2013
DOI: 10.1007/978-3-642-36095-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Randomly Failed! The State of Randomness in Current Java Implementations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
16
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(17 citation statements)
references
References 7 publications
0
16
0
1
Order By: Relevance
“…Thousands of these weak keys are still being used in the Internet [2]. Another example is a recent major flaw in the random number generator of Android devices [3], resulted in considerable insecurities such as a private-key disclosure vulnerability in Bitcoin clients [4].…”
Section: Introductionmentioning
confidence: 99%
“…Thousands of these weak keys are still being used in the Internet [2]. Another example is a recent major flaw in the random number generator of Android devices [3], resulted in considerable insecurities such as a private-key disclosure vulnerability in Bitcoin clients [4].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the Bitcoin wallet was attacked in the elliptic curve digital signature algorithm (ECDSA) process because the Java-based RNG (SecureRandom class) is vulnerable [9]. Recoverable random numbers were also leveraged in a backdoor in the international standard of the dual elliptic curve deterministic random bit generator (Dual EC DRBG) [10].…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, random number generators (RNGs) used to provide this randomness often fail in practice [17,19,21,22,13,1,16,27]. This is due to issues including poor algorithmic design, software bugs, insufficient or poor estimation of system entropy, and the handling of randomness across virtual machine resets [29].…”
Section: Introductionmentioning
confidence: 99%