Analysis of the Linux random number generator

@article{Gutterman2006AnalysisOT,
  title={Analysis of the Linux random number generator},
  author={Zvi Gutterman and Benny Pinkas and Tzachy Reinman},
  journal={2006 IEEE Symposium on Security and Privacy (S&P'06)},
  year={2006},
  pages={15 pp.-385}
}
Linux is the most popular open source project. [...] Key Method We used dynamic and static reverse engineering to learn the operation of this generator. This paper presents a description of the underlying algorithms and exposes several security vulnerabilities. In particular, we show an attack on the forward security of the generator which enables an adversary who exposes the state of the generator to compute previous states and outputs. In addition we present a few cryptographic flaws in the design of the…Expand
200 Citations
The Linux Pseudorandom Number Generator Revisited
  • 52
  • PDF
Entropy transfers in the Linux Random Number Generator
  • 14
  • PDF
ANALYSIS OF ANDROID RANDOM NUMBER GENERATOR
  • Highly Influenced
Safe cryptographic random number generation using untrusted generators
  • 2
Design of a pseudo-chaotic number generator as a random number generator
  • 8
  • Highly Influenced
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 26 REFERENCES
Software Generation of Practically Strong Random Numbers
  • P. Gutmann
  • Computer Science
  • USENIX Security Symposium
  • 1998
  • 69
  • PDF
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3
  • 43
  • PDF
Extracting Randomness from External Interrupts
  • 3
An Architecture for Robust Pseudo-Random Generation and Applications to /dev/random
  • 11
  • PDF
An Implementation of the Yarrow PRNG for FreeBSD
  • 5
  • PDF
A model and architecture for pseudo-random generation with applications to /dev/random
  • 100
  • Highly Influential
  • PDF
Cryptography in OpenBSD: An Overview
  • 46
  • PDF
Cryptanalytic Attacks on Pseudorandom Number Generators
  • 236
  • PDF
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator
  • 118
  • PDF
Hold Your Sessions: An Attack on Java Session-Id Generation
  • 35
  • PDF
...
1
2
3
...