Why is the random class in the .net framework not suitable, Basic Computer Science

Assignment Help:

QUESTION

(a) (i) Why is the Random class in the .NET framework not suitable for generating random bytes for cryptography purposes?

(ii) Mention two characteristics required for generating random bytes for cryptography purposes?

(iii) Name the class that is typically used for generating random bytes for cryptography purposes. Are the values generated truly random? Justify your answer.

(iv) How are truly random values generated for high security applications?

(b) For each of the following algorithms mention the type of algorithm and the security services provided by the algorithms:

  1. IDEA
  2. RSA
  3. SHA
  4. HMAC-SHA
  5. DSA

Related Discussions:- Why is the random class in the .net framework not suitable

Write a long note letters to the editor, Question 1 What is meant by typog...

Question 1 What is meant by typography? Describe the process in which one can choose and use type Question 2 What is investigative reporting? Write a long note Question 3

Types of operating systems, Operating Systems:  An operating system is a se...

Operating Systems:  An operating system is a set of programs that manage computer hardware resources and provide common services for application software.  There are following kind

Communications programs , Communications Programs : By communications prog...

Communications Programs : By communications programs, we mean those programs which allow a computer to communicate via a transmission cable to another electronic device. Here we d

Open systems interconnection, Open Systems Interconnection (OS1): As t...

Open Systems Interconnection (OS1): As there are many different protocols for LANs and WANs, communication between two different systems can be difficult. The International St

Data mining analysis, Using Weka 3.6 (basketball or cloud data set). Using ...

Using Weka 3.6 (basketball or cloud data set). Using the EM clustering method, how many clusters did the algorithm decide to make? If we change from "Use Training Set" to "Percenta

Packet switching, Packet Switching: This is one of recent techniques o...

Packet Switching: This is one of recent techniques of switching. Packet switching was originally developed for use by ARPA network by the Defence Department of US. According t

Soft computing, Defination of Propositionl logic Predicate logic genertic a...

Defination of Propositionl logic Predicate logic genertic algorithm Hybrid system Optimization Fuzzy system rules Fuzzy system application

Sma* search - artificial intelligence, SMA* Search-Artificial intelligence ...

SMA* Search-Artificial intelligence IDA* search is good from a memory point of view. actually it may  be criticised for not using enough memory - utilizing  more memory may inc

Data input , Data Input : There are several aspects of data input that nee...

Data Input : There are several aspects of data input that need careful consideration. We shall assume that in a laboratory environment you are mainly concerned with entering data

Operating system, Does Process Manager in Operating System know the depende...

Does Process Manager in Operating System know the dependency order that Process A depends on Process B?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd