Attacks against PRNGs
- Guess starting state or intermediate state
- Direct guess of starting point
- Precomputed list of likely starting points
- Initialization with closely related inputs
- Cryptanalyze PRNG outputs
- Direct cryptanalysis
- Side-channel attacks
- Chosen-input attacks
Sidebar photo of Bruce Schneier by Joe MacInnis.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Security.