Deck 7: Random and Pseudorandom Number
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 7: Random and Pseudorandom Number
1
A __________ is used to produce a pseudorandom string of bits of some fixed length.
A)PRF
B)PRNG
C)OFB PRNG
D)TRNG
A)PRF
B)PRNG
C)OFB PRNG
D)TRNG
A
2
The purpose of the Maurer's universal statistical test is to determine whether the number of ones and zeros in a sequence are approximately the same as would be expected for a truly random sequence.
False
3
The seed that serves as input to the PRNG must be secure for cryptographic applications.
True
4
A widely used technique for pseudorandom number generation is an algorithm known as the linear congruential method.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
A __________ takes as input a source that is effectively random.
A)PRF
B)BBS
C)PRNG
D)TRNG
A)PRF
B)BBS
C)PRNG
D)TRNG
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
With true random sequences each number is statistically independent of other numbers in the sequence and therefore unpredictable.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
If the PRF does not generate effectively random 128-bit output values it may be possible for an adversary to narrow the possibilities and successfully use a brute force attack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Random numbers play an important role in the use of encryption for various network security applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
A source that is effectively random is referred to as an)__________ .
A)open source
B)entropy source
C)keystream
D)seed
A)open source
B)entropy source
C)keystream
D)seed
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The longer the keyword the more difficult the cryptanalysis.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
A pseudorandom number generator takes as input a fixed value called the __________ and produces a sequence of output bits using a deterministic algorithm.
A)seed
B)fixed skew
C)entropy source
D)keystream
A)seed
B)fixed skew
C)entropy source
D)keystream
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Examples of a pseudorandom function are decryption keys and nonces.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The principle requirement of random or pseudorandom number generation is that the generated number stream be unpredictable.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
A cryptographically secure pseudorandom bit generator is defined as one that passes the least significant bit test.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers,asymmetric ciphers,and hash functions and message authentication codes.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A secret key for symmetric encryption that is generated for use for a short period of time is called a _________ .
A)strategic key
B)sequence key
C)session key
D)stream key
A)strategic key
B)sequence key
C)session key
D)stream key
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The true random number generator may simply involve conversion of an analog source to a binary output.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
There are well-defined tests for determining uniform distribution and independence to validate that a sequence of numbers is random.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
The security of Blum,Blum,Shub is based on the difficulty of factoring n.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The stream cipher is similar to the one-time pad with a difference being that a one-time pad uses a pseudorandom number stream and a stream cipher uses a genuine random number stream.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
Two approaches that use a block cipher to build a PNRG and have gained widespread acceptance are:
A)CTR mode and CFB mode
B)CTR mode and OFB mode
C)CBC mode and CFB mode
D)OFB mode and ECB mode
A)CTR mode and CFB mode
B)CTR mode and OFB mode
C)CBC mode and CFB mode
D)OFB mode and ECB mode
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Various methods of modifying a bit stream to reduce or eliminate a bias have been developed.These are referred to as ___________ algorithms.
A)backward
B)deskewing
C)forward
D)keystream
A)backward
B)deskewing
C)forward
D)keystream
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
Typically the __________ takes as input a seed plus some context specific values such as a user ID or an application ID.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Two distinct requirements for a sequence of random numbers are unpredictability and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A __________ uses a nondeterministic source to produce randomness.
A)CSPRBG
B)TRNG
C)PRNG
D)BBS
A)CSPRBG
B)TRNG
C)PRNG
D)BBS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The best that can be done to determine if a PRNG generates numbers that have the characteristic of randomness is on the basis of multiple tests.These tests should seek to establish uniformity,scalability,and __________ .
A)consistency
B)authentication
C)frequency
D)sequencing
A)consistency
B)authentication
C)frequency
D)sequencing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ is an open source project for creating truly random numbers using inexpensive cameras,open source code,and inexpensive hardware.
A)LavaRnd
B)Blum,Blum,Shub
C)Maurer's statistics
D)Entropy
A)LavaRnd
B)Blum,Blum,Shub
C)Maurer's statistics
D)Entropy
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
A __________ is a symmetric encryption algorithm in which ciphertext output is produced bit-by-bit or byte-by-byte from a stream of plaintext input.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The purpose of the __________ test is to determine whether the number of runs of ones and zeros of various lengths is as expected for a random sequence.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
A stream of pseudorandom numbers should exhibit two forms of unpredictability: forward and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
Two criteria used to validate that a sequence of numbers is random are uniform distribution and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
In key distribution and reciprocal authentication schemes two communicating parties cooperate by exchanging messages to distribute keys and/or authenticate each other.In many cases ___________ are used for handshaking to prevent replay attacks.
A)session keys
B)nonces
C)RC4's
D)entropies
A)session keys
B)nonces
C)RC4's
D)entropies
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The __________ is drawn from the physical environment of the computer and could include things such as keystroke timing patterns,disk electrical activity,mouse movements,and instantaneous values of the system clock.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The __________ test is the most basic test of randomness and must be included in any test suite.
A)frequency
B)runs
C)unpredictability
D)Maurer
A)frequency
B)runs
C)unpredictability
D)Maurer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
An algorithm that is used to produce an open-ended sequence of bits is referred to as a ___________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The distribution of bits in a random number sequence should be ___________ ,therefore the frequency of occurrence of ones and zeros should be approximately equal.
A)independent
B)uniform
C)reversed
D)streamed
A)independent
B)uniform
C)reversed
D)streamed
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The Linux operating system uses _________ entropy sources for generating random numbers.
A)four
B)three
C)one
D)two
A)four
B)three
C)one
D)two
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The Blum,Blum,Shub generator is referred to as a ____________ .
A)TRNG
B)OFB PRNG
C)QRN
D)CSPRBG
A)TRNG
B)OFB PRNG
C)QRN
D)CSPRBG
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
If the algorithm is good the resulting sequences will pass many reasonable tests of randomness.These numbers are referred to as ___________ numbers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The most important and widely used stream cipher is __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
__________ is a stream cipher designed in 1987 by Ron Rivest for RSA Security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A fundamental requirement of the RSA public-key encryption scheme is the ability to generate _________ numbers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
In a stream cipher structure a key is input to a pseudorandom bit generator that produces a stream of 8-bit numbers that are apparently random.The output of the generator,called a ___________ ,is combined one byte at a time with the plaintext stream using the bitwise exclusive-OR operation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Operating systems typically provide a built-in mechanism for generating random numbers.For example,__________ uses mouse and keyboard activity,disk I/O operations,and specific interrupts.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
__________ algorithms are designed specifically and solely for the purpose of generating pseudorandom bit streams.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck