|
You are here |
negativesign.com | ||
| | | | |
www.eliza-ng.me
|
|
| | | | | Introduction: Cryptography, the art of secure communication, relies on robust and trustworthy encryption algorithms to safeguard sensitive information. However, concerns about a potential backdoor in the NIST-approved Dual_EC_DRBG random number generator have plagued the encryption community for years. This article examines the history, suspicions, and implications surrounding the controversial algorithm. Background: Dual_EC_DRBG, based on elliptic curve cryptography, was included in NIST's SP 800-90A publication as one of the recommended random number generators for use in cryptography. However, from the beginning, doubts were raised about the algorithm's security and potential weaknesses. Later, it was publicly revealed that the United States National Secu... | |
| | | | |
deut-erium.github.io
|
|
| | | | | One can guess all the future outputs of a random number generator once they recover the state, but how feasible is it to recover the past state of pseudorand... | |
| | | | |
blog.cryptographyengineering.com
|
|
| | | | | In today's news of the weird, RSA (a division of EMC) hasrecommendedthat developers desist fromusingthe (allegedly) 'backdoored' Dual_EC_DRBG random number generator -- which happens to be thedefault in RSA's BSafe cryptographic toolkit. Youch. In case you're missing the story here, Dual_EC_DRBG (which I wrote about yesterday) is the random number generator voted most likely to... | |
| | | | |
hisvirusness.com
|
|
| | | Technical documentation for the HisVirusness.com framework: a custom-built just-in-time static site generator developed by Paul J Mason. | ||