Two approaches that use a block cipher to build a PNRG and have gained widespread acceptance are:

A. CTR mode and CFB mode
B. CTR mode and OFB mode
C. CBC mode and CFB mode
D. OFB mode and ECB mode


B. CTR mode and OFB mode

Computer Science & Information Technology

You might also like to view...

In C++, some of the following are legal identifiers. Which? Why?

a. 9xyz b. Xyz c. X+yz d. xy_z e. xyz!

Computer Science & Information Technology

What Windows file system permits user accounts and user groups to be linked to folder and file permissions?

A. NT B. FAT32 C. NTFS D. FAT NT

Computer Science & Information Technology

________ are instances of classes that follow certain conventions for class design.

a. Properties. b. JavaBeans objects. c. JSF elements. d. None of the above.

Computer Science & Information Technology

Text that is aligned evenly on both sides is known as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology