1 minute read
2.2.2 ● Attacks on RNGs
A Handbook on DIY Electronic Security and Espionage polysilicon 63, 64 porting 121 POSTE RESTANTE 121 post-processing 88 potassium permanganate 145 power-analysis 97 power-cycle 159, 179 prime number 35, 82, 102, 106 primitive root 82 private key 12, 32, 35, 42, 73, 101, 102, 104, 191, 193, 194, 198 PRNG 36, 78, 81, 82, 83, 84, 103 propagation delay 69, 74 PS/2 52, 155, 156, 157 pseudo-random 41, 52, 82, 83, 108, 119, 159 public key 35, 36, 101, 102, 104, 117, 193, 198 PWM 87, 190, 191 PZT 59
Q
qbit 105 quasar 118, 145, 182 quasi-random 159
R
radio-location 20, 77 raking 97 real programmer 169, 170 real-time clock 61, 137 resonator 45, 46, 157, 188, 189 ring-out 41, 151, 152, 155, 201 rip the envelope 93 RISC 40, 146 runaway code 67, 141, 169
S
safe house 126 Sampoong 18 scrambling 52, 78, 99, 100, 145, 210 semi-prime number 35, 106 session key 36, 95, 102, 103, 104, 117 SHA-1 61, 82, 94, 102, 109 SHA-256 94, 109 shear line 97 shimming 97 Shor’s algorithm 34, 106 shortwave 19, 158, 187, 201, 218