exploit weaknesses in this process are known as random number generator attacks. A high quality random number generation (RNG) process is almost always required...
21 KB (2,627 words) - 02:57, 13 March 2025
Random number generators are important in many kinds of technical applications, including physics, engineering or mathematical computer studies (e.g.,...
23 KB (1,483 words) - 09:02, 24 July 2025
A pseudorandom number generator (PRNG), also known as a deterministic random bit generator (DRBG), is an algorithm for generating a sequence of numbers...
28 KB (3,559 words) - 14:58, 27 June 2025
hardware random number generator (HRNG), true random number generator (TRNG), non-deterministic random bit generator (NRBG), or physical random number generator...
28 KB (3,305 words) - 08:22, 16 June 2025
Random number generation is a process by which, often by means of a random number generator (RNG), a sequence of numbers or symbols is generated that...
36 KB (4,424 words) - 00:46, 16 July 2025
A random password generator is a software program or hardware device that takes input from a random or pseudo-random number generator and automatically...
11 KB (1,260 words) - 03:43, 23 December 2024
also referred to as a cryptographic random number generator (CRNG). Most cryptographic applications require random numbers, for example: key generation...
29 KB (3,633 words) - 08:24, 16 April 2025
systems, /dev/random and /dev/urandom are special files that provide random numbers from a cryptographically secure pseudorandom number generator (CSPRNG)...
23 KB (2,447 words) - 21:15, 25 May 2025
Dual EC DRBG (redirect from Dual Elliptic Curve Deterministic Random Bit Generator)
Curve Deterministic Random Bit Generator) is an algorithm that was presented as a cryptographically secure pseudorandom number generator (CSPRNG) using methods...
68 KB (6,745 words) - 05:55, 17 July 2025
Fortuna (PRNG) (category Pseudorandom number generators)
Blum Blum Shub CryptGenRandom Random number generator attack "random(4)". www.freebsd.org. Retrieved 2020-10-01. "Random number generation". Apple Support...
8 KB (923 words) - 14:45, 13 April 2025
CryptGenRandom is a deprecated cryptographically secure pseudorandom number generator function that is included in Microsoft CryptoAPI. In Win32 programs...
17 KB (1,890 words) - 03:26, 24 December 2024
Non-physical true random number generator (NPTRNG), also known as non-physical nondeterministic random bit generator is a true random number generator that does...
5 KB (566 words) - 00:42, 20 April 2025
ISAAC (cipher) (category Cryptographically secure pseudorandom number generators)
(2023-03-17). "Tests for Random Number Generators". Marina Pudovkina, A known plaintext attack on the ISAAC keystream generator, 2001, Cryptology ePrint...
5 KB (567 words) - 09:26, 15 May 2025
RC4 (category Pseudorandom number generators)
of arc4random. Proposed new random number generators are often compared to the RC4 random number generator. Several attacks on RC4 are able to distinguish...
45 KB (5,091 words) - 05:33, 18 July 2025
Quantum key distribution (redirect from Photon number splitting)
that were not secure using a random number generator attack. Another common class of attacks is the Trojan horse attack which does not require physical...
104 KB (11,929 words) - 03:48, 2 August 2025
Debian (section Numbering scheme)
such as Ubuntu made a variety of security keys vulnerable to a random number generator attack, since only 32,767 different keys were generated. The security...
152 KB (13,008 words) - 04:21, 4 August 2025
Pseudo Random Number Using Evolutionary methods IEEE, DOI: 10.1109/CIS.2008.220. Caballero-Gil, P. et al. New Attack Strategy for the Shrinking Generator Journal...
5 KB (573 words) - 13:28, 10 February 2025
NIST SP 800-90A (category Cryptographically secure pseudorandom number generators)
Technology with the title Recommendation for Random Number Generation Using Deterministic Random Bit Generators. The publication contains the specification...
17 KB (1,979 words) - 23:02, 21 April 2025
Lottery machine (section Random number generator)
in a "pick 3" or "pick 4" game. Some lotteries use computerized random number generators, either alongside or in place of a mechanical draw machine. These...
4 KB (619 words) - 17:21, 7 January 2024
brute-force attack is that the complete key space was used to generate keys, something that relies on an effective random number generator, and that there...
21 KB (2,168 words) - 17:09, 27 May 2025
functions as a random one-time pad, as a pseudo-random number generator controls the output at each step. With certain IVs, an attacker knowing the first...
5 KB (843 words) - 19:54, 19 February 2024
RDRAND (redirect from ARCH RANDOM)
RDRAND (for "read random") is an instruction for returning random numbers from an Intel on-chip hardware random number generator which has been seeded...
26 KB (2,638 words) - 21:55, 9 July 2025
between randomization, pseudorandomization, and quasirandomization, as well as between random number generators and pseudorandom number generators. For example...
18 KB (2,478 words) - 10:41, 29 March 2025
between two or more parties. The attack depends on the higher likelihood of collisions found between random attack attempts and a fixed degree of permutations...
18 KB (2,307 words) - 08:59, 29 June 2025
attacking. In 2003, SQL Slammer became the first observed example of a Warhol worm. The mechanism of SQL Slammer's spread used a pseudo-random number...
2 KB (279 words) - 23:43, 27 March 2025
cryptographic commitment to an exponentially large number of seemingly random bits. The concept of a verifiable random function is closely related to that of a...
12 KB (1,501 words) - 13:21, 26 May 2025
Clock drift (category Random number generation)
clock drift can be utilized to build random number generators. These can however be exploited by timing attacks. Everyday clocks such as wristwatches...
8 KB (1,073 words) - 02:12, 9 February 2025
Pseudorandom function family (redirect from Pseudo-random function)
with pseudorandom generators (PRGs). The guarantee of a PRG is that a single output appears random if the input was chosen at random. On the other hand...
8 KB (1,021 words) - 19:33, 30 June 2025
LFSR in the keystream generator and the output of the Boolean function that combines the output states of all the LFSRs. These attacks are employed in combination...
15 KB (2,299 words) - 20:31, 29 July 2025
confidentiality. One particular attack is always possible against keys, the brute force key space search attack. A sufficiently long, randomly chosen, key can resist...
3 KB (416 words) - 16:50, 23 January 2025