150 likes | 400 Vues
Random Number Generation Using Quantum Physics. Introduction to randomness and random numbers. PRNG-s. TRNG-s. Comparison between PRNG-s and TRNG-s. Application of random numbers. Authentication. Confidentiality. Scientific calculations. What is a random number Testing randomness.
E N D
Introduction to randomness and random numbers PRNG-s TRNG-s Comparison between PRNG-s and TRNG-s
Application of random numbers Authentication Confidentiality Scientific calculations • What is a random number • Testing randomness
Generating random numbers Software solutions Physical sources of randomness - Biased and unbiased sequences - Determinism hidden behind complexity - Randomness revealed by simplicity
The Quantis QRNG Figure 1: Optical system used to generate random numbers
Principles High bit rate 4-16 Mb/s of truly random bits Transmission upon semi-transparent mirror Absolutely random transmission or reflection
Three subsystems • 1.The core of generator-comprises the diode and two single photon detectors • 2.Synchronisation electronic circuit-comprises a clock, triggering electronics and acquisition electronics for a single photon detectors • 3.The processing and interfacing subsystem –performs statistical and hardware checks , as well as unbiasing of the sequence, shaping the output electronic signals
Unbiasing of the random numbers Status monitoring Packaging Conclusion
Parking lot test • Randomly place unit circles in a 100*100 square • If the circle overlaps an existing one, try again • After 12000 tries, the number of successfully ’’parked’’ circles should follow a certain normal distribution • Pi values for files between 0.001 and 0.009- TRNG satisfies test
References [1] Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, New York, (1996). [2] Knuth, D., The Art of Computer Programming, Vol. 2, 2nd ed., Addison-Wesley, Reading, (1981). [3] Maurer, U., "A universal statistical test for random bits generators", Journal of Cryptology, 5, 89- 106 (1992). [4] Markoff, J., "Security flaw is discovered in software used in shopping", The New York Times (19 September 1995)