Attacks Against PRNGs

  • Guess starting state or intermediate state
    • Direct guess of starting point
    • Precomputed list of likely starting points
    • Initialization with closely related inputs
  • Cryptanalyze PRNG outputs
    • Direct cryptanalysis
    • Side-channel attacks
    • Chosen-input attacks

 

 

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc..