Professional Documents
Culture Documents
Chapter 8 Random Number Generation
Chapter 8 Random Number Generation
Chapter 8 Random Number Generation
1/5
Chapter 8 - Random Number Generation
Study online at https://quizlet.com/_947kpf
Three broad categories of cryptographic
algorithms are commonly used to create
PRNGs: symmetric block ciphers, asym- true
metric ciphers, and hash functions and
message authentication codes.
A widely used technique for pseudo-
random number generation is an algo-
true
rithm known as the linear congruential
method.
A cryptographically secure pseudoran-
dom bit generator is defined as one that false
passes the least significant bit test.
The security of Blum, Blum, Shub is
true
based on the difficulty of factoring n.
The stream cipher is similar to the
one-time pad with a difference being
that a one-time pad uses a pseudoran- false
dom number stream and a stream cipher
uses a genuine random number stream.
The longer the keyword the more difficult
true
the cryptanalysis.
A secret key for symmetric encryption
that is generated for use for a short peri- session key
od of time is called a _________ .
A __________ is used to produce a
pseudorandom string of bits of some PRF
fixed length.
A source that is effectively random is
Entropy source
referred to as a(n) __________ .
A __________ takes as input a source
TRNG
that is effectively random.
A pseudorandom number generator
takes as input a fixed value called the SEED
__________ and produces a sequence
2/5
Chapter 8 - Random Number Generation
Study online at https://quizlet.com/_947kpf
of output bits using a deterministic algo-
rithm.
The best that can be done to determine
if a PRNG generates numbers that have
the characteristic of randomness is on
consistency
the basis of multiple tests. These tests
should seek to establish uniformity, scal-
ability, and __________ .
The __________ test is the most basic
test of randomness and must be includ- frequency
ed in any test suite.
The Blum, Blum, Shub generator is re-
CSPRBG
ferred to as a ____________
Two approaches that use a block cipher
to build a PNRG and have gained wide- CTR and OFB
spread acceptance are:
A __________ uses a nondeterministic
TRNG
source to produce randomness.
__________ is an open source project
for creating truly random numbers us-
Entropy
ing inexpensive cameras, open source
code, and inexpensive hardware.
Various methods of modifying a bit
stream to reduce or eliminate a bias
Deskewing
have been developed. These are re-
ferred to as ___________ algorithms.
The Linux operating system uses
_________ entropy sources for generat-
ing random numbers.
In key distribution and reciprocal au-
thentication schemes two communicat-
ing parties cooperate by exchanging
messages to distribute keys and/or au- nonces
thenticate each other. In many cases
___________ are used for handshaking
to prevent replay attacks.
3/5
Chapter 8 - Random Number Generation
Study online at https://quizlet.com/_947kpf
4/5
Chapter 8 - Random Number Generation
Study online at https://quizlet.com/_947kpf
The purpose of the __________ test is
to determine whether the number of runs
runs
of ones and zeros of various lengths is
as expected for a random sequence.
A stream of pseudorandom numbers
should exhibit two forms of unpredictabil- backward
ity: forward and __________ .
__________ algorithms are designed
specifically and solely for the purpose of Purpose-built
generating pseudorandom bit streams.
In a stream cipher structure a key is
input to a pseudorandom bit generator
that produces a stream of 8-bit numbers
that are apparently random. The output
of the generator, called a ___________ keystream
, is combined one byte at a time with the
plaintext stream using the bitwise exclu-
sive-OR operation.
Question 42 options:
__________ is a stream cipher de-
signed in 1987 by Ron Rivest for RSA Rc4
Security.
Operating systems typically provide
a built-in mechanism for generat-
ing random numbers. For example,
Linux
__________ uses mouse and keyboard
activity, disk I/O operations, and specific
interrupts.
A fundamental requirement of the RSA
public-key encryption scheme is the abil- prime
ity to generate _________ numbers.
5/5