Cryptography, Basic Computer Science

Assignment Help:
Assume |s1|=|s2|=n and consider the functions defined, for any s1 and s2, as:
(a) G1(s1,s2)=s1 xor s2, (b) G2(s1,s2)=(s1, s2, s1 xor s2).
We have that:

A.
G1 and G2 are pseudo-random generators because their outputs are uniformly (and thus, pseudo-randomly) distributed if so are their input

B.
G1 and G2 are not pseudo-random generators because either their outputs are not longer than their inputs or there exists a statistical test that distinguishes their outputs from a random string of the same length

C.
G1 and G2 are not pseudo-random generators because either there exists an efficient algorithm that can compute their input from their output or their outputs are not longer than their inputs

D.
G1 and G2 can be proved to be pseudo-random generators using a proof by reduction

Related Discussions:- Cryptography

Cmis, how much it cost for 8 week class

how much it cost for 8 week class

Explain the different methods of encryption technique, Problem When a d...

Problem When a data is sent across the network it is encrypted and arranged in a way that even if there is a diversion in the flow of data should not leak the data. At the rece

Artificial intelligence agents, Artificial Intelligence Agents: We dis...

Artificial Intelligence Agents: We discussed what we will be talking about in Artificial Intelligence and why those things are important. This chapter is all about how we wi

Algorithm, algorithm to determine if a number is odd or even

algorithm to determine if a number is odd or even

Differentiate the client–server and peer-to-peer models of d, The client-se...

The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to

Explanation of characteristics of computers, Problem 1. Briefly explain...

Problem 1. Briefly explain on the characteristics of computers Explanation of characteristics of computers 2. Write a note on Cache Memory Note on Cache Memor

Data mining test, Use the methods of C4.5 to design a decision tree

Use the methods of C4.5 to design a decision tree

Discuss the roles of system analysts in detail, Question 1 Explain the ...

Question 1 Explain the following system design tools in detail System Flowcharts Decision tables Decision trees Organization charts Question 2 Write s

Classify computer system according to capacity, classify computer system ac...

classify computer system according to capacity. how they are different from computer according to the classification of technology.provide the comparative study also.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd