Pseudorandomness and Random Number Generation
Next-Bit Test
State Compromise Extension Attacks
Backtracking Resistance
Prediction Resistance
Security Based on Hard Problems
Use of Cryptographic Primitives
Entropy Accumulation
Reseeding Mechanisms
Counter Mode DRBG
Output Feedback Mode DRBG
Security Considerations
Performance Trade-offs
Hash_DRBG Construction
Security Analysis
Implementation Considerations
ChaCha20-based Generators
Salsa20-based Generators
Security and Performance
Design and Standardization
Backdoor Discovery
Security Implications
Lessons Learned
FIPS 140-2 Requirements
FIPS 140-3 Requirements
NIST SP 800-90A
Common Criteria Evaluation
Previous
3. Classical Pseudorandom Number Generators
Go to top
Next
5. Theoretical Foundations of Pseudorandomness