This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "PRNG direct cryptanalytic attack"
From OWASP
(→Description) |
(→Description: added examples sub heading) |
||
Line 2: | Line 2: | ||
A category of PRNG attacks in which an attacker is directly able to distinguish between PRNG outputs and random outputs. [http://www.schneier.com/paper-prngs.pdf] | A category of PRNG attacks in which an attacker is directly able to distinguish between PRNG outputs and random outputs. [http://www.schneier.com/paper-prngs.pdf] | ||
+ | |||
+ | == Examples == | ||
+ | |||
+ | |||
---- | ---- |
Latest revision as of 13:24, 12 February 2007
Description
A category of PRNG attacks in which an attacker is directly able to distinguish between PRNG outputs and random outputs. [1]
Examples
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
{{Template:Attack}