Insecure PRNG
Using a PRNG that isn't proven to be cryptographically secure is a recipe for disaster
After inspecting the source code, you've learned that an online bitcoin wallet generator is using a linear congruential generator as a source of randomness to generate bitcoin secret keys.
The parameters being used are from glibc's LCG implementation
$m = 2^{31}$
$a = 1103515245$
$c = 12345$
The only difference being a very slight security upgrade, in which each iteration only outputs one bit, N >> 29 & 1
. When generating a new secret key 256 iterations are used to generate 256 "random" bits, which are used as the secret key.
You requested a new random private key and the server gave you this (in Wallet Import Format):
5KQFVHAxyMMVsDz75bDp7S4NpwoQz2FgR8b7DjyEhUo6saJfS73What will be the next secret key generated? (submit the solution in WIF)
Test Vector
If the specified LCG is initiated with the seed $0x123$, the first 256 bits of output is:3a71c3dc3b5dad959973a074cff234bf09735ed305dfc6247357142a962bd3faWhich when converted to WIF is:
5JG2Tvy2sgek4MkDHrNbRp6HcVya6rHELaNPxX4eKJ8z6jmDLWA