{"id":1723,"date":"2007-11-15T20:58:07","date_gmt":"2007-11-16T03:58:07","guid":{"rendered":"http:\/\/dabacon.org\/pontiff\/?p=1723"},"modified":"2007-11-15T20:58:07","modified_gmt":"2007-11-16T03:58:07","slug":"a-backdoor-in-a-nist-pseudorandom-number-generator","status":"publish","type":"post","link":"https:\/\/dabacon.org\/pontiff\/2007\/11\/15\/a-backdoor-in-a-nist-pseudorandom-number-generator\/","title":{"rendered":"A Backdoor in a NIST Pseudorandom Number Generator?"},"content":{"rendered":"<p>Is there a <a href=\"http:\/\/archive.wired.com\/politics\/security\/commentary\/securitymatters\/2007\/$\">backdoor<\/a> in NIST&#8217;s SP800-90 Dual Ec pseudorandom number generator?<br \/>\n<!--more--><br \/>\nAccording to a <a href=\"http:\/\/rump2007.cr.yp.to\/15-shumow.pdf\">presentation<\/a> by Dan Shumow and Niels Ferguson from Microsoft given at CRYPTO 2007, there is a backdoor in this pseudorandom number generator.  While the authors don&#8217;t know how to use the backdoor, they point out that it is possible that the creators of the algorithm specified in the NIST standard could have access to numbers which would render the pseudorandom number generator insecure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is there a backdoor in NIST&#8217;s SP800-90 Dual Ec pseudorandom number generator?<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-1723","post","type-post","status-publish","format-standard","hentry","category-computer-science"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts\/1723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/comments?post=1723"}],"version-history":[{"count":0,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts\/1723\/revisions"}],"wp:attachment":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/media?parent=1723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/categories?post=1723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/tags?post=1723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}