Attacks against PRNGs
- Guess starting state or intermediate state
- Direct guess of starting point
- Precomputed list of likely starting points
- Initialization with closely related inputs
- Cryptanalyze PRNG outputs
- Direct cryptanalysis
- Side-channel attacks
- Chosen-input attacks
up to Yarrow
Sidebar photo of Bruce Schneier by Joe MacInnis.