Attacks against PRNGs

  • Guess starting state or intermediate state
    • Direct guess of starting point
    • Precomputed list of likely starting points
    • Initialization with closely related inputs
  • Cryptanalyze PRNG outputs
    • Direct cryptanalysis
    • Side-channel attacks
    • Chosen-input attacks

up to Yarrow

Sidebar photo of Bruce Schneier by Joe MacInnis.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Security.