<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wvande</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wvande"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Wvande"/>
		<updated>2026-04-27T03:48:01Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16449</id>
		<title>Insufficient Entropy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16449"/>
				<updated>2007-02-12T21:09:04Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Categories */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
When an undesirably low amount of [[entropy]] is available. Psuedo Random Number Generators are susceptible to suffering from insufficient entropy when they are initialized because entropy data may not be available to them yet.&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
In many cases a PRNG uses a combination of the system clock and entropy to create seed data. In the case where insufficient entropy is available, an attacker can reduce the size magnitude of the seed value considerably. Furthermore, by guessing values of the system clock, they can create a manageable set of possible PRNG outputs.&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
Many PRNG's (/dev/random and /dev/urandom for example) store their last value before shutdown. By using this value at intialization, they can sometimes avoid insufficient or predictable starting entropy.&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
[[:Category:Cryptography]]&lt;br /&gt;
&lt;br /&gt;
[[:Category:Cryptographic Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16448</id>
		<title>Insufficient Entropy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16448"/>
				<updated>2007-02-12T21:08:20Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Related Countermeasures */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
When an undesirably low amount of [[entropy]] is available. Psuedo Random Number Generators are susceptible to suffering from insufficient entropy when they are initialized because entropy data may not be available to them yet.&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
In many cases a PRNG uses a combination of the system clock and entropy to create seed data. In the case where insufficient entropy is available, an attacker can reduce the size magnitude of the seed value considerably. Furthermore, by guessing values of the system clock, they can create a manageable set of possible PRNG outputs.&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
Many PRNG's (/dev/random and /dev/urandom for example) store their last value before shutdown. By using this value at intialization, they can sometimes avoid insufficient or predictable starting entropy.&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptographic Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16447</id>
		<title>Insufficient Entropy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16447"/>
				<updated>2007-02-12T21:06:42Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Related Countermeasures */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
When an undesirably low amount of [[entropy]] is available. Psuedo Random Number Generators are susceptible to suffering from insufficient entropy when they are initialized because entropy data may not be available to them yet.&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
In many cases a PRNG uses a combination of the system clock and entropy to create seed data. In the case where insufficient entropy is available, an attacker can reduce the size magnitude of the seed value considerably. Furthermore, by guessing values of the system clock, they can create a manageable set of possible PRNG outputs.&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
Many PRNG's (/dev/random and /dev/urandom for example) store their last value before shutdown. By using this value at intialization, they can sometimes avoid insufficient or predictable starting entropy.&lt;br /&gt;
&lt;br /&gt;
[[:Category:Cryptography]]&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptographic Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16446</id>
		<title>Insufficient Entropy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16446"/>
				<updated>2007-02-12T21:03:42Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */  added entropy link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
When an undesirably low amount of [[entropy]] is available. Psuedo Random Number Generators are susceptible to suffering from insufficient entropy when they are initialized because entropy data may not be available to them yet.&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
In many cases a PRNG uses a combination of the system clock and entropy to create seed data. In the case where insufficient entropy is available, an attacker can reduce the size magnitude of the seed value considerably. Furthermore, by guessing values of the system clock, they can create a manageable set of possible PRNG outputs.&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Cryptography]]&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptographic Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16445</id>
		<title>Insufficient Entropy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16445"/>
				<updated>2007-02-12T20:59:38Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Related Threats */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
When an undesirably low amount of random data is available. Psuedo Random Number Generators are susceptible to suffering from insufficient entropy when they are initialized because random data may not be available to them yet.&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
In many cases a PRNG uses a combination of the system clock and entropy to create seed data. In the case where insufficient entropy is available, an attacker can reduce the size magnitude of the seed value considerably. Furthermore, by guessing values of the system clock, they can create a manageable set of possible PRNG outputs.&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Cryptography]]&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptographic Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16444</id>
		<title>Insufficient Entropy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Insufficient_Entropy&amp;diff=16444"/>
				<updated>2007-02-12T20:50:18Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */  added basic definition&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
When an undesirably low amount of random data is available. Psuedo Random Number Generators are susceptible to suffering from insufficient entropy when they are initialized because random data may not be available to them yet.&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Cryptography]]&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptographic Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_direct_cryptanalytic_attack&amp;diff=16422</id>
		<title>PRNG direct cryptanalytic attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_direct_cryptanalytic_attack&amp;diff=16422"/>
				<updated>2007-02-12T13:24:47Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */  added examples sub heading&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
A category of PRNG attacks in which an attacker is directly able to distinguish between PRNG outputs and random outputs. [http://www.schneier.com/paper-prngs.pdf]&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_direct_cryptanalytic_attack&amp;diff=16421</id>
		<title>PRNG direct cryptanalytic attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_direct_cryptanalytic_attack&amp;diff=16421"/>
				<updated>2007-02-12T13:24:01Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
A category of PRNG attacks in which an attacker is directly able to distinguish between PRNG outputs and random outputs. [http://www.schneier.com/paper-prngs.pdf]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_direct_cryptanalytic_attack&amp;diff=16420</id>
		<title>PRNG direct cryptanalytic attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_direct_cryptanalytic_attack&amp;diff=16420"/>
				<updated>2007-02-12T13:23:46Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
A category of PRNG attacks in which an attacker is directly able to distinguish between PRNG outputs and random outputs. [http://www.schneier.com/paper-prngs.pdf]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16417</id>
		<title>PRNG permanent compromise attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16417"/>
				<updated>2007-02-12T03:23:39Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Examples */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
A type of [[PRNG state compromise extension attack]] in which an attacker compromises the state of the PRNG at some arbitrary time t. From t, all future and past states of the PRNG become vulnerable to attack [http://www.schneier.com/paper-prngs.pdf].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In 1999, Reliable Software Technologies was able to crack the card shuffling algorithm used in an online Texas Hold 'Em card game (using software developed by ASF Software Inc.). By identifying the seed value used by ASF's PRNG algorithm, Reliable was able to identify how the cards would be shuffled and, hence, the contents of the deck [http://www.developer.com/tech/article.php/10923_616221_1?o=0].  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16416</id>
		<title>PRNG permanent compromise attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16416"/>
				<updated>2007-02-12T03:20:01Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
A type of [[PRNG state compromise extension attack]] in which an attacker compromises the state of the PRNG at some arbitrary time t. From t, all future and past states of the PRNG become vulnerable to attack [http://www.schneier.com/paper-prngs.pdf].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In 1999, Reliable Software Technologies was able to crack the card shuffling algorithm used in an online Texas Hold 'Em card game (developed by ASF Software). By identifying the seed value used by ASF's PRNG algorithm, Reliable was able to identify how the cards would be shuffled and, hence, the contents of the deck [http://www.developer.com/tech/article.php/10923_616221_1?o=0].  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16415</id>
		<title>PRNG permanent compromise attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16415"/>
				<updated>2007-02-12T02:51:23Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
A type of [[PRNG state compromise extension attack]] in which an attacker compromises the state of the PRNG at some arbitrary time t. From t, all future and past states of the PRNG become vulnerable to attack [http://www.schneier.com/paper-prngs.pdf].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16414</id>
		<title>PRNG permanent compromise attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16414"/>
				<updated>2007-02-12T02:48:42Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
A type of [[PRNG State Compromise Extension Attack]] in which an attacker compromises the state of the PRNG at some arbitrary time t. From t, all future and past states of the PRNG become vulnerable to attack [http://www.schneier.com/paper-prngs.pdf].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_state_compromise_extension_attack&amp;diff=16413</id>
		<title>PRNG state compromise extension attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_state_compromise_extension_attack&amp;diff=16413"/>
				<updated>2007-02-12T02:45:43Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
A category of attacks in which an attacker compromises a single state of the PRNG and penetrates past or future outputs of the PRNG using this information [http://www.schneier.com/paper-prngs.pdf]. Usually this attack is executed using the seed state or a vulnerable state in which insufficient entropy is available.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16412</id>
		<title>PRNG permanent compromise attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16412"/>
				<updated>2007-02-12T02:36:04Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
A type of PRNG State Compromise Extension Attack in which an attacker compromises the state of the PRNG at some arbitrary time t. From t, all future and past states of the PRNG become vulnerable to attack [http://www.schneier.com/paper-prngs.pdf].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16411</id>
		<title>PRNG permanent compromise attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16411"/>
				<updated>2007-02-12T02:34:52Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  A type of PRNG State Compromise Extension Attack in which an attacker compromises the state of the PRNG at some arbitrary time t. From t, all future and past states of the PRNG become vulnerable to attack [http://www.schneier.com/paper-prngs.pdf].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16410</id>
		<title>PRNG permanent compromise attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16410"/>
				<updated>2007-02-12T02:23:27Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16409</id>
		<title>PRNG permanent compromise attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16409"/>
				<updated>2007-02-12T02:22:38Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16408</id>
		<title>PRNG permanent compromise attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_permanent_compromise_attack&amp;diff=16408"/>
				<updated>2007-02-12T02:20:34Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Stub}}&lt;br /&gt;
{{Template:Attack}}&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_Seed_Error&amp;diff=16407</id>
		<title>PRNG Seed Error</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_Seed_Error&amp;diff=16407"/>
				<updated>2007-02-12T02:04:45Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Related Threats */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The incorrect use of a seed by a Psuedo Random Number Generator [http://cve.mitre.org/docs/plover/SECTION.9.20.html#RAND.SEED] . A seed error is usually brought on through the erroneous generation or application of a seed state.&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
The application of a seed state that is known to an attacker can lead to a permanent compromise attack [http://www.schneier.com/paper-prngs.html].&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptographic Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_Seed_Error&amp;diff=16404</id>
		<title>PRNG Seed Error</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_Seed_Error&amp;diff=16404"/>
				<updated>2007-02-12T01:57:56Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The incorrect use of a seed by a Psuedo Random Number Generator [http://cve.mitre.org/docs/plover/SECTION.9.20.html#RAND.SEED] . A seed error is usually brought on through the erroneous generation or application of a seed state.&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptographic Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=PRNG_Seed_Error&amp;diff=16403</id>
		<title>PRNG Seed Error</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=PRNG_Seed_Error&amp;diff=16403"/>
				<updated>2007-02-12T01:56:06Z</updated>
		
		<summary type="html">&lt;p&gt;Wvande: /* Description */  - basic definition of PRNG seed error&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The incorrect use of a seed. [http://cve.mitre.org/docs/plover/SECTION.9.20.html#RAND.SEED] . A seed error is usually brought on by through erroneous generation or application of a seed state.&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptographic Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Wvande</name></author>	</entry>

	</feed>