Attacks against PRNGs
- Guess starting state or intermediate state
- Direct guess of starting point
- Precomputed list of likely starting points
- Initialization with closely related inputs
- Cryptanalyze PRNG outputs
- Direct cryptanalysis
- Side-channel attacks
- Chosen-input attacks
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.