The topic discussed in this chapter are: Attacks on pseudorandom generators, tests for pseudorandom functions, true random generators. After studying this chapter you will be able to present an understanding of the random numbers and pseudorandom numbers; understand the use and implementation of TRNG, PRNG and PRF. | Lecture Network security Chapter 18 - Dr. Munam Ali Shah