Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Math

+ - Possible backdoor found in RNG standardizedby NSA-> 1

Submitted by
kfz versicherung
kfz versicherung writes "Defining algorithm for random numbers is one of the hardest fields in mathematics. We all know Microsoft failed miserably, even Linux (pdf) and SSL had their fair share of troubles. But now Bruce Schneier tells us the Strange Story of Dual_EC_DRBG, one of four random number generation algorithms standardized by the NSA (pdf). While on first look just slower than the other three, Dan Shumow and Niels Ferguson showed at Crypto 2007 that the algorithm contains a weakness that can only be described a backdoor. Their presentation showed that the constants used have a relationship with a second, secret set of numbers that can act as a kind of skeleton key. If you know the secret numbers, you can predict the output of the random-number generator after collecting just 32 bytes of its output."
Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Possible backdoor found in RNG standardizedby NSA

Comments Filter:
  • Obviously due to its complicated mathematics everbody missed the basic weakness of this algorithm. Thats why I like kiss - keep it small and simple! It works and everybody knows why.

An adequate bootstrap is a contradiction in terms.

Working...