Abstract—Virtualized environments are widely thought to cause problems for software-based random number generators (RNGs), due to use of virtual machine (VM) snapshots as well as fewer and believed-to-be lower quality entropy sources. Despite this, we are unaware of any published analysis of the security of critical RNGs when running in VMs. We fill this gap, using measurements of Linux’s RNG systems (without the aid of hardware RNGs, the most common use case today) on Xen, VMware, and Amazon EC2. Despite CPU cycle counters providing a significant source of entropy, various deficiencies in the design of the Linux RNG makes its first output vulnerable during VM boots and, more critically, makes it suffer from catastrophic reset vulnerabiliti...
In this paper we examine the history of using random numbers in computer programs. Unfortunately, th...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...
Abstract—Virtualized environments are widely thought to cause problems for software-based random num...
Linux is the most popular open source project. The Linux random number generator is part of the kern...
Abstract: One of the services provided by the operating system to the applications is random number ...
The availability of a random number generator with high cryptographic qualities on a computer is one...
Abstract. A pseudo-random number generator (PRNG) is a deterministic algorithm that produces numbers...
Abstract. Cloud computing hosts require a good source of cryptographically strong random numbers. Mo...
In this paper, we explore and analyze the structure and functions of Random Number Generator (RNG) i...
Over the past decade, several security issues with Linux Random Number Generator (LRNG) on PCs and A...
1 Introduction Secure PRNG design commonly rests on computational complexity [2, 5, 6, 13, 24], but ...
In this work we demonstrate various weaknesses of the random number generator (RNG) in the OpenSSL c...
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number g...
This document presents an efficient, high quality random number generator for multi-programmed envir...
In this paper we examine the history of using random numbers in computer programs. Unfortunately, th...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...
Abstract—Virtualized environments are widely thought to cause problems for software-based random num...
Linux is the most popular open source project. The Linux random number generator is part of the kern...
Abstract: One of the services provided by the operating system to the applications is random number ...
The availability of a random number generator with high cryptographic qualities on a computer is one...
Abstract. A pseudo-random number generator (PRNG) is a deterministic algorithm that produces numbers...
Abstract. Cloud computing hosts require a good source of cryptographically strong random numbers. Mo...
In this paper, we explore and analyze the structure and functions of Random Number Generator (RNG) i...
Over the past decade, several security issues with Linux Random Number Generator (LRNG) on PCs and A...
1 Introduction Secure PRNG design commonly rests on computational complexity [2, 5, 6, 13, 24], but ...
In this work we demonstrate various weaknesses of the random number generator (RNG) in the OpenSSL c...
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number g...
This document presents an efficient, high quality random number generator for multi-programmed envir...
In this paper we examine the history of using random numbers in computer programs. Unfortunately, th...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...