eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2022/120

Practical Seed Recovery of Fast Cryptographic Pseudo Random Number Generators

Florette Martinez


Trifork is a family of pseudo-random number generators described in 2010 by Orue et al. It is based on Lagged Fibonacci Generators and has been claimed as cryptographically secure. In 2017 was presented a new family of lightweight pseudo-random number generators: Arrow. These generators are based on the same techniques as Trifork and designed to be light, fast and secure, so they can allow private communication between resource-constrained devices. The authors based their choices of parameters on NIST standards on lightweight cryptography and claimed these pseudo-random number generators were of cryptographic strength. We present practical implemented algorithms that reconstruct the internal states of the Arrow generators for different parameters given in the original article. These algorithms enable us to predict all the following outputs and recover the seed. These attacks are all based on a simple guess-and-determine approach which is efficient enough against these generators. We also present an implemented attack on Trifork, this time using lattice-based techniques. We show it cannot have more than 64 bits of security, hence it is not cryptographically secure.

Available format(s)
Publication info
Preprint. MINOR revision.
Contact author(s)
florette martinez @ lip6 fr
2022-02-09: received
Short URL
Creative Commons Attribution


      author = {Florette Martinez},
      title = {Practical Seed Recovery of Fast Cryptographic Pseudo Random Number Generators},
      howpublished = {Cryptology ePrint Archive, Paper 2022/120},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/120}},
      url = {https://eprint.iacr.org/2022/120}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.