Analysis of the Linux random number generator

@article{Gutterman2006AnalysisOT,
  title={Analysis of the Linux random number generator},
  author={Zvi Gutterman and Benny Pinkas and Tzachy Reinman},
  journal={2006 IEEE Symposium on Security and Privacy (S\&P'06)},
  year={2006},
  pages={15 pp.-385}
}
Linux is the most popular open source project. [...] Key Method We used dynamic and static reverse engineering to learn the operation of this generator. This paper presents a description of the underlying algorithms and exposes several security vulnerabilities. In particular, we show an attack on the forward security of the generator which enables an adversary who exposes the state of the generator to compute previous states and outputs. In addition we present a few cryptographic flaws in the design of the…Expand
The Linux Pseudorandom Number Generator Revisited
ANALYSIS OF ANDROID RANDOM NUMBER GENERATOR
Safe cryptographic random number generation using untrusted generators
Design of a pseudo-chaotic number generator as a random number generator
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 26 REFERENCES
Software Generation of Practically Strong Random Numbers
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3
Extracting Randomness from External Interrupts
An Architecture for Robust Pseudo-Random Generation and Applications to /dev/random
An Implementation of the Yarrow PRNG for FreeBSD
A model and architecture for pseudo-random generation with applications to /dev/random
Cryptography in OpenBSD: An Overview
Cryptanalytic Attacks on Pseudorandom Number Generators
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator
Hold Your Sessions: An Attack on Java Session-Id Generation
...
1
2
3
...