T
The poster formerly known as 'The Poster Formerly
Guest
http://blogs.techrepublic.com.com/tech-news/?p=1560&tag=nl.e019
"Security researchers are claiming that the pseudo-random number
generator used by Microsoft in Windows is flawed. Only Windows 2000 is
evaluated, though the shortcomings of the random number generator are
most likely present in Windows XP and Vista.
Excerpt from The Register:
A team of cryptographers led by Dr. Benny Pinkas from the
Department of Computer Science at the University of Haifa, Israel, were
able to unravel how the CryptGenRandom function Windows 2000 worked,
without assistance from Microsoft. This analysis revealed that random
number generation in Windows 2000 is far from genuinely random — or even
pseudo-random.
Because of this it was possible for the researchers to predict
numbers generated by the software, after first determining the internal
state of the generator.
The implications here is that a local attack can be used to determine a
single state of the random number generator. It will be possible after
that to predict all random values, such as used in SSL keys, and
possibly other cryptographic functions.
If you enjoy reading Greek geek-stuffs, you can check out the results of
the research titled Cryptanalysis of the Windows Random Number Generator."
--
Priceless quotes in m.p.w.vista.general group -
Submit your nomination at the link below:
http://protectfreedom.tripod.com/kick.html
"Fair use is not merely a nice concept--it is a federal law based on
free speech rights under the First Amendment and is a cornerstone of the
creativity and innovation that is a hallmark of this country. Consumer
rights in the digital age are not frivolous."
- Maura Corbett
"Security researchers are claiming that the pseudo-random number
generator used by Microsoft in Windows is flawed. Only Windows 2000 is
evaluated, though the shortcomings of the random number generator are
most likely present in Windows XP and Vista.
Excerpt from The Register:
A team of cryptographers led by Dr. Benny Pinkas from the
Department of Computer Science at the University of Haifa, Israel, were
able to unravel how the CryptGenRandom function Windows 2000 worked,
without assistance from Microsoft. This analysis revealed that random
number generation in Windows 2000 is far from genuinely random — or even
pseudo-random.
Because of this it was possible for the researchers to predict
numbers generated by the software, after first determining the internal
state of the generator.
The implications here is that a local attack can be used to determine a
single state of the random number generator. It will be possible after
that to predict all random values, such as used in SSL keys, and
possibly other cryptographic functions.
If you enjoy reading Greek geek-stuffs, you can check out the results of
the research titled Cryptanalysis of the Windows Random Number Generator."
--
Priceless quotes in m.p.w.vista.general group -
Submit your nomination at the link below:
http://protectfreedom.tripod.com/kick.html
"Fair use is not merely a nice concept--it is a federal law based on
free speech rights under the First Amendment and is a cornerstone of the
creativity and innovation that is a hallmark of this country. Consumer
rights in the digital age are not frivolous."
- Maura Corbett