The seed bytes change after every reboot, but the first 12 bytes never change. I tried deleting them and then rebooting, but the system restored exactly the same first 12 bytes. Is there any security risk from an attacker managing to read those 12 bytes? I assume the seed is used in bitcoin private key generation, and those 12 bytes must have some relationship to the seed.
In older versions of Windows the seed was stored in this registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed
In newer versions of windows the seed now lives here.
HKEY_LOCAL_MACHINE\SYSTEM\RNG
The only information I found from a google was here.
http://illmatics.com/Windows%208%20Heap%20Internals.pdf
Quote
OslpGatherSeedFileEntropy
Gathers entropy by looking up the value of the “Seed” registry key (REG_BINARY) in
HKEY_LOCAL_MACHINE\SYSTEM\RNG.
This key is 76 bytes in size, whereas the last 64 bytes hold a unique hash used to seed the CryptoAPI PRNG
Gathers entropy by looking up the value of the “Seed” registry key (REG_BINARY) in
HKEY_LOCAL_MACHINE\SYSTEM\RNG.
This key is 76 bytes in size, whereas the last 64 bytes hold a unique hash used to seed the CryptoAPI PRNG
