Insufficient Entropy

From OWASP
Revision as of 16:03, 12 February 2007 by Wvande (Talk | contribs)

Jump to: navigation, search

This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.


Description

When an undesirably low amount of entropy is available. Psuedo Random Number Generators are susceptible to suffering from insufficient entropy when they are initialized because entropy data may not be available to them yet.

Examples

Related Threats

In many cases a PRNG uses a combination of the system clock and entropy to create seed data. In the case where insufficient entropy is available, an attacker can reduce the size magnitude of the seed value considerably. Furthermore, by guessing values of the system clock, they can create a manageable set of possible PRNG outputs.

Related Attacks

Related Vulnerabilities

Related Countermeasures

Category:Cryptography

Categories

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.