Explain how the use of poor programming techniques can result or has resulted in inappropriate use of symmetric cryptography for authentication and weak master key algorithms based on artificially low entropy
Topic 6 DQ 1
Electronic slot machines are examples of systems intended to display results based on randomness. Because electronic slot machines are finite systems, they must depend on pseudo random numbers. How does this affect the outcome to the novice game player, and how does this provide an avenue for hackers to abuse the machines?
Topic 6 DQ 2
Electronic voting machines necessarily require very high levels of security that are often implemented using cryptography. Explain how the use of poor programming techniques can result or has resulted in inappropriate use of symmetric cryptography for authentication and weak master key algorithms based on artificially low entropy. Explain how this facilitates brute force attacks.