Categorization of random number generators: Implementation with applications.

Categorization of random number generators: Implementation with applications.

Source publication
Article
Full-text available
Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic algorithms are public and their strength depends on the keys, cryptoanalysis of encrypted ciphers c...

Context in source publication

Context 1
... QRNG [58] is an online platform where anybody can generate quantum random numbers with just one click and use them. Figure 5 illustrates the categories of RNGs and their implementation methodology or practical approach for integrating them into a cryptosystem. ...

Similar publications

Article
Full-text available
In Appl. Opt. 55, 4720-4728 (2016), authors demonstrated the vulnerability of Linear Canonical Transform (LCT)-based optical encryption system. One of the primary reasons for this is the predictable nature of the security keys (i.e., simulated random keys) used in the encryption process. To alleviate, in this work, we are presenting a Physically Un...

Citations

... In [71], Hao et al. devised an image encryption system utilizing quantum principles, employing a quantum-based PRNG [72] and NEQR model [73] for encryption. However, potential vulnerabilities lie in the PRNG's quantum entanglement basis, risking the security of the generated code stream, and potential threats targeting quantum algorithms might pose a security risk despite their high performance in experiments. ...
Article
Full-text available
In the contemporary landscape, where a huge amount of data plays a vital role, the importance of strong and robust cybersecurity measures has become increasingly paramount. This research proposes a review and extensively explores cybersecurity techniques within the domain of machine/deep learning and quantum techniques, with a particular focus on cryptographic methods and methodologies applied to image encryption. The proposed survey covers a range of cybersecurity techniques, including quantum random number generation, secure transmission of quantum images, watermarking through quantum methods, and quantum steganography. Moreover, it explores the domain of image encryption, which integrates adversarial neural networks, deep learning and machine learning, transformation techniques, and chaotic neural networks that can be used to secure digital data from cyber attacks. Our focus extends beyond highlighting advances in investigating vulnerabilities in existing cryptographic techniques. By identifying the challenges and weaknesses, the potential solutions are also presented, establishing a foundation for future recommendations. These future suggestions address and overcome the vulnerabilities observed in existing cybersecurity techniques. The aim of the extensive survey and analysis of existing cryptographic techniques is to provide a deep understanding of innovative and diverse approaches within the cybersecurity domain. Simultaneously, it aims to create a roadmap for the future to counter potential cyber threats and challenges.
... Although several quantum random number generators have been recently discussed in the scientific literature [6], [7], to the best of the authors' knowledge, this paper is the first one to describe quantum circuits optimized for the generation of random numbers within the range of the admissible values of RPG dice. They were subsequently utilized for generating random numbers in a three-dimensional dice game. ...
Conference Paper
In role-playing games (RPGs), players are called upon to assume the role of a character moving in an imaginary environment and facing several challenges. Their success or failure often depends on randomizers like cards or dice. Regarding the latter, the most commonly used in RPGs are the Platonic solids with the addition of the ten-sided die. They are commonly simulated through classical computers, however, since true randomness is not in their nature, they can only generate pseudorandom numbers. On the contrary, quantum computers exploit the nondeterministic nature of quantum mechanics, so they are perfect candidates for truly random simulations in games of chance. For this reason, this paper proposes and tests various quantum circuits for sampling uniformly distributed discrete values within a fixed range, corresponding to the number of faces of the dice. The simulations reveal the pure randomness of the output of the implemented circuits. They were then used to generate random numbers within a three-dimensional dice-rolling game.
... TRNGs (True RNGs) exist to amend these vulnerabilities because they extract randomness from the environment, generating higher entropy keys in the process. TRNGs are very diverse [10], and can extract randomness from multiple sources such as signal noise or voltage fluctuation. TRNGs usually need to establish a threshold to determine whether the output should be "0" or "1". ...
... QRNGs [10]- [12] are a type of TRNG that extract randomness from the behavior of quantum particles, which are intrinsically random by our understanding of the laws of physics. Fig. 1 shows the structure of a QRNG: a light source emits photons directly into a sheet. ...
Conference Paper
A communication protocol for the distribution of cryptographic keys generated by a quantum random number generator (QRNG) has been developed by introducing a minor modification to Kerberos and using SRP as the authentication mechanism. The protocol, named Qerberos, allows two users to acquire the same symmetric key generated by a trusted third party with access to a QRNG, whose keys have higher entropy than a classical generator. An implementation that employs two different QRNGs has been tested for different parameters achieving good performance and short request times.