Multiple Choice
In key distribution and reciprocal authentication schemes two communicating parties cooperate by exchanging messages to distribute keys and/or authenticate each other.In many cases ___________ are used for handshaking to prevent replay attacks.
A) session keys
B) nonces
C) RC4s
D) entropies
Correct Answer:

Verified
Correct Answer:
Verified
Q1: With true random sequences each number is
Q2: _ algorithms are designed specifically and solely
Q3: there are well-defined tests for determining uniform
Q5: Random numbers play an important role in
Q6: If the algorithm is good the resulting
Q7: A source that is effectively random is
Q8: A fundamental requirement of the RSA public-key
Q9: the principle requirement of random or pseudorandom
Q10: A secret key for symmetric encryption that
Q11: typically the _ takes as input a