Paper 2018/734

Random Number Generators Can Be Fooled to Behave Badly

George Teseleanu


In this paper, we extend the work on purely mathematical Trojan horses initially presented by Young and Yung. This kind of mechanism affects the statistical properties of an infected random number generator (RNG) by making it very sensitive to input entropy. Thereby, when inputs have the correct distribution the Trojan has no effect, but when the distribution becomes biased the Trojan worsens it. Besides its obvious malicious usage, this mechanism can also be applied to devise lightweight health tests for RNGs. Currently, RNG designs are required to implement an early detection mechanism for entropy failure, and this class of Trojan horses is perfect for this job.

Available format(s)
Publication info
Published elsewhere. MINOR revision.ICICS
backdoorrandom number generatorshealth tests
Contact author(s)
george teseleanu @ yahoo com
2018-08-15: received
Short URL
Creative Commons Attribution


      author = {George Teseleanu},
      title = {Random Number Generators Can Be Fooled to Behave Badly},
      howpublished = {Cryptology ePrint Archive, Paper 2018/734},
      year = {2018},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.