Exam 8: Random Bit Generation and Stream Ciphers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

With true random sequences each number is statistically independent of other numbers in the sequence and therefore unpredictable.

Free
(True/False)
5.0/5
(31)
Correct Answer:
Verified

True

__________ algorithms are designed specifically and solely for the purpose of generating pseudorandom bit streams.

Free
(Short Answer)
4.9/5
(32)
Correct Answer:
Verified

Purpose-built

there are well-defined tests for determining uniform distribution and independence to validate that a sequence of numbers is random.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

False

In key distribution and reciprocal authentication schemes two communicating parties cooperate by exchanging messages to distribute keys and/or authenticate each other.In many cases ___________ are used for handshaking to prevent replay attacks.

(Multiple Choice)
4.7/5
(41)

Random numbers play an important role in the use of encryption for various network security applications.

(True/False)
4.9/5
(29)

If the algorithm is good the resulting sequences will pass many reasonable tests of randomness.these numbers are referred to as ___________ numbers.

(Short Answer)
4.7/5
(40)

A source that is effectively random is referred to as __________ .

(Multiple Choice)
4.9/5
(24)

A fundamental requirement of the RSA public-key encryption scheme is the ability to generate _________ numbers.

(Short Answer)
4.9/5
(25)

the principle requirement of random or pseudorandom number generation is that the generated number stream be unpredictable.

(True/False)
4.8/5
(35)

A secret key for symmetric encryption that is generated for use for a short period of time is called a _________ .

(Multiple Choice)
4.7/5
(37)

typically the __________ takes as input a seed plus some context specific values such as a user ID or an application ID.

(Short Answer)
4.7/5
(32)

the stream cipher is similar to the one-time pad with a difference being that a one-time pad uses a pseudorandom number stream and a stream cipher uses a genuine random number stream.

(True/False)
4.9/5
(41)

the most important and widely used stream cipher is __________ .

(Short Answer)
4.9/5
(31)

A __________ uses a nondeterministic source to produce randomness.

(Multiple Choice)
4.8/5
(41)

the seed that serves as input to the PRNG must be secure for cryptographic applications.

(True/False)
4.8/5
(35)

two distinct requirements for a sequence of random numbers are unpredictability and __________ .

(Short Answer)
4.8/5
(39)

two criteria used to validate that a sequence of numbers is random are uniform distribution and __________ .

(Short Answer)
4.7/5
(33)

the Blum, Blum, Shub generator is referred to as a ____________ .

(Multiple Choice)
4.7/5
(39)

the purpose of the __________ test is to determine whether the number of runs of ones and zeros of various lengths is as expected for a random sequence.

(Short Answer)
4.8/5
(27)

three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric ciphers, and hash functions and message authentication codes.

(True/False)
4.7/5
(37)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)