Pseudo Random Number Generators(PRNG)

The fear of every surveillance society: citizens protecting their own privacy with strong cryptography

Pseudo Random Number Generators(PRNG)

Post by rust_2014 on Wed Jul 16, 2014 6:06 am
([msg=82267]see Pseudo Random Number Generators(PRNG)[/msg])

Is it possible to find the next output of a PRNG by looking at the previous outputs of it? If so how many outputs need to be examined to find the algorithm/next output?
rust_2014
New User
New User
 
Posts: 2
Joined: Wed Jul 16, 2014 5:50 am
Blog: View Blog (0)


Re: Pseudo Random Number Generators(PRNG)

Post by cyberdrain on Wed Jul 16, 2014 7:45 am
([msg=82270]see Re: Pseudo Random Number Generators(PRNG)[/msg])

It's a lot easier to do this when you know the algorithm used before the pool compromise. If you don't know the algorithm used, it's going to be a lot harder, as you're essentially guessing in the dark. It depends on the algorithm how much output should be checked. If it's completely in software, reverse engineer it and look for the code so you can make a keygen. If it's in hardware, more or less the same thing, unless the specifications are known. To determine the algorithm, you can use frequency analysis, differential analysis and all that stuff. Bottom line: more information required.
Free your mind / Think clearly
User avatar
cyberdrain
Expert
Expert
 
Posts: 2160
Joined: Sun Nov 27, 2011 1:58 pm
Blog: View Blog (0)


Re: Pseudo Random Number Generators(PRNG)

Post by YomiSARS on Fri Nov 22, 2019 4:34 am
([msg=99700]see Re: Pseudo Random Number Generators(PRNG)[/msg])

i have been thinking of it's possibility for a while and i dont mind if i could get some expert assistance on this topic
YomiSARS
New User
New User
 
Posts: 1
Joined: Thu Oct 17, 2019 10:31 am
Blog: View Blog (0)



Return to Crypto

Who is online

Users browsing this forum: No registered users and 0 guests