Use your secure PRG (part 1 in Problem 1 – it is not secure, but for simplicity, you can assume itis) in order to construct a PRG that stretches a small number of bits (say 32 or 64) to 1KB. Intuitively, but with some mathematical rigor, justify why your implementation is a secure PRG.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here