Most modern TCP implementations use pseudo-random number generators (PRNG) to determine starting sequence numbers for TCP sessions. With such generators, it is difficult to compute the ith number generated, given only the (i − 1)st number generated. Explain what network security risks are created if an attacker is able to break such a PRNG so that he can in fact easily compute the ith number generated, given only the (i −1)st number generated.
Answers
Answered by
0
Answer:
.jsjdjjssbjcjbsxjcjjshd
Answered by
0
when designing a security system you must design it to be secure against attacks even if the attacker knows all the algorithms in the program. To put it another way, the part of a security system that must stay hidden in order for the system to function properly.
Similar questions
English,
9 days ago
Social Sciences,
18 days ago
Chemistry,
18 days ago
Physics,
9 months ago
Science,
9 months ago