PRNG state compromise extension attack

Saltar a: navegación, buscar


A category of attacks in which an attacker compromises a single state of the PRNG and penetrates past or future outputs of the PRNG using this information [1]. Usually this attack is executed using the seed state or a vulnerable state in which insufficient entropy is available.

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.