Exam 7: Random and Pseudorandom Number
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
The purpose of the Maurer's universal statistical test is to determine whether the number of ones and zeros in a sequence are approximately the same as would be expected for a truly random sequence.
(True/False)
4.8/5
(36)
The true random number generator may simply involve conversion of an analog source to a binary output.
(True/False)
4.9/5
(32)
The security of Blum,Blum,Shub is based on the difficulty of factoring n.
(True/False)
4.8/5
(33)
Random numbers play an important role in the use of encryption for various network security applications.
(True/False)
4.9/5
(35)
The Blum,Blum,Shub generator is referred to as a ____________ .
(Multiple Choice)
4.7/5
(33)
Operating systems typically provide a built-in mechanism for generating random numbers.For example,__________ uses mouse and keyboard activity,disk I/O operations,and specific interrupts.
(Essay)
4.9/5
(33)
A __________ uses a nondeterministic source to produce randomness.
(Multiple Choice)
4.8/5
(24)
__________ is an open source project for creating truly random numbers using inexpensive cameras,open source code,and inexpensive hardware.
(Multiple Choice)
4.8/5
(38)
The Linux operating system uses _________ entropy sources for generating random numbers.
(Multiple Choice)
4.8/5
(36)
If the algorithm is good the resulting sequences will pass many reasonable tests of randomness.These numbers are referred to as ___________ numbers.
(Essay)
4.9/5
(35)
A secret key for symmetric encryption that is generated for use for a short period of time is called a _________ .
(Multiple Choice)
4.9/5
(27)
__________ is a stream cipher designed in 1987 by Ron Rivest for RSA Security.
(Essay)
4.9/5
(39)
__________ algorithms are designed specifically and solely for the purpose of generating pseudorandom bit streams.
(Essay)
4.8/5
(27)
A widely used technique for pseudorandom number generation is an algorithm known as the linear congruential method.
(True/False)
4.8/5
(36)
A pseudorandom number generator takes as input a fixed value called the __________ and produces a sequence of output bits using a deterministic algorithm.
(Multiple Choice)
4.8/5
(38)
A source that is effectively random is referred to as an)__________ .
(Multiple Choice)
4.8/5
(29)
The __________ test is the most basic test of randomness and must be included in any test suite.
(Multiple Choice)
5.0/5
(35)
The purpose of the __________ test is to determine whether the number of runs of ones and zeros of various lengths is as expected for a random sequence.
(Essay)
4.8/5
(34)
The seed that serves as input to the PRNG must be secure for cryptographic applications.
(True/False)
4.8/5
(37)
Typically the __________ takes as input a seed plus some context specific values such as a user ID or an application ID.
(Essay)
4.8/5
(33)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)