Exam 8: Random Bit Generation and Stream Ciphers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

the longer the keyword the more difficult the cryptanalysis.

(True/False)
4.8/5
(30)

Examples of a pseudorandom function are decryption keys and nonces.

(True/False)
4.9/5
(25)

the best that can be done to determine if a PRNG generates numbers that have the characteristic of randomness is on the basis of multiple tests.these tests should seek to establish uniformity, scalability, and __________ .

(Multiple Choice)
4.9/5
(36)

the __________ is drawn from the physical environment of the computer and could include things such as keystroke timing patterns, disk electrical activity, mouse movements, and instantaneous values of the system clock.

(Short Answer)
5.0/5
(34)

__________ is a stream cipher designed in 1987 by Ron Rivest for RSA Security.

(Short Answer)
4.8/5
(31)

the purpose of the Maurer's universal statistical test is to determine whether the number of ones and zeros in a sequence are approximately the same as would be expected for a truly random sequence.

(True/False)
4.7/5
(34)

In a stream cipher structure a key is input to a pseudorandom bit generator that produces a stream of 8-bit numbers that are apparently random.the output of the generator, called a ___________ , is combined one byte at a time with the plaintext stream using the bitwise exclusive-OR operation.

(Short Answer)
4.8/5
(31)

two approaches that use a block cipher to build a PNRG and have gained widespread acceptance are:

(Multiple Choice)
4.7/5
(33)

A __________ is used to produce a pseudorandom string of bits of some fixed length.

(Multiple Choice)
4.8/5
(39)

the Linux operating system uses _________ entropy sources for generating random numbers.

(Multiple Choice)
4.8/5
(42)

An algorithm that is used to produce an open-ended sequence of bits is referred to as a ___________ .

(Short Answer)
4.9/5
(38)

the true random number generator may simply involve conversion of an analog source to a binary output.

(True/False)
4.8/5
(36)

A widely used technique for pseudorandom number generation is an algorithm known as the linear congruential method.

(True/False)
4.9/5
(44)

A pseudorandom number generator takes as input a fixed value called the __________ and produces a sequence of output bits using a deterministic algorithm.

(Multiple Choice)
4.8/5
(33)

the security of Blum, Blum, Shub is based on the difficulty of factoring n.

(True/False)
4.8/5
(28)

A stream of pseudorandom numbers should exhibit two forms of unpredictability: forward and __________ .

(Short Answer)
4.8/5
(42)

Various methods of modifying a bit stream to reduce or eliminate a bias have been develope D.these are referred to as ___________ algorithms.

(Multiple Choice)
4.8/5
(34)

A cryptographically secure pseudorandom bit generator is defined as one that passes the least significant bit test.

(True/False)
5.0/5
(35)

the distribution of bits in a random number sequence should be ___________ , therefore the frequency of occurrence of ones and zeros should be approximately equal.

(Multiple Choice)
4.8/5
(42)

A __________ takes as input a source that is effectively random.

(Multiple Choice)
4.9/5
(32)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)