PRNG state compromise extension attack

Revision as of 21:45, 11 February 2007 by Wvande (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search


A category of attacks in which an attacker compromises a single state of the PRNG and penetrates past or future outputs of the PRNG using this information [1]. Usually this attack is executed using the seed state or a vulnerable state in which insufficient entropy is available.

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.