- DUAL_EC_DRBG was a random number generator standardized by NIST that was designed and promoted by the NSA and contained a backdoor. It used elliptic curve points to generate random numbers but the NSA knew the private key, allowing them to determine the internal state.
- While difficult to demonstrate on real-world implementations, the attack works by observing the random output, brute forcing short bits, and using scalar multiplication with the private key to recover the internal state.
- A weaker demonstration version was created to help explain the concepts using a smaller finite field and elliptic curve parameters that could be cracked with modest computing power to find the private key and demonstrate the attack.