ^ unpack "%32L*", `ps auxw | gzip`);
You want to seed your generator with as much entropy or in plain English "garbage" or "noise" bits.
Having said that, Intel has a hardware resistor noise intereface to further add to the entropy pool. I am not sure
how to use that in CAPICOM. The Intel site doesn't seem
to indicate that Windows XP is supported.