Paper 2007/419
Cryptanalysis of the Random Number Generator of the Windows Operating System
Leo Dorrendorf, Zvi Gutterman, and Benny Pinkas
Abstract
The pseudo-random number generator (PRNG) used by the Windows operating system is the most commonly used PRNG. The pseudo-randomness of the output of this generator is crucial for the security of almost any application running in Windows. Nevertheless, its exact algorithm was never published.
We examined the binary code of a distribution of Windows 2000, which is still the second most popular operating system after Windows XP. (This investigation was done without any help from Microsoft.) We
reconstructed, for the first time, the algorithm used by the pseudo-random number generator (namely, the function CryptGenRandom). We analyzed the security of the algorithm and found a non-trivial attack: given the internal state of the generator, the previous state can be computed in
Metadata
- Available format(s)
-
PDF
- Category
- Implementation
- Publication info
- Published elsewhere. An early version of this manuscript was presented at the ACM CCS 2007 conference.
- Keywords
- pseudo-randomness
- Contact author(s)
- benny @ pinkas net
- History
- 2007-11-06: received
- Short URL
- https://ia.cr/2007/419
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2007/419, author = {Leo Dorrendorf and Zvi Gutterman and Benny Pinkas}, title = {Cryptanalysis of the Random Number Generator of the Windows Operating System}, howpublished = {Cryptology {ePrint} Archive, Paper 2007/419}, year = {2007}, url = {https://eprint.iacr.org/2007/419} }