### Attacks on Pseudo Random Number Generators Hiding a Linear Structure

Florette Martinez

##### Abstract

We introduce lattice-based practical seed-recovery attacks against two efficient number-theoretic pseudo-random number generators: the fast knapsack generator and a family of combined multiple recursive generators. The fast knapsack generator was introduced in 2009 by Von Zur Gathen and Shparlinski. It generates pseudo-random numbers very efficiently with strong mathematical guarantees on their statistical properties but its resistance to cryptanalysis was left open since 2009. The given attacks are surprisingly efficient when the truncated bits do not represent a too large proportion of the internal states. Their complexities do not strongly increase with the size of parameters, only with the proportion of discarded bits. A multiple recursive generator is a pseudo-random number generator based on a constant-recursive sequence. A combined multiple recursive generator is a pseudo-random number generator based on combining two or more multiple recursive generators. L’Écuyer presented the general construction in 1996 and a popular instantiation deemed MRG32k3a in 1999. We use algebraic relations of both pseudo-random generators with underlying algebraic generators to show that they are cryptographically insecure. We provide a theoretical analysis as well as efficient implementations.

Available format(s)
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Pseudo-random number generatorsKnapsack problemCoppersmith MethodsCryptanalysis
Contact author(s)
florette martinez @ lip6 fr
History
Short URL
https://ia.cr/2021/1204

CC BY

BibTeX

@misc{cryptoeprint:2021/1204,
author = {Florette Martinez},
title = {Attacks on Pseudo Random Number Generators Hiding a Linear Structure},
howpublished = {Cryptology ePrint Archive, Paper 2021/1204},
year = {2021},
note = {\url{https://eprint.iacr.org/2021/1204}},
url = {https://eprint.iacr.org/2021/1204}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.