8220specify In The Correct Order From Top To Bottom Which #519
“Specify in the correct order (from top to bottom), which Pseudo Random Number Generation schemes are represented here?<br /> i)<br /> m = [ n/outlen] w_o = V<br /> W = the null string<br /> For i = 1 to m<br /> w_i = MAC(K,w_i-1)<br /> W = W || wi<br /> Return leftmost n bits of W<br /> ii)<br /> m = [n/outlen] W = the null string<br /> For i = 1 to m<br /> w_i = MAC(K,V || i)<br /> W = W || w_i<br /> Return leftmost n bits of W<br /> iii)<br /> m = [n/outlen] A(0) = V<br /> W = the null string<br /> For I = 1 to m<br /> A(i) = MAC (K,A(i-1))<br /> w_i = MAC (K, a(I) || v)<br /> W = W || w_i<br /> Return leftmost n bits of W”</p>
This multiple choice question (MCQ) is related to the book/course gs gs124 Introduction Cyber Security. It can also be found in gs gs124 Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution - CCM, GCM and Key Wrapping - Quiz No.2.
“Specify in the correct order (from top to bottom), which Pseudo Random Number Generation schemes are represented here?
i)
m = [ n/outlen] w_o = V
W = the null string
For i = 1 to m
w_i = MAC(K,w_i-1)
W = W || wi
Return leftmost n bits of W
ii)
m = [n/outlen] W = the null string
For i = 1 to m
w_i = MAC(K,V || i)
W = W || w_i
Return leftmost n bits of W
iii)
m = [n/outlen] A(0) = V
W = the null string
For I = 1 to m
A(i) = MAC (K,A(i-1))
w_i = MAC (K, a(I) || v)
W = W || w_i
Return leftmost n bits of W”
i)
m = [ n/outlen] w_o = V
W = the null string
For i = 1 to m
w_i = MAC(K,w_i-1)
W = W || wi
Return leftmost n bits of W
ii)
m = [n/outlen] W = the null string
For i = 1 to m
w_i = MAC(K,V || i)
W = W || w_i
Return leftmost n bits of W
iii)
m = [n/outlen] A(0) = V
W = the null string
For I = 1 to m
A(i) = MAC (K,A(i-1))
w_i = MAC (K, a(I) || v)
W = W || w_i
Return leftmost n bits of W”
NIST SP 800-90 ; TLS/WTLS ; IEEE 802.11
TLS/WTLS ; NIST SP 800-90 ; IEEE 802.11
IEEE 802.11 ; NIST SP 800-90 ; TLS/WTLS
NIST SP 800-90 ; IEEE 802.11 ; TLS/WTLS