Black-Box Assessment of Pseudorandom Algorithms
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities of pseudorandom number generators (PRNGs) in this 53-minute Black Hat USA 2013 conference talk. Delve into the flaws of common non-cryptographic PRNGs and learn techniques for identifying PRNGs through black-box analysis of application output. Discover methods for recovering PRNG internal states, enabling the determination of past output and prediction of future output. Gain insights into algorithms that significantly outperform brute-force searches, including constant-time PRNG stream reversal and seeking. Witness live demonstrations of these attacks and receive access to a tool for conducting assessments on pseudorandom algorithms in your own security evaluations.
Syllabus
Black Hat USA 2013 - Black-Box Assessment of Pseudorandom Algorithms
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube