Which operation is an example of computationally intensive cryptographic work?

Study with Khan Academy's The Internet Test. Prepare with dynamic questions, interactive hints, and detailed explanations. Ace your exam confidently!

Multiple Choice

Which operation is an example of computationally intensive cryptographic work?

Explanation:
Generating randomness is essential in cryptography because keys, nonces, and salts must be unpredictable to keep data secure. Producing high-entropy randomness often requires substantial computation—gathering entropy from multiple sources, using randomness extractors, or running a cryptographically strong PRNG with a secure seed. That extra effort is what makes it an example of computationally intensive cryptographic work. The other activities—printing a document, rendering a video, and copying files—are routine computer tasks focused on I/O or media processing and don’t involve the heavy cryptographic computations used to protect information.

Generating randomness is essential in cryptography because keys, nonces, and salts must be unpredictable to keep data secure. Producing high-entropy randomness often requires substantial computation—gathering entropy from multiple sources, using randomness extractors, or running a cryptographically strong PRNG with a secure seed. That extra effort is what makes it an example of computationally intensive cryptographic work. The other activities—printing a document, rendering a video, and copying files—are routine computer tasks focused on I/O or media processing and don’t involve the heavy cryptographic computations used to protect information.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy