Cryptographic attacks | Pseudorandom number generators

Random number generator attack

The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. To achieve this unpredictability, some randomization is typically employed. Modern cryptographic protocols often require frequent generation of random quantities. Cryptographic attacks that subvert or exploit weaknesses in this process are known as random number generator attacks. A high quality random number generation (RNG) process is almost always required for security, and lack of quality generally provides attack vulnerabilities and so leads to lack of security, even to complete compromise, in cryptographic systems. The RNG process is particularly attractive to attackers because it is typically a single isolated hardware or software component easy to locate. If the attacker can substitute pseudo-random bits generated in a way they can predict, security is totally compromised, yet generally undetectable by any upstream test of the bits. Furthermore, such attacks require only a single access to the system that is being compromised. No data need be sent back in contrast to, say, a computer virus that steals keys and then e-mails them to some drop point. (Wikipedia).

Video thumbnail

23C3: Analysis of a strong Random Number Generator

Speaker: Thomas Biege This paper (and slides) will descibe the inner workings of the the random number generator (/dev/{u}random) of Linux. Additionally some possible security flaws are shown (entropy overestimation, zero'izing the pool, etc.) For more information visit: http://bit.ly/

From playlist 23C3: Who can you trust

Video thumbnail

Pseudo Random Number Generator Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Coding Math: Episode 51 - Pseudo Random Number Generators Part I

Back to School Special. This short series will discuss pseudo random number generators (PRNGs), look at how they work, some algorithms for PRNGs, and how they are used. Support Coding Math: http://patreon.com/codingmath Source Code: https://jsbin.com/nifutup/1/edit?js,output Earlier Sourc

From playlist Episodes

Video thumbnail

Randomness - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Randomness Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

How to use the Random Number Generator in Excel

For more articles, how-tos and videos on Excel and statistics, visit us at: http://www.statisticshowto.com

From playlist Excel for Statistics

Video thumbnail

Biased Generator - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Pseudo Random Number Generator - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Jonathan Katz - Introduction to Cryptography Part 1 of 3 - IPAM at UCLA

Recorded 25 July 2022. Jonathan Katz of the University of Maryland presents "Introduction to Cryptography I" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This lecture will serve as a "crash course" in modern cryptography for those with no prior exposure

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

29C3: FactHacks (EN)

Speakers: djb | Nadia Heninger | Tanja Lange RSA factorization in the real world RSA is the dominant public-key cryptosystem on the Internet. This talk will explain the state of the art in techniques for the attacker to figure out your secret RSA keys. A typical 1024-bit RSA public key

From playlist 29C3: Not my department

Video thumbnail

25c3: Analyzing RFID Security

Speakers: Henryk Plötz. Karsten Nohl Many RFID tags have weaknesses, but the security level of different tags varies widely. Using the Mifare Classic cards as an example, we illustrate the complexity of RFID systems and discuss different attack vectors. To empower further analysis of RFID

From playlist 25C3: Nothing to hide

Video thumbnail

Black Hat USA 2010: Understanding the Windows SMB NTLM Weak Nonce Vulnerability 3/5

Speakers: Hernan Ochoa, Agustin Azubel In February 2010, we found a vulnerability in the SMB NTLM Windows Authentication mechanism that have been present in Windows systems for at least 14 years (from Windows NT 4 to Windows Server 2008). You probably haven't heard about this vulnerabilit

From playlist BH USA 2010 - OS WARS

Video thumbnail

30C3: The Year in Crypto (DE - translated)

For more information and to download the video visit: http://bit.ly/30C3_info Playlist 30C3: http://bit.ly/30c3_pl Speakers: Nadia Heninger | djb | Tanja Lange This was a busy year for crypto. TLS was broken. And then broken again. Discrete logs were computed. And then computed again.

From playlist 30C3

Video thumbnail

Jonathan Katz - Introduction to Cryptography Part 2 of 3 - IPAM at UCLA

Recorded 25 July 2022. Jonathan Katz of the University of Maryland presents "Introduction to Cryptography II" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This session will focus on public-key cryptography, including key exchange, public-key encryption,

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Black Hat USA 2010: Understanding the Windows SMB NTLM Weak Nonce Vulnerability 5/5

Speakers: Hernan Ochoa, Agustin Azubel In February 2010, we found a vulnerability in the SMB NTLM Windows Authentication mechanism that have been present in Windows systems for at least 14 years (from Windows NT 4 to Windows Server 2008). You probably haven't heard about this vulnerabilit

From playlist BH USA 2010 - OS WARS

Video thumbnail

24C3: Mifare (Little Security, Despite Obscurity)

Speakers: Karsten Nohl, Henryk Plötz Mifare are the most widely deployed brand of secure RFID chips, but their security relies on proprietary and secret cryptographic primitives. We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher. For more i

From playlist 24C3: Full steam ahead

Video thumbnail

Analog vs. Digital Epsilons: Implementation Considerations Considerations for Differential Privacy

A Google TechTalk, presented by Olya Ohrimenko, 2021/11/17 Differential Privacy for ML series.

From playlist Differential Privacy for ML

Video thumbnail

randomGenerator in Number Puzzles

https://teacher.desmos.com/activitybuilder/custom/61282f1b979758794705a7d6

From playlist Computation Layer

Video thumbnail

25c3: Predictable RNG in the vulnerable Debian OpenSSL package

Speakers: Luciano Bello, Maximiliano Bertacchini the What and the How Recently, the Debian project announced an OpenSSL package vulnerability which they had been distributing for the last two years. This bug makes the PRNG predictable, affecting the keys generated by openssl and every ot

From playlist 25C3: Nothing to hide

Related pages

Integer factorization | Stream cipher | Session key | Randomization | Backdoor (computing) | One-time pad | RSA Security | Key generation | Password cracking | Entropy | Key (cryptography) | Fortuna (PRNG) | Security through obscurity | Salt (cryptography) | Passphrase | Bitcoin | Cryptographically secure pseudorandom number generator | Random seed | Enigma machine | Hardware random number generator | Pseudorandom number generator | Dual EC DRBG | Cryptographic nonce | CryptGenRandom | Crypto-1