Exam 7: Random and Pseudorandom Number

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The longer the keyword the more difficult the cryptanalysis.

Free
(True/False)
4.8/5
(40)
Correct Answer:
Verified

True

A cryptographically secure pseudorandom bit generator is defined as one that passes the least significant bit test.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

False

The principle requirement of random or pseudorandom number generation is that the generated number stream be unpredictable.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

True

With true random sequences each number is statistically independent of other numbers in the sequence and therefore unpredictable.

(True/False)
4.9/5
(39)

A __________ is used to produce a pseudorandom string of bits of some fixed length.

(Multiple Choice)
4.9/5
(30)

In key distribution and reciprocal authentication schemes two communicating parties cooperate by exchanging messages to distribute keys and/or authenticate each other.In many cases ___________ are used for handshaking to prevent replay attacks.

(Multiple Choice)
4.7/5
(31)

Two approaches that use a block cipher to build a PNRG and have gained widespread acceptance are:

(Multiple Choice)
4.9/5
(29)

If the PRF does not generate effectively random 128-bit output values it may be possible for an adversary to narrow the possibilities and successfully use a brute force attack.

(True/False)
4.8/5
(30)

Two distinct requirements for a sequence of random numbers are unpredictability and __________ .

(Essay)
4.8/5
(33)

An algorithm that is used to produce an open-ended sequence of bits is referred to as a ___________ .

(Essay)
4.8/5
(38)

Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers,asymmetric ciphers,and hash functions and message authentication codes.

(True/False)
4.9/5
(42)

Various methods of modifying a bit stream to reduce or eliminate a bias have been developed.These are referred to as ___________ algorithms.

(Multiple Choice)
4.8/5
(35)

In a stream cipher structure a key is input to a pseudorandom bit generator that produces a stream of 8-bit numbers that are apparently random.The output of the generator,called a ___________ ,is combined one byte at a time with the plaintext stream using the bitwise exclusive-OR operation.

(Essay)
4.8/5
(31)

The most important and widely used stream cipher is __________ .

(Essay)
4.8/5
(31)

There are well-defined tests for determining uniform distribution and independence to validate that a sequence of numbers is random.

(True/False)
4.8/5
(37)

Examples of a pseudorandom function are decryption keys and nonces.

(True/False)
4.7/5
(31)

The stream cipher is similar to the one-time pad with a difference being that a one-time pad uses a pseudorandom number stream and a stream cipher uses a genuine random number stream.

(True/False)
4.9/5
(43)

The distribution of bits in a random number sequence should be ___________ ,therefore the frequency of occurrence of ones and zeros should be approximately equal.

(Multiple Choice)
4.9/5
(35)

A stream of pseudorandom numbers should exhibit two forms of unpredictability: forward and __________ .

(Essay)
4.9/5
(38)

Two criteria used to validate that a sequence of numbers is random are uniform distribution and __________ .

(Essay)
4.8/5
(39)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)