Random Number Generation: Comparison
Please note this is a comparison between Version 4 by Nico Mexis and Version 3 by Tolga Arul.

Ever since the antiquity, random number generation has played an important role both in common everyday life activities, such as leisure games, as well as in the advancement of science. Such means as dice and coins have been employed since the ancient times in order to generate random numbers that were used for gambling, dispute resolution, leisure games, and perhaps even fortune-telling. The theory behind the generation of random numbers, as well as the ability to potentially predict the outcome of this process, has been heavily studied and exploited by mathematics, in an attempt to either ensure the randomness of the process, to gain an advantage in correctly predicting its future outcomes, or to approximate the results of rather complicated computations. Especially in cryptography, random numbers are used due to the mentioned properties, so that attackers have no other option but to guess. This fact, in conjunction with the ongoing digitalisation of our world, has led to an interest in random number generation within the framework of computer science. In this context, random number generation systems are classified into two main categories: pseudorandom number generators and true random number generators, with the former generating sequences of numbers that appear to be random, but are in fact completely predictable when the initial value (being referred to as the seed) and conditions used for the number generation process are known, and with the latter generating truly random sequences of numbers that can only be predicted (correctly) with negligible probability, even if the initial value and conditions are known. 

  • random numbers
  • pseudorandom number generators
  • true random number generators

1. Introduction

Ever since the antiquity, random number generation has played an important role both in common everyday life activities, such as leisure games, as well as in the advancement of science. One of the oldest ways in which humans generated random numbers has been through the use of dice. It does not seem to be known when dice were invented, but they have been employed since ancient times, alongside with coin flipping, for predicting the future, decision-making, fortune-telling, gambling, dispute resolution, and leisure games. However, coin tosses are known to have a certain bias, which has been studied extensively[1]. In addition, coins could somevetimesn rarely land on the edge, rendering the result useless[2]. Modern usages of random numbers include Monte Carlo experiments, game decisions, and even Cryptography (see also Cryptographically-Secure Pseudorandom Number Generator).

Random Number Generators are often abbreviated and referred to as RNGs.

2. Desirable Properties

A RNG should have twfour desirable properties:

  1. Uniformity: Each individual output must be equally probable.
  2. Independence: The occurrence of one output must be independent of the occurrence of another output.
  3. Long Period: If the RNG becomes deterministic after some time, the period should be as long as possible.
  4. Practicability: Numbers should be generated efficiently and the RNG should be supported on different architectures and systems.

The coin toss mentioned above does not exactly fulfil these characteristics, but can still provide sufficient random numbers for everyday use.

3. Types of Random Number Generators

The two main types of RNGs are called True RNGs (TRNGs) and Pseudo-RNGs (PRNGs).

3.1. True Random Number Generators

A TRNG is able to generate random numbers that can only be predicted (correctly) with negligible probability, even if the initial value and conditions are known. TRNGs are typically slower than PRNGs and may additionally be biased. For debiasing, most often von-Neumann-correction is deployed[3].

3.2. Pseudorandom Number Generators

A PRNG can generate sequences of numbers that appear to be random, but are in fact completely predictable when the initial value (being referred to as the seed) and conditions used for the number generation process are known.

 

 

which fieldPRNGs of cryptography?

The theoary behind the generation of random numbers, as well as the ability to potentially predict the outcome of this process, has been heavily studied by usually algorithms or simple mathematics, in an attempt to either ensure the randomness of the process or gain an advantage in correctly predicting its future outcomes. In particular, probability theory is one of the main mathematical fields relevant to random number generation.

 

cryptographically secure random number generator

Random numbers al formulae, making them faster thave also been employed in cryptography, exactly due to their properties. This fact, in conjunction with the ongoing digitalisation of our world, has, more recently, led to an interest in random number generation within the framework of computer scienceTRNGs at the cost of indeterminism. In t

4. Generation Methods

This secontext, random number generation systems are classified into two main categories: PseudoRandom Number Generators (PRNGs) and True Random Number Generators, with the former generating sequences of numbers that appear to be random, but are in fact completely predictable when the initial value (being referred to as the seed) antion lists some commonly used and newly proposed cRNGs.

4.1. TRNGs

  • Radioactive decay: The fact that it is impossible to predict when an atom will decay can be used to generate random numbers[4].
  • Radio frequency noise: FM broadcasting and other means of wireless communication are susceptible to noise, which can be extracted to obtain random numbers[5].
  • Thermal noise: Electronic components such as resistors emit thermal noise, which can be measured to extract random numbers[6].
  • Memory timings: The write and read latency of memories is usually prone to noise which can be extracted to generate random numbers[7].
  • Ring oscillators: Extracting the jitter of multiple free running oscillators by comparing them can lead to random numbers[8].

4.2. PRNGs

  • Middle-Square Method: To generate a new random number, the previous one is squared and the middle digits are taken as the next random numbers[9].
  • Congruential Generators: The next random number is generated using a simple congruence relation[10][11].
  • Mersenne Twister: Uses an algorithm to generate 624 random 32-bit numbers in a single iteration[12].
  • Blum-Blum-Shub generator: Uses quadratic residues in a semiprime quotient ring to generate the next random number[13].
  • Block ciphers (ANSI X9.17): Appendix C of the standard includes a random generator using a block cipher[14].

5. Attacks

Mondistions used for the number generation process are known, and with the latter generating truly random sequences of numbers that can only be predicted (correctly) with negligible probability, even if the initial value and conditions are known RNGs are prone to some kind of attack.

Noise

Chaos, deAterministic, yet rather "random"

Quantum effetactks, truly random and unpredictable

on PRepetition[1]

Coin tossing leads to bits...

Random Number Generation Systems in Computer Science

Pses includorandome, number generation, based on algorithms

Trubut are not limite random number Genera tors[15]:

  • Direct Cryptanalytic Attack: An attacker can directly distinguish between the output of the PRNG and random numbers (cryptanalyze the PRNG).
  • Input-based Attack: An attacker is able to use knowledge and control of the PRNG inputs to cryptanalyze it.
  • State Compromise Extension Attack: The attacker can guess state information due to an earlier breach of security.

 

6. Modern Applications

 

  • Random noise (e.g., Gaussian noise)
  • Key generation (TLS, SSH)
  • Salts for Hashes
  • RSA prime factors
  • Nonces (TLS)
  • Initialization Vectors (AES/Rijndael)

References

  1. Persi Diaconis, Susan Holmes, and Richard Montgomery, Dynamical Bias in the Coin Toss, SIAM Review, vol. 49, iss. 2, pp. 211-235, 2007. DOI: 10.1137/S0036144504446436Diaconis, Persi; Holmes, Susan; Montgomery, Richard Dynamical Bias in the Coin Toss. SIAM Review 2007, 49, 211-235, 10.1137/S0036144504446436.
  2. Murray, Daniel B.; Teare, Scott W. Probability of a tossed coin landing on edge. Phys. Rev. E 1993, 48, 2547-2552, 10.1103/PhysRevE.48.2547.
  3. Von Neumann, John Various Techniques Used in Connection With Random Digits. National Bureau of Standards: Applied Mathematics Series 1951, 12, 36-38.
  4. Helmut Schmidt Quantum-Mechanical Random-Number Generator. Journal of Applied Physics 1970, 41, 462-468.
  5. Lee, Kyungroul; Lee, Manhee True Random Number Generator (TRNG) Utilizing FM Radio Signals for Mobile and Embedded Devices in Multi-Access Edge Computing. Sensors 2019, 19, 4130, 10.3390/s19194130.
  6. Huang Zhun and Chen Hongyi, "A truly random number generator based on thermal noise," ASICON 2001. 2001 4th International Conference on ASIC Proceedings (Cat. No.01TH8549), Shanghai, China, 2001, pp. 862-864, doi: 10.1109/ICASIC.2001.982700.
  7. Chakraborty, Supriya; Garg, Abhilash; Suri, Manan True Random Number Generation From Commodity NVM Chips. IEEE Transactions on Electron Devices 2020, 67, 888-894, 10.1109/TED.2019.2963203.
  8. Markettos, A.T., Moore, S.W. (2009). The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators. In: Clavier, C., Gaj, K. (eds) Cryptographic Hardware and Embedded Systems - CHES 2009. CHES 2009. Lecture Notes in Computer Science, vol 5747. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04138-9_23
  9. Von Neumann, John 13. Various Techniques Used in Connection With Random Digits. Appl. Math Ser 1951, 12, 36-38.
  10. Lehmer, D. H. Mathematical methods in large-scale computing units. Annals of the Computation Laboratory of Harvard University 1949, 26, 141-146.
  11. Thomson, W. E. A Modified Congruence Method of Generating Pseudo-random Numbers. The Computer Journal 1958, 1, 83.
  12. Matsumoto, Makoto; Nishimura, Takuji Mersenne Twister: A 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul. 1998, 8, 3-30, 10.1145/272991.272995.
  13. Blum, Lenore; Blum, Manuel; Shub, Michael A Simple Unpredictable Pseudo-Random Number Generator. SIAM Journal on Computing 1986, 15, 364-383.
  14. ANSI X 9.17 (Revised), "American National Standard for Financial Institution Key Management (Wholesale)," American Bankers Association, 1985
  15. Kelsey, J., Schneier, B., Wagner, D., & Hall, C. (1998). Cryptanalytic attacks on pseudorandom number generators. In Fast Software Encryption: 5th International Workshop, FSE’98 Paris, France, March 23–25, 1998 Proceedings 5 (pp. 168-188). Springer Berlin Heidelberg.
More
ScholarVision Creations