Chapter 8 Random Number Generation

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Chapter 8 - Random Number Generation

Study online at https://quizlet.com/_947kpf

The principle requirement of random


or pseudorandom number generation is
true
that the generated number stream be
unpredictable.
Random numbers play an important role
in the use of encryption for various net- true
work security applications.
There are well-defined tests for deter-
mining uniform distribution and indepen-
false
dence to validate that a sequence of
numbers is random
With true random sequences each num-
ber is statistically independent of other
true
numbers in the sequence and therefore
unpredictable.
The true random number generator may
simply involve conversion of an analog true
source to a binary output.
Examples of a pseudorandom function
false
are decryption keys and nonces.
If the PRF does not generate effectively
random 128-bit output values it may be
possible for an adversary to narrow the true
possibilities and successfully use a brute
force attack.
The purpose of the Maurer's universal
statistical test is to determine whether
the number of ones and zeros in a se-
false
quence are approximately the same as
would be expected for a truly random
sequence.
The seed that serves as input to the
PRNG must be secure for cryptographic true
applications.

1/5
Chapter 8 - Random Number Generation
Study online at https://quizlet.com/_947kpf
Three broad categories of cryptographic
algorithms are commonly used to create
PRNGs: symmetric block ciphers, asym- true
metric ciphers, and hash functions and
message authentication codes.
A widely used technique for pseudo-
random number generation is an algo-
true
rithm known as the linear congruential
method.
A cryptographically secure pseudoran-
dom bit generator is defined as one that false
passes the least significant bit test.
The security of Blum, Blum, Shub is
true
based on the difficulty of factoring n.
The stream cipher is similar to the
one-time pad with a difference being
that a one-time pad uses a pseudoran- false
dom number stream and a stream cipher
uses a genuine random number stream.
The longer the keyword the more difficult
true
the cryptanalysis.
A secret key for symmetric encryption
that is generated for use for a short peri- session key
od of time is called a _________ .
A __________ is used to produce a
pseudorandom string of bits of some PRF
fixed length.
A source that is effectively random is
Entropy source
referred to as a(n) __________ .
A __________ takes as input a source
TRNG
that is effectively random.
A pseudorandom number generator
takes as input a fixed value called the SEED
__________ and produces a sequence

2/5
Chapter 8 - Random Number Generation
Study online at https://quizlet.com/_947kpf
of output bits using a deterministic algo-
rithm.
The best that can be done to determine
if a PRNG generates numbers that have
the characteristic of randomness is on
consistency
the basis of multiple tests. These tests
should seek to establish uniformity, scal-
ability, and __________ .
The __________ test is the most basic
test of randomness and must be includ- frequency
ed in any test suite.
The Blum, Blum, Shub generator is re-
CSPRBG
ferred to as a ____________
Two approaches that use a block cipher
to build a PNRG and have gained wide- CTR and OFB
spread acceptance are:
A __________ uses a nondeterministic
TRNG
source to produce randomness.
__________ is an open source project
for creating truly random numbers us-
Entropy
ing inexpensive cameras, open source
code, and inexpensive hardware.
Various methods of modifying a bit
stream to reduce or eliminate a bias
Deskewing
have been developed. These are re-
ferred to as ___________ algorithms.
The Linux operating system uses
_________ entropy sources for generat-
ing random numbers.
In key distribution and reciprocal au-
thentication schemes two communicat-
ing parties cooperate by exchanging
messages to distribute keys and/or au- nonces
thenticate each other. In many cases
___________ are used for handshaking
to prevent replay attacks.
3/5
Chapter 8 - Random Number Generation
Study online at https://quizlet.com/_947kpf

The distribution of bits in a random num-


ber sequence should be ___________ ,
therefore the frequency of occurrence of uniform
ones and zeros should be approximately
equal.
A __________ is a symmetric encryp-
tion algorithm in which ciphertext out-
stream cipher
put is produced bit-by-bit or byte-by-byte
from a stream of plaintext input.
Typically the __________ takes as input
a seed plus some context specific values psuedirandom function (PRF)
such as a user ID or an application ID.
Two criteria used to validate that a se-
quence of numbers is random are uni- independence
form distribution and __________ .
The most important and widely used
RC4
stream cipher is __________ .
Two distinct requirements for a se-
quence of random numbers are unpre- randomness
dictability and __________ .
If the algorithm is good the resulting
sequences will pass many reasonable
tests of randomness. These numbers pseudorandom
are referred to as ___________ num-
bers.
The __________ is drawn from the
physical environment of the computer
and could include things such as key-
entropy source
stroke timing patterns, disk electrical ac-
tivity, mouse movements, and instanta-
neous values of the system clock.
An algorithm that is used to produce an
pseudorandom number generator
open-ended sequence of bits is referred
(PRNG)
to as a ___________ .

4/5
Chapter 8 - Random Number Generation
Study online at https://quizlet.com/_947kpf
The purpose of the __________ test is
to determine whether the number of runs
runs
of ones and zeros of various lengths is
as expected for a random sequence.
A stream of pseudorandom numbers
should exhibit two forms of unpredictabil- backward
ity: forward and __________ .
__________ algorithms are designed
specifically and solely for the purpose of Purpose-built
generating pseudorandom bit streams.
In a stream cipher structure a key is
input to a pseudorandom bit generator
that produces a stream of 8-bit numbers
that are apparently random. The output
of the generator, called a ___________ keystream
, is combined one byte at a time with the
plaintext stream using the bitwise exclu-
sive-OR operation.
Question 42 options:
__________ is a stream cipher de-
signed in 1987 by Ron Rivest for RSA Rc4
Security.
Operating systems typically provide
a built-in mechanism for generat-
ing random numbers. For example,
Linux
__________ uses mouse and keyboard
activity, disk I/O operations, and specific
interrupts.
A fundamental requirement of the RSA
public-key encryption scheme is the abil- prime
ity to generate _________ numbers.

5/5

You might also like