Which of the following is a deterministic algorithm to generate a sequence of numbers with little or no discernible pattern in the numbers, apart from broad statistical properties?
A.
Java Cryptographic Extension
B.
Simple and Protected GSSAPI Negotiation Mechanism
C.
Pseudorandom number generator
D.
Twofish
Explanation:
Pseudorandom number generator is a deterministic algorithm to generate a sequence of numbers with little or no discernible pattern in the numbers, apart from broad statistical properties. A pseudorandom number generator (PRNG) also called a deterministic random bit generator (DRBG). It is an algorithm for generating a sequence of numbers that approximates the properties of random numbers. The sequence is not truly random in that it is completely determined by a relatively small set of initial values called the PRNG s state, which contains a truly random seed. Even though, sequences that are closer to truly random can be generated using hardware random number generators, pseudorandom numbers are important in practice for their speed in number generation and their reproducibility, and they are thus vital in applications such as simulations, in cryptography, and in procedural generation.Good statistical properties are a vital requirement for the output of a PRNG and common classes of suitable algorithms include linear congruential generators, lagged Fibonacci generators, and linear feedback shift registers.
Cryptographic applications require the output to be unpredictable and more intricate designs are required. More recent examples of PRNGs with strong randomness guarantees are based on computational hardness assumptions, and comprise the Blum Blum Shub, Fortuna. and Mersenne Twister algorithms.
Answer option E is incorrect. The Simple and Protected GSSAPINegotiation Mechanism (SPNEGO) is a GSSAPI”pseudo mechanism’ that is used to negotiate one of a number of possible real mechanisms. It is often pronounced as “spengo”.
It is used when a client application wants to authenticate to a remote server, but neither end is sure what authentication protocols the other supports.The pseudo-mechanism uses a protocol to determine what common GSSAPImechanisms are available, selects one and then dispatches all further security operations to it. This can help organizations to deploy new security mechanisms in a phased manner.
Answer option D is incorrect. Twofish is a symmetric key block cipher. It operates on 128-bits block size and uses key sizes up to 256 bits. It uses pre-computed key-dependent S-boxes and a relatively complex key schedule. One half of an n-bit key is used as the actual encryption key,and the other half of the key is used to modify the encryption algorithm. It borrows some elements from the pseudo-Hadamard transform (PHT) from the SAFER family of ciphers.
Answer option A is incorrect. JCE (Java Cryptographic Extension) is used to provide a framework and implementation for encryption, key generation and key agreement, and Message Authentication Code (MAC) algorithms. It was developed as an extension package to include APIs and implementations for cryptographic services that were subject to U.S. export control regulations.