Cryptography, Basic Computer Science

Assignment Help:
Assume |s1|=|s2|=n and consider the functions defined, for any s1 and s2, as:
(a) G1(s1,s2)=s1 xor s2, (b) G2(s1,s2)=(s1, s2, s1 xor s2).
We have that:

A.
G1 and G2 are pseudo-random generators because their outputs are uniformly (and thus, pseudo-randomly) distributed if so are their input

B.
G1 and G2 are not pseudo-random generators because either their outputs are not longer than their inputs or there exists a statistical test that distinguishes their outputs from a random string of the same length

C.
G1 and G2 are not pseudo-random generators because either there exists an efficient algorithm that can compute their input from their output or their outputs are not longer than their inputs

D.
G1 and G2 can be proved to be pseudo-random generators using a proof by reduction

Related Discussions:- Cryptography

Tech ed, can you help me convert binary into decimals?

can you help me convert binary into decimals?

Evolution of erp , Evolution of ERP  The origin of using computers for ...

Evolution of ERP  The origin of using computers for business, traces the following line of story. Originally, they were designed to support the repetitive and time consuming fu

Internal structure of agents - artificial intelligence, I n t e rnal St...

I n t e rnal Structure of Agents We have looked at agents in terms of their external influences and behaviors: they take input from the environment and perform rational act

Networking operating systems, Networking Operating Systems,  Networking OS ...

Networking Operating Systems,  Networking OS provides file sharing, Networking OS provides communication scheme, NT Server Security added Multi user capability added RAI

Heuristic search strategies-artificial intelligence, Heuristic Search Strat...

Heuristic Search Strategies-Artificial intelligence In general speaking, a heuristic search is one which utilizes a rule of thumb to improve an agent's performance in solving p

Algorithm writing, algorithm to simulate railway reservation process

algorithm to simulate railway reservation process

Give a preliminary design for the mobile phone, Question: Imagine that ...

Question: Imagine that you are part of a design team creating a new mobile phone for people such as "Angel White" whose persona is given below: Angel is turning 90 years old

Cryptography, Question 1 Consider the one-time pad encryption scheme to e...

Question 1 Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the ev

CAI, What is CAI? Explain its pitfalls

What is CAI? Explain its pitfalls

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd