Which operation is an example of computationally intensive cryptographic work?

Study for the Khan Academy Internet Test. Master topics with detailed questions, hints, and insightful explanations. Prepare effectively and ace your exam!

Multiple Choice

Which operation is an example of computationally intensive cryptographic work?

Explanation:
Generating randomness is essential in cryptography because keys, nonces, and salts must be unpredictable to keep data secure. Producing high-entropy randomness often requires substantial computation—gathering entropy from multiple sources, using randomness extractors, or running a cryptographically strong PRNG with a secure seed. That extra effort is what makes it an example of computationally intensive cryptographic work. The other activities—printing a document, rendering a video, and copying files—are routine computer tasks focused on I/O or media processing and don’t involve the heavy cryptographic computations used to protect information.

Generating randomness is essential in cryptography because keys, nonces, and salts must be unpredictable to keep data secure. Producing high-entropy randomness often requires substantial computation—gathering entropy from multiple sources, using randomness extractors, or running a cryptographically strong PRNG with a secure seed. That extra effort is what makes it an example of computationally intensive cryptographic work. The other activities—printing a document, rendering a video, and copying files—are routine computer tasks focused on I/O or media processing and don’t involve the heavy cryptographic computations used to protect information.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy