Question

In: Computer Science

1. you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but...

1. you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 4-5 paragraphs.

2 .Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted).

Solutions

Expert Solution

Hi Sir/Mam ,

Please find the answers below

Answer 1:-

Random numbers are considered as a very important part of any cryptographic activity in the current scenario.
It boosts up the protection of sensitive data by being involved in techniques like cryptography. It is significant for engineers to comprehend what interface to utilize, and how to deal with random numbers accurately in their code.

Clearly Random Number Generators are not only bounded to cryptography related application.

Random Number Generators are used in many applications such as statistical computing, computer simulation, cryptography and many other areas where the unpredictable result is necessity.

Random Number Generator are basically of two types:-

  • True Random Number Generators (TRNG)
  • Pseudo-Random Number Generators (PRNG)

Uses of Random Number Generators

Random number generators are also helpful in simulations related to Monte-Carlo methods, as troubleshooting is encouraged by the capacity to run a similar succession of irregular numbers again by beginning from a similar irregular or a random seed. They are likewise utilized in cryptography.
Sender and recipient can create an indistinguishable arrangement of numbers consequently to use from keys.

Pseudo-Random Number Generators are also used in computer programming for creating programs like "Random quote of a day" for the users and other such activities of programming.

Randdom numbers are also being used in concept of Hashing and creating any sorting algorithms.

__________________________________________________________________________________________

Answer 2:-

Encryption is a form of safegaurding our data from unauthorised sources by translating the data in a non readable format and that could only be understood by authorized personel through decrypting with the help of a key.

Need to Protect Data

In today's time , cyber-attacks are very common and a small mistake could bring a loss of millions.

Data is a much valuable thing that is present in the internet and to safeguard that data , encryption/decryption is a necessity.

To ensure the safety of PII Information and information related to credit cards debit cards , income flow etc all are present in one or the other databases which are a part of internet is the need of the hour and techniques such as cryptography , Digital Signatures , Hashing etc must be followed to protect them from unnauthorsed means.

Encryption Ensures personal/professional Safety

Encryption is significant in light of the fact that it permits you to safely ensure information that you don't need any other individual to approach. Organizations use it to ensure corporate privileged insights, governments use it to make sure about grouped data, and numerous people use it to secure individual data against any fraud.

Benifit of End to End Encryption

In the event that the data is secured start to finish. Therefore, it secures the protection of data and guarantees them that nobody — not even the informing administration itself could peruse their private data.

So from the above points it may be concluded that data privacy is not a choice but a necessity and we should try to use techniques such as encryption/decryption to ensure the data security.


Related Solutions

how would you use randomly generated numbers to find 30 random numbers from 1 to 500?
how would you use randomly generated numbers to find 30 random numbers from 1 to 500?
1. One method for obtaining random numbers is by Middle Square method, you are asked to...
1. One method for obtaining random numbers is by Middle Square method, you are asked to create an algorithm to get a random number with an 6 digit integer number. And give an example.
There are three parts to the question: 1) What are essential medicines? 2) Describe at least...
There are three parts to the question: 1) What are essential medicines? 2) Describe at least two reasons for a lack of access, or poor access, to medicines in a low or middle-income country. 3) Discuss a solution to one of the barriers to access medicines. You should be able to answer this in about one page.
1. Feedback is an essential component of game interfaces. Play an electronic game for at least...
1. Feedback is an essential component of game interfaces. Play an electronic game for at least 1 hour. How does this game provide feedback to the player through interface design? Is there any missing information that you feel should have been conveyed? What would need to be modified in order to convey this information? 2. How do aesthetics play a part in providing feedback to the player? Analyze the aesthetics of a game’s interface. Do the aesthetic components enhance or...
Trace how quantum cryptography will work if n = 4, and random bits are: b1 =...
Trace how quantum cryptography will work if n = 4, and random bits are: b1 = 1, b2 = 0, b3 = 1, b4 = 0; r1 = 1, r2 = 1, r3 = 0, r4 = 1; s1 = 1, s2 = 1, s3 = 0, s4 = 0. As a message, Alice wants to send as many first bits as possible from the string 1010, i.e.: if possible, the whole string, if not possible to send the whole...
create two random numbers between 1 and 6. if when the sum of two numbers are...
create two random numbers between 1 and 6. if when the sum of two numbers are added togethere their sum is less than 5 or greater than 12, output to the console: "you win". if is not, output "you lose" C++
In your own words, briefly state at least 1 thing you have learned from Chapter 19...
In your own words, briefly state at least 1 thing you have learned from Chapter 19 (Secured Transactions), Chapter 21 (Agency Relationships), and Chapter-24 (Merger & Acquisition)
Do you believe it continues to be essential to study diversity? Citing at least two peer...
Do you believe it continues to be essential to study diversity? Citing at least two peer reviewed studies on the subject, present to the class evidence that suggests Sociological studies of diversity remain relevant, or if you believe to the contrary, present peer reviewed evidence to support that position.
Cite at least two finance concepts that you have learned this semester and explain how you...
Cite at least two finance concepts that you have learned this semester and explain how you will use these concepts in making personal and business investment decisions. Ten sentences or less.
Suppose you have access to a random number generator Rng() that generates uniform random numbers in...
Suppose you have access to a random number generator Rng() that generates uniform random numbers in {0, 1, . . . , n − 1}. Design a function uses Rng() generate a uniform random number in {0, 1, . . . , m − 1}, where m ≤ n
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT