Source Extractors. The paper answers the question of security of cryptographic protocols in
which correlated tapes are used over multiple executions of the protocol by introducing the
notion of a 'Correlated Source Extractor'and giving a construction of that. They solve the
mentioned problem in two settings, namely, Zero Knowledge and Multi Party Computational
protocols. In the report, we attempt to 'extract'and present the main ideas and techniques …