Cryptography, Basic Computer Science

Assignment Help:
Assume |s1|=|s2|=n and consider the functions defined, for any s1 and s2, as:
(a) G1(s1,s2)=s1 xor s2, (b) G2(s1,s2)=(s1, s2, s1 xor s2).
We have that:

A.
G1 and G2 are pseudo-random generators because their outputs are uniformly (and thus, pseudo-randomly) distributed if so are their input

B.
G1 and G2 are not pseudo-random generators because either their outputs are not longer than their inputs or there exists a statistical test that distinguishes their outputs from a random string of the same length

C.
G1 and G2 are not pseudo-random generators because either there exists an efficient algorithm that can compute their input from their output or their outputs are not longer than their inputs

D.
G1 and G2 can be proved to be pseudo-random generators using a proof by reduction

Related Discussions:- Cryptography

Editor and assembler, Editor and Assembler:   To write a program in...

Editor and Assembler:   To write a program in any of the programming languages requires an editor.  This is  a program that is used to create text files. While saving the p

Websites, Hanson websites are built to work for your business and are built...

Hanson websites are built to work for your business and are built on the concept of intelligent website. An intelligent website is more than just a brochure on the web. It allows y

What is the definition of macro?, Definition of the macro A macro is a col...

Definition of the macro A macro is a collection of repetitive instructions in a program which are codified only one time and can be used as many times as required. The major differ

Block matching algorithm, I am using block matching algorithm to get the mo...

I am using block matching algorithm to get the motion vectors, now, how can I get the depth map/depth value from the motion vectors?

Explain CPU scheduling and its objectives?, Definition of CPU scheduling: T...

Definition of CPU scheduling: The assignment of physical processors to processes allows processors to complete work. The process of determining that for which process which pro

Data mining analysis, Using Weka 3.6 (basketball or cloud data set). Using ...

Using Weka 3.6 (basketball or cloud data set). Using the EM clustering method, how many clusters did the algorithm decide to make? If we change from "Use Training Set" to "Percenta

Function, write a function named "location_of_largest"that takes as its arg...

write a function named "location_of_largest"that takes as its arguments the following:(1) an array of integer values

Expert system, Develop a simple expert system to pick ten stocks to conside...

Develop a simple expert system to pick ten stocks to consider. Create seven or more rules that could be used in such an expert system. Create five cases and use the rules

What help with this Assembly language Subroutine, Write an ARM subroutine w...

Write an ARM subroutine which will extract a substring from a string. You will need to use the library routine malloc to allocate memory for the new string. The subroutine signatu

What is the main principle of an operating system?, The operating system i...

The operating system is the layer among the hardware and the programs you run. It provides programs a standard interface to the hardware; or else every program would need to includ

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd