First page Back Continue Last page Summary Graphic
33. Exploit PRNG Weakness
Find a weakness in the random number generator used today by a popular system and guess lots of real keys in use today.
It's a good bet you can do this if you are smart enough.
- Example: Kerberos PRNG had such a weakness
- Example: Many proprietary PRNGs have these
- Question: Do PGP/SSH have such a weakness?
- In the way MOST users use them?
Notes: