Chapter 8 Random Number Generation
Chapter 8 Random Number Generation
1/5
Chapter 8 - Random Number Generation
Study online at https://quizlet.com/_akinxu
Three broad categories of cryptographic
algorithms are commonly used to create
True PRNGs: symmetric block ciphers, asym-
metric ciphers, and hash functions and
message authentication codes.
A widely used technique for pseudo-
random number generation is an algo-
True
rithm known as the linear congruential
method.
A cryptographically secure pseudoran-
False dom bit generator is defined as one that
passes the least significant bit test.
The security of Blum, Blum, Shub is
True
based on the difficulty of factoring n.
The stream cipher is similar to the
one-time pad with a difference being
False that a one-time pad uses a pseudoran-
dom number stream and a stream cipher
uses a genuine random number stream.
The longer the keyword the more difficult
True
the cryptanalysis.
A secret key for symmetric encryption
session key that is generated for use for a short peri-
od of time is called a _________ .
A __________ is used to produce a
PRF pseudorandom string of bits of some
fixed length
A source that is effectively random is
entropy source
referred to as a(n) __________ .
A __________ takes as input a source
TRNG
that is effectively random.
A pseudorandom number generator
seed takes as input a fixed value called the
__________ and produces a sequence
2/5
Chapter 8 - Random Number Generation
Study online at https://quizlet.com/_akinxu
of output bits using a deterministic algo-
rithm.
The best that can be done to determine
if a PRNG generates numbers that have
the characteristic of randomness is on
consistency
the basis of multiple tests. These tests
should seek to establish uniformity, scal-
ability, and __________ .
The __________ test is the most basic
frequency test of randomness and must be includ-
ed in any test suite.
The Blum, Blum, Shub generator is re-
CSPRBG
ferred to as a ____________ .
Two approaches that use a block cipher
CTR mode and OFB mode to build a PNRG and have gained wide-
spread acceptance are:
A __________ uses a nondeterministic
TRNG
source to produce randomness.
__________ is an open source project
for creating truly random numbers us-
LavaRnd
ing inexpensive cameras, open source
code, and inexpensive hardware.
Various methods of modifying a bit
stream to reduce or eliminate a bias have
deskewing
been developed. These are referred to
as ___________ algorithms.
The Linux operating system uses
four _________ entropy sources for generat-
ing random numbers.
In key distribution and reciprocal au-
thentication schemes two communicat-
ing parties cooperate by exchanging
nonces messages to distribute keys and/or au-
thenticate each other. In many cases
___________ are used for handshaking
to prevent replay attacks.
3/5
Chapter 8 - Random Number Generation
Study online at https://quizlet.com/_akinxu
5/5