Use your secure PRG (part 1 in Problem 1 – it is not secure, but for simplicity, you can assume itis) in order to construct a PRG that stretches a small number of bits (say 32 or 64) to 1KB....


Use your secure PRG (part 1 in Problem 1 – it is not secure, but for simplicity, you can assume itis) in order to construct a PRG that stretches a small number of bits (say 32 or 64) to 1KB. Intuitively, but with some mathematical rigor, justify why your implementation is a secure PRG.



Jun 05, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here