Week2 Flashcards
Which is a useful source of randomness?
The sum of the first n numbers in a Fibonacci sequence, where n is chosen randomly.
The time taken by the software to perform a certain action on different machines.
The outcome of rolling two 6-sided dice.
The patterns made by floating material in lava lamps.
The patterns made by floating material in lava lamps.
Which can be a good source for the seed of a random number generator?
The time taken by any program to execute a task on the same machine again and again.
The millisecond values from CPU time
The atmospheric noise generated by a radio that is not tuned to any station.
The outcome of rolling two 6-sided dice.
The atmospheric noise generated by a radio that is not tuned to any station.
Which characteristic improves the quality of a random number generator?
A low probability of generating a particular number.
Some numbers are generated only after fixed intervals.
Only a few numbers are generated more frequently than others.
Predictability when generating numbers.
A low probability of generating a particular number.
Which bit string passes the frequency test?
11111111111111100000
0000000001111111111111111111
0123446789012345567890
09182736455463728190
09182736455463728190
Which bit string passes the frequency test?
11111111110000000000
0000000001111111111111111111
11111111111111100000
0123446789012345567890
11111111110000000000
Which test ignores frequency as a factor for randomness?
Gap Test
Serial Test
Poker Test
Frequency Test
Gap Test
For a CSPRNG, given a large number of previously generated outputs, which situation is ideal?
An attacker should not be able to predict the previous number generated.
An attacker should be able to predict the seed that starts the generation.
An attacker should be able to predict the state of the generator.
An attacker should not be able to predict the next number generated.
An attacker should not be able to predict the next number generated.
For a CSPRNG, given a large number of previously generated outputs, which situation is ideal?
An attacker should be able to predict the state of the generator.
An attacker should not be able to predict the nth number generated in the sequence from now.
An attacker should be able to predict the seed that starts the generation.
An attacker should not be able to predict the previous number generated.
An attacker should not be able to predict the nth number generated in the sequence from now.
What do random numbers and crypto secure random numbers have in common?
Both are equally random and unpredictable.
Both have an equal number of digits.
Both must pass next bit test.
Both require Non-Deterministic generators.
Both require Non-Deterministic generators.
Correct! Non-deterministic algorithms ensure the unpredictability required to generate this numbers.
What does a state compromise test use a current state to do?
To compromise the numbers generated in the past.
To compromise the generation of future numbers.
To compromise the seed used by an algorithm.
To compromise the current random number.
To compromise the numbers generated in the past.
Correct! To prevent security issues, it is very important that past numbers cannot be generated back from the stolen state.
Why notuse natural randomness to generate crypto secure random numbers?
It is difficult to generate random numbers frequently when using natural sources.
Natural randomness is not so common.
Changing the analog noise to digital numbers is difficult.
It is difficult to get a hold of sources of randomness.
It is difficult to generate random numbers frequently when using natural sources.
Correct! The natural patterns can stay constant or blank for a significant amount of time. That is why they are used to generate seeds for CSPRNGs.
What is the reason why Blum Blum Shub cannot be typically used?
It is slower because huge prime numbers are multiplied to generate one bit.
It is slower as huge prime numbers are generated bit by bit.
It fails the next bit test.
It fails state compromise test.
It is slower because huge prime numbers are multiplied to generate one bit.
Correct! Two, 1000 bit long numbers are multiplied and only 1 bit from the product is used, making the algorithm very slow.
Which is the best-proposed way to generate CSPRNs?
Using HMAC
Using hashing
Using encryption
Using natural source
Using HMAC
Correct! It is better than just hashing in the sense that HMACs use padding and encryption along with hashing that introduces more randomness to the output.
When in counter mode encryption-based CSPRNG, what is the variable that does not change its value?
Seed
X_nXn
Input plaintext
Output parity bit
Seed
Correct! Although a workaround can be implemented to prevent state compromise, the counter mode CSPRNG discussed in lecture uses same seed every time.
Which definition is the best for a hash function map?
Input data of an arbitrary size onto output data of a fixed size.
Input data of an arbitrary size onto output data of an arbitrary size.
Input data of a fixed size onto output data of a fixed size.
Input data of a fixed size onto output data of an arbitrary size.
Input data of an arbitrary size onto output data of a fixed size.
Correct! This is why hashes are also known as digests.