English, asked by bhavo3808, 18 days ago

Most modern TCP implementations use pseudo-random number generators (PRNG) to determine starting sequence numbers for TCP sessions. With such generators, it is difficult to compute the ith number generated, given only the (i − 1)st number generated. Explain what network security risks are created if an attacker is able to break such a PRNG so that he can in fact easily compute the ith number generated, given only the (i −1)st number generated.

Answers

Answered by phaniharsahphanihars
0

Answer:

.jsjdjjssbjcjbsxjcjjshd

Answered by adventureisland
0

when designing a security system you must design it to be secure against attacks even if the attacker knows all the algorithms in the program. To put it another way, the part of a security system that must stay hidden in order for the system to function properly.

Similar questions