First page Back Continue Last page Summary Graphic
33. Exploit PRNG Weakness
- Find a weakness in the random number generator used today by a popular system and guess lots of real keys in use today.
- It's a good bet you can do this if you are smart enough.- Example: Kerberos PRNG had such a weakness
- Example: Many proprietary PRNGs have these
- Question: Do PGP/SSH have such a weakness?
- In the way MOST users use them?
 
 
Notes: