This application relates generally to random number generators, including but not limited to generating true random numbers using an electromechanical apparatus, for cryptographic applications.
Random number generation is a critical component of computer and Internet security. Problems with pseudorandom number generators (e.g., seeded computational algorithms or deterministic logic) are well known. For example, an entire random sequence generated by a pseudorandom number generator can be reproduced if the seed value is known. Physical random number generators, on the other hand, use chaotic systems, and are good sources of entropy (randomness or unpredictability). Conventional true random number generators have typically used means, such as radiation decay, thermal noise or oscillator imperfections, for generating random numbers. However, traditional techniques suffer from inherent localities (e.g., present predictable results), are too sensitive to external influences (e.g., thermal noise is affected by temperature fluctuations), and/or suffer from efficiency limitations (e.g., too slow). Some systems tend to be bulky, and/or require complex setup/maintenance, and therefore are unsuitable for use in data centers.
Accordingly, there is a need for efficient and compact devices that can generate true random numbers (sometimes called entropy). The embodiments herein address the problem of generating true random numbers using an electro-mechanical device that can fit in traditional data centers. Various embodiments that incorporate or use the apparatus for cryptographic applications are described. For example, the apparatus, and the methods described here, can be used to provide Entropy As A Service (EAAS).
The systems, methods, and devices of this disclosure each have several innovative aspects, no single one of which is solely responsible for the desirable attributes disclosed herein.
According to some embodiments, an apparatus (e.g., a device) is provided for generating truly random numbers. The apparatus includes a container that is at least partially filled with a fluid (e.g., a liquid, such as water, or a gas, such as air). In some embodiments, the container is at least partially filled with fragments (e.g., fragments of bird feathers). The apparatus includes one or more cameras configured to capture images of one or more objects (e.g., dice) that are suspended in, added to, dispersed in, or distributed in, the fluid. In some embodiments, the one or more objects have a density similar to the density of the fluid. The apparatus includes one or more agitators configured to agitate (e.g., stir or circulate) the fluid. Agitation of the fluid by the one or more agitators cause the one or more objects to move within the fluid. The apparatus includes a random number generation circuit coupled to the one or more cameras. The random number generation circuit is configured to generate random numbers based on the one or more images captured by the one or more cameras.
In some embodiments, each object includes one or more physical features. The one or more images captured by the one or more cameras include a subset of physical features of the one or more physical features of the one or more objects. The random number generation circuit is further configured to generate the random numbers based on detecting the subset of physical features in the one or more images.
In some embodiments, the one or more objects include dice. The one or more physical features include dots (e.g., pips) on faces of each die. In some embodiments, the features include color, shade, and/or number of faces/sides of each die. In some embodiments, the subset of physical features include one or more dots of each die, and the random number generation circuit is further configured to generate the random numbers based on number of dots detected in the one or more images. In some embodiments, the captured images are hashed for the image noise, then converted to binary.
In some embodiments, each of the objects has a respective color. The random number generation circuit is configured to generate the random numbers based on detected colors of the objects detected in the images.
In some embodiments, each of the objects comprises a translucent object. The random number generation circuit is configured to generate the random numbers based on color hex codes of the pixels of the objects detected in the images.
In some embodiments, each of the objects includes a plurality of sides. The one or more physical features include graphics imprinted on the plurality of sides of each of the objects. The random number generation circuit is configured to generate the random numbers based on detected pixels within the graphics of the objects detected in the one or more images.
In some embodiments, each of the images includes a plurality of pixels having a total pixel count. The random number generation circuit is configured to generate random numbers based on (i) a count of the pixels, in a respective image, associated with the one or more objects in the captured images and (ii) the total pixel count.
In some embodiments, each of the captured images includes a date stamp and/or a time stamp. The random number generation circuit is configured to generate the random numbers based on the date stamp and/or the time stamp of the captured images.
In some embodiments, the random number generation circuit is configured to assign a respective time zone location to each of the captured images and generate the random numbers based on the captured images using the assigned time zone location of each of the captured images.
In some embodiments, the random number generation circuit is configured to generate the random numbers based on the count of objects in the captured images.
In some embodiments, the one or more cameras include a plurality of cameras. Each of the plurality of cameras faces an interior of the container at a respective distinct angle
In some embodiments, the apparatus includes a housing configured to fit in a server rack. For example, the housing is sized and/or shaped (e.g., cut) to fit into any server rack environment, such as a 4U rack assembly or a 2U rack assembly. The container is disposed in the housing. In some embodiments, the housing includes opposing first and second ends, with a first agitator attached to the first end of the housing and a second agitator attached to the second end of the housing. In some embodiments, the housing includes a top portion and a bottom portion. In some embodiments, the one or more cameras are attached to the outer portion of the housing (e.g., on the top or side), and the one or more cameras are directed toward the interior of the container.
In some embodiments, the apparatus includes one or more lighting units (e.g., a string of LED lights) configured to illuminate the container when the one or more cameras capture the one or more images of the one or more objects, and/or before/after the operation of the agitators. Embodiments are configured to use a variety of lights throughout the spectrum, including visible light, UV light, and infrared light. Some embodiments use several light sources and/or different wavelengths of light. Some embodiments use a single light source and/or a small band of wavelengths.
In some embodiments, the one or more agitators are disposed outside the container, and the one or more agitators are configured to vibrate or shake the container, thereby agitating the fluid to cause the one or more objects to move in the fluid.
In some embodiments, the one or more agitators are disposed within the container, and the one or more agitators are configured to rotate, stirring the fluid.
In some embodiments, the one or more agitators are coupled to one or more motors configured to cause each agitator to rotate, and the random number generation circuit includes a power control unit configured to control power supplied to the one or more motors.
In some embodiments, the one or more agitators comprise a hydraulic pump that circulates the fluid in the container.
In some embodiments, the random number generation circuit is further configured to receive a request, from a user, for a randomized key. In response to receiving the request, the random number generation circuit controls the one or more agitators to agitate the fluid, controls the one or more cameras to capture the one or more images, generates the randomized key based on the one or more images captured by the one or more cameras, and/or provides the randomized key to the user. In some embodiments, the random number generation circuit includes one or more buffers, and a batch of random numbers are generated and stored in the buffers each time the agitators and/or the cameras are activated (e.g., each buffer may store 1000 bits or 1000000 bits). In this case, when a random number or randomized key is requested, the system can generally respond to the request very quickly (e.g., in less than a 1/10of a millisecond, including the overhead to call the API function).
In some embodiments, the one or more objects have a density similar to the fluid so that (i) the one or more objects suspend (e.g., freely) in the fluid (e.g., move around rather than float/sink), and (ii) when the one or more agitators agitate the fluid, the one or more objects move (e.g., freely) within the fluid.
In some embodiments, the one or more cameras are disposed outside the container, and the container is made of a substantially transparent or see-through material through which the one or more objects are observable. The transparency can also be used as a means for a human to verify that the apparatus is functioning as intended (alternative techniques for generating random numbers generally have no visibility).
In another aspect, a method is provided for generating truly random numbers. The method is performed at an apparatus (e.g., an electro-mechanical device), such as the apparatus described above in reference to the apparatus claims. The method includes receiving a request for generating one or more randomized keys. In response to receiving the request, the method includes agitating, using one or more agitators, a fluid in a container filled with one or more objects that are suspended freely in the fluid, thereby causing the one or more objects to move freely in the container. The method also includes capturing, using one or more cameras, one or more images of the one or more objects. The method also includes generating a randomized key based on the one or more images, and storing the randomized key to a memory unit.
In some embodiments, each object includes one or more physical features. The one or more images captured by one or more cameras include a subset of physical features of the one or more physical features of the one or more objects, and generating the randomized key is further based on detecting the subset of physical features in the one or more images. In some embodiments, the container includes opposing first and second ends, and the one or more agitators include a first agitator attached to the first end and a second agitator attached to the second end. In some embodiments, the method further includes agitating the fluid using the first agitator, ceasing to agitate the fluid using the first agitator, agitating the fluid using the second agitator, and agitating the fluid using the first agitator and the second agitator. In some embodiments, the captured images are hashed for the image noise, then converted to binary.
In another aspect, a system generates truly random numbers. The system includes one or more random number generation units. Each random number generation unit includes a container that is at least partially filled with a fluid, one or more objects suspended freely in the fluid, one or more agitators configured to agitate the fluid, one or more cameras configured to capture one or more images of the one or more objects, and a random number generation circuit coupled to the one or more cameras and configured to generate random numbers based on the one or more images captured by the one or more cameras. When the one or more agitators agitate the fluid, the one or more objects move freely in the fluid in the container. The system also includes a memory unit coupled to the one or more random number generation units. The memory unit is configured to store the random numbers generated by the one or more random number generation units.
In some embodiments, the system includes a controller unit coupled to the memory unit. The controller unit (e.g., an entropy server) is configured to receive a request, from a user, for a randomized key. In response to receiving the request, the system retrieves a random number from the memory unit, generates the randomized key based on the random number retrieved from the memory unit, and provides the randomized key to the user. In some embodiments, the controller unit is further configured to delete the random number from the memory unit after it is used. In some embodiments, the controller unit is coupled to the one or more random number generation units. The controller unit is further configured to determine if the number of random numbers (e.g., bits) stored by the memory unit is below a threshold. In accordance with a determination that the number of random numbers stored by the memory unit is below the threshold, the controller unit selects a candidate random number generation unit from the one or more random generation units. For the candidate random generation unit, the controller unit controls the one or more agitators to agitate the fluid, controls the one or more cameras to capture the one or more images, and generates one or more random number based on the one or more images captured by the one or more cameras. The system causes the memory unit to store the random numbers generated by the candidate random generation unit.
As disclosed herein, the apparatus can be used for quantum resistant encryption. For example, the apparatus can be used to generate true random numbers to provide seed values for a quantum random number generator (QRNG). Because the seed values are neither generated by a QRNG nor by a pseudo-random number generators, they are secure against both quantum and classical computers.
Furthermore, some aspects of the present disclosure use one or more strings, consisting of one or more bits, of true random numbers generated by the apparatus as presented in one or more images captured by one or more cameras of the apparatus. The benefit is that an attacker cannot reverse engineer the string because an algorithm and seed value were not used to create the string.
Thus, apparatuses, methods, and systems are provided for generating truly random numbers.
For a better understanding of the various described embodiments, reference should be made to the Description of Embodiments below, in conjunction with the following drawings in which like reference numerals refer to corresponding parts throughout the figures and specification.
Reference will now be made to embodiments, examples of which are illustrated in the accompanying drawings. In the following description, numerous specific details are set forth in order to provide an understanding of the various described embodiments. However, it will be apparent to one of ordinary skill in the art that the various described embodiments may be practiced without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks have not been described in detail so as not to unnecessarily obscure aspects of the embodiments.
The terminology used in the description of the various described embodiments herein is for the purpose of describing particular embodiments only and is not intended to be limiting. As used in the description of the various described embodiments and the appended claims, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term “and/or” as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. It will be further understood that the terms “includes,” “including,” “comprises,” and/or “comprising,” when used in this specification, specify the presence of stated features, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, elements, components, and/or groups thereof.
As used herein, the term “if” means “when” or “upon” or “in response to determining” or “in response to detecting” or “in accordance with a determination that,” depending on the context. Similarly, the phrase “if it is determined” or “if [a stated condition or event] is detected” means “upon determining” or “in response to determining” or “upon detecting [the stated condition or event]” or “in response to detecting [the stated condition or event]” or “in accordance with a determination that [a stated condition or event] is detected,” depending on the context.
It will also be understood that, although the terms first, second, etc. are, in some instances, used herein to describe various elements, these elements should not be limited by these terms. These terms are used only to distinguish one element from another.
Entropy As A Service (EAAS) is an emerging technology, and there are no known standards on how to retrieve entropy in a secure fashion from an EAAS provider. Entropy is lack of order or predictability, or in other words, true randomness. With modern computing systems, entropy is used in a variety of ways, from picking random selections on your playlist to securing the launch codes of nuclear missiles. The quality of entropy becomes important in complex systems. For example, if the same pattern is used over and over again to create a security key, then that key may be easily guessed or deduced by an adversary. Entropy providers must constantly test themselves to reassure their customers that the randomness has no detectable patterns contained within.
A problem with modern computing systems is that a true source of randomness cannot be found on must CPUs. Conventional CPUs use a Pseudo-Random-Number-Generator (PRNG) to create entropy when needed. PRNG entropy is considered low quality and can be safely used in limited situations when the entropy can have a pattern. But if the entropy is to be used to create private keys, then the source of the entropy must be an unguessable sequence that an attacker cannot deduce. Some computers use seemingly random sources of entropy on a computer, such as mouse movement, disk seek latency, and other sources. While these sources provide generally good entropy, they require the computer system to be running for many hours or days in order to be able to provide ample entropy. In certain situations, such as a web server, this may not be enough to keep up; the web server will either stall waiting for entropy or have to revert to using a PRNG. This means that most computers need an external source of entropy in order to create high quality keys to be used in critical situations. The disclosed inventions include various embodiments of Entropy as a Service (EaaS or EAAS) architecture.
In some embodiments, the database 110 stores random numbers (entropy) 114. In some embodiments, the database 110 includes a communication interface 116. The communication interface 116 enables input and output to the computer system 130. In some embodiments, the communication interface 116 is a single communication channel, such as HDMI, USB, VGA, DVI, or DisplayPort. In other embodiments, the communication interface 116 includes several distinct communication channels operating together or independently. In some embodiments, the communication interface 116 includes hardware capable of data communications using any of a variety of custom or standard wireless protocols (e.g., IEEE 802.15.4, Wi-Fi, ZigBee, 6LoWPAN, Thread, Z-Wave, Bluetooth Smart, ISA100.11a, WirelessHART, or MiWi) and/or any other suitable communication protocol. The wireless and/or wired connections may be used for sending data from the database 110 to the computer system 130. In some embodiments, the communication interface 116 may also receive random numbers 114 (e.g., from the random number generation devices 120) to be stored in the database 110.
Each of the random number generation devices 120 may be integrated within a server. The random number generation device 120 includes a random number generation apparatus 124, and a communication interface 126. The random number generation device 120 may include additional components that are not shown in
The random number generation device 120 is configured to generate random numbers. To accomplish this, the random number generation device 120 includes one or more random number generation apparatuses 124, each of which is configured to generate random numbers independently of the others. Each random number generation apparatus 124 is able to create different random numbers by acting alone, or by acting in consort (e.g., in cooperation with other apparatuses and/or devices, such as image processing devices).
Each random number generation apparatus 124 includes at least one container 142 filled with fluid (e.g., air, water, or similar liquid) or fragments (e.g., feathers), which allow objects 144 (e.g., dice) to move freely. Agitators 148 (e.g., fans) stir the fluid in the container 142. One or more cameras 146 in the apparatus take pictures (and/or videos) of the objects in the fluid in the container. A random number generation circuit 150 generates random numbers based on features extracted (e.g., shape, number of dots, and/or color) from the images (or videos) captured by the cameras 146, according to some embodiments. In some embodiments, the cameras 146 are external to the apparatus 124. For example, the cameras 146 are positioned opposite to (with a view of) the container 142. In some embodiments, the random number generation circuit 150 is coupled to the cameras 146, but decoupled from the apparatus 124.
The communication interface 126 enables input and output to the computer system 130. In some embodiments, the communication interface 126 is a single communication channel, such as USB. In other embodiments, the communication interface 126 includes several distinct communication channels operating together or independently. For example, the communication interface 126 may include separate communication channels for receiving control signals for the random number generation apparatus 124, and sending data from the random number generation apparatus 124 to the computer system 130 and/or to the database 110. The one or more communication channels of the communication interface 126 can be implemented as wired or wireless connections. In some embodiments, the communication interface 126 includes hardware capable of data communications using any of a variety of custom or standard wireless protocols (e.g., IEEE 802.15.4, Wi-Fi, ZigBee, 6LoWPAN, Thread, Z-Wave, Bluetooth Smart, ISA100.11a, WirelessHART, or MiWi), custom or standard wired protocols (e.g., Ethernet or HomePlug), and/or any other suitable communication protocol, including communication protocols not yet developed as of the filing date of this document.
In some embodiments, the computer system 130 sends instructions to the database 110 using a communication interface 136, to retrieve random numbers. In response to receiving the instructions, the database 110 may return random numbers 114 via the interface 116. In some embodiments, the random numbers stored in the database may be associated with the one or more random numbers generated by the random number generation device 120.
The computer system 130 can be implemented as any kind of computing device, such as an integrated system-on-a-chip, a microcontroller, a console, a desktop or laptop computer, a server computer, a tablet, a smart phone, or other mobile device. Thus, the computer system 130 includes components common to typical computing devices, such as a processor, random access memory, a storage device, a network interface, an I/O interface, and the like. The processor may be or include one or more microprocessors or application specific integrated circuits (ASICs). The memory may be or include RAM, ROM, DRAM, SRAM, and MRAM, and may include firmware, such as static data or fixed instructions, BIOS, system functions, configuration data, and other routines used during the operation of the computing device and the processor. The memory also provides a storage area for data and instructions associated with applications and data handled by the processor.
The storage device provides non-volatile, bulk, or long term storage of data or instructions in the computing device. The storage device may take the form of a magnetic or solid state disk, tape, CD, DVD, or other reasonably high capacity addressable or serial storage medium. Multiple storage devices may be provided or are available to the computing device. Some of these storage devices may be external to the computing device, such as network storage or cloud-based storage. The network interface includes an interface to a network and can be implemented as either a wired or a wireless interface. The I/O interface connects the processor to peripherals (not shown) such as sensors, displays, cameras, color sensors, microphones, keyboards, and/or USB devices.
In the example shown in
In some embodiments, each application 132 is a group of instructions that, when executed by a processor, generates cryptographic content. An application 132 may generate cryptographic content in response to inputs received from a user via operation of the random number generation device 120. Examples of applications 132 include cryptographic applications, such as applications for electronic commerce, chip-based payment cards, digital currencies, computer passwords, and communications.
In some embodiments, the device controller 134 is a software module that allows applications 132 to operate in conjunction with the database 110 and/or the random number generation device 120. In some embodiments, the device controller 134 receives information from the database 110 and provides the information to an application 132. Based on the received information, the device controller 134 determines cryptographic or encrypted content to provide to the database 110 to store and/or satisfy user requests for random numbers.
Similarly, in some embodiments, the device controller 134 receives random numbers from the random number generation device 120 and provides the information to an application 132. The application 132 can use the information to perform an action (e.g., satisfy a user request for encrypted data). In some embodiments, the device controller 134 generates control signals for the random number generation apparatus 124, which causes the apparatus 124 to generate random numbers. As noted above, the information received by the device controller 134 can also include information from the database 110. For example, the database 110 may store random numbers 114 generated by the random number generation device 120, and the application 132 can use this additional information to perform one or more actions within the application 132.
In some embodiments, the computer system 130 includes one or more processing units 128 (e.g., CPUs, microprocessors, and the like), a communication interface 136 (similar to the communication interfaces 116 and 126), memory 140, and one or more communication buses 138 for interconnecting these components (sometimes called a chipset). In some embodiments, the computer system 130 includes camera interfaces to communicate with cameras (e.g., the cameras 146 or any external cameras), to receive images and/or videos captured by the cameras.
In some embodiments, the memory 140 in the computer system 130 includes high-speed random access memory, such as DRAM, SRAM, DDR SRAM, or other random access solid state memory devices. In some embodiments, the memory includes non-volatile memory, such as one or more magnetic disk storage devices, one or more optical disk storage devices, one or more flash memory devices, or one or more other non-volatile solid state storage devices. The memory, or alternatively the non-volatile memory within memory, includes a non-transitory computer-readable storage medium. In some embodiments, the memory, or the non-transitory computer-readable storage medium of the memory, stores the following programs, modules, and data structures, or a subset or superset thereof:
The apparatus 124 includes one or more agitators 148 configured to stir the fluid. In some embodiments, the time frame for agitation is randomized based upon random values previously generated. This further ensures that the results can never be replicated. The agitator initiation is based upon a seed value. Some embodiments prove randomness using statistical methods. In some embodiments, the degree of randomness is monitored by a continuous health test provided by the Diehard suite (see https://en.wikipedia.org/wiki/Diehard_tests). Once the test results are positive and verified, the entropy is published to the EAAS server.
Note that the spinning of the dice (and/or other objects) in the liquid cannot be modeled by particle simulation or predicted. In particular, the random weight and mixture of viscous fluid, the randomization of the agitators, and the multiple color values used ensure that it is impossible to replicate by particle simulation.
The apparatus 124 also includes one or more cameras 146 configured to capture one or more images of the one or more objects 144. The cameras are mounted on the outside of the container with clear visibility into the container. In some embodiments, the cameras are mounted on the top, on the bottom, and/or on the sides of the container.
In some embodiments, the one or more cameras 146 are configured to capture color (e.g., RGB) images.
In some embodiments, the one or more cameras 146 are configured to capture black and white images.
In some embodiments, the one or more cameras 146 include a plurality of cameras. Each of the plurality of cameras faces the interior of the container at a respective (e.g., distinct) angle.
The apparatus also includes a random number generation circuit 150 coupled to the one or more cameras 146. The circuit 150 can be directly attached to the apparatus or remotely situated (either close to the apparatus, such as a couple of feet, or distant from the apparatus, such as a different node on a network). In some embodiments, the circuit 150 comprises a Raspberry Pi device, an SSD device, and the one or more cameras. In some embodiments, the process (i) captures the images, (ii) hashes the images to extract image noise, (iii) converts the hashed images to binary, (iv) tests the binary data using the Diehard suite, then (v) publishes the binary data to the EAAS server. The random number generation circuit 150 is configured to generate random numbers based on the one or more images captured by the one or more cameras 146. When the one or more agitators 148 stir the fluid, the one or more objects 144 move (e.g., freely) in the fluid in the container 142.
In some embodiments, the apparatus 124 includes a housing 168 configured to fit in a server rack. For example, the housing 168 is sized and/or shaped (e.g., cut) to fit into any server rack environment, such as a 4U/rack assembly. The container 142 is disposed in the housing 168. In some embodiments, the housing 168 includes an opposing first end 170-2 and a second end 170-4. A first agitator 148-2 is attached to the first end 170-2 and a second agitator 148-4 is attached to the second end 170-4 of the housing. In some embodiments, the housing 168 includes a top portion 172-2 and a bottom portion 172-4. In some embodiments, the one or more cameras 146 are attached to the top portion 172-2 of the housing, and the one or more cameras 146 are oriented toward the interior of the container 142.
In some embodiments, the apparatus 124 includes one or more lighting units 174 (e.g., a string of LED lights) configured to illuminate the container 142 when the one or more cameras 146 capture the one or more images of the one or more objects 144, and/or before/after the operation of the agitators 148.
In some embodiments, the one or more agitators 148 are disposed outside the container 142, and the one or more agitators 148 are configured to vibrate or shake the container 142 thereby stirring the fluid to cause the one or more objects 144 to move in the fluid.
In some embodiments, the one or more agitators 148 are disposed within the container 142, and the one or more agitators 148 (e.g., fans) are configured to rotate to stir the fluid.
In some embodiments, the one or more agitators 148 are coupled to one or more motors configured to cause each agitator 148 to rotate, and the random number generation circuit 150 includes a power control unit configured to control power supplied to the one or more motors.
In some embodiments, the random number generation circuit 150 is further configured to receive a request (e.g., from a device controller 134) to generate randomized keys. In response to receiving the request, the random number generation circuit 150 controls the one or more agitators 148 to stir the fluid, controls the one or more cameras 146 to capture the one or more images, generates the randomized keys based on the one or more images captured by the one or more cameras 146, stores the generated random numbers in the entropy cache 114, and/or provides the generated random numbers to external requestors (e.g., via an API call).
In some embodiments, the one or more objects 144 have a density similar to the fluid so that (i) the one or more objects 144 suspend (e.g., freely) in the fluid (e.g., move around rather than float/sink) and (ii) when the one or more agitators 148 stir the fluid, the one or more objects 144 move freely within the fluid.
In some embodiments, the one or more cameras 146 are disposed outside the container 142, and the container 142 is made of a substantially transparent or see-through material through which the one or more objects 144 are observable.
In some embodiments, a system (e.g., the entropy system 100) generates truly random numbers. The system 100 includes one or more random number generation units 124. Each random number generation unit 124 includes a container 142 that is at least partially filled with a fluid, one or more objects 144 suspended freely in the fluid, one or more agitators 148 configured to stir the fluid, one or more cameras 146 configured to capture one or more images of the one or more objects 144, and a random number generation circuit 150 coupled to the one or more cameras 146 and configured to generate random numbers based on the one or more images captured by the one or more cameras 146. When the one or more agitators 148 stir the fluid, the one or more objects 144 move freely in the fluid in the container 142. The system 100 also includes a database 110 coupled to the one or more random number generation units 124. The database 110 is configured to store the random numbers generated by the one or more random number generation units 124.
In some embodiments, the system 100 includes a controller unit 134 (sometimes called the “engine”) coupled to the database 110. The controller unit 134 is configured to receive requests for generating random numbers or retrieving random numbers stored in the entropy cache 114. In response to receiving a request from a user device, the system 100 retrieves a random number from the database 110, generates a randomized key based on the random number retrieved from the database 110, and provides the randomized key to the user device. In some embodiments, the controller unit 134 is further configured to delete the random number from the database 110 after use. In some embodiments, the controller unit 134 is coupled to the one or more random number generation devices 120. The controller unit 134 is further configured to determine if the number of random numbers 114 stored by the database 110 is below a threshold. When the number of random numbers 114 stored by the database 110 is below the threshold, the controller unit 134 selects a candidate random number generation apparatus 124. For the candidate random number generation apparatus, the controller unit 134 controls the one or more agitators 148 to stir the fluid, controls the one or more cameras 146 to capture the one or more images, and generates random numbers based on the one or more images captured by the one or more cameras 146. The system 100 causes the database 110 to store the random numbers generated by the candidate random number generation apparatus 124.
According to some embodiments of the present disclosure, one or more objects 144 are used to generate truly random numbers. The one or more objects 144 can include objects of any shape and/or size. In some embodiments, the one or more objects 144 are two-dimensional, cubic, polyhedral, spherical, ellipsoidal, or n-sided (where n is an integer ≥2)
In some embodiments, the one or more objects 144 have a density similar to a density of the fluid in which the one or more objects 144 are suspended.
In some embodiments, each object 144 includes one or more physical features. The one or more images captured by the one or more cameras 146 include a subset of physical features of the one or more physical features of the one or more objects 144. The random number generation circuit 150 is further configured to generate the random numbers based on detecting the subset of physical features in the one or more images.
In some embodiments, the one or more objects 144 include dice. The one or more physical features include dots (e.g., pips) on faces of each die. In some embodiments, the features include color, shade, and/or number of faces/sides of each die. In some embodiments, the subset of physical features include one or more dots on each die, and the random number generation circuit 150 is further configured to generate the random numbers based on the number of dots detected in the one or more images.
In some embodiments, each of the one or more objects 144 has a respective color. The random number generation circuit 150 is configured to generate random numbers based on detected colors of the objects detected in the one or more images captured by the one or more cameras 146. For example, the random number generation circuit 150 is configured to convert each of the detected colors into a hex color code.
In some embodiments, the one or more objects 144 include one or more translucent objects that allow light to be at least partially transmitted and/or diffused, thereby increasing the number and variation of detected colors of the objects detected in the one or more images captured by the one or more cameras 146. In some embodiments, light passes through the object 144 but does not show feature(s) that are on the other side of the object 144. In some embodiments, light passes through the object 144 and partially shows feature(s) that are on the other side of the object 144, which adds more complexity (and randomness) to the images. In some embodiments, the random number generation circuit 150 is configured to generate the random numbers based on color hex codes of the pixels of the objects detected in the one or more images, as discussed above.
In some embodiments, each of the objects 144 includes a plurality of sides (e.g., faces). The one or more physical features include graphics imprinted on the plurality of sides of each of the objects. For example, in some embodiments, the graphics can include letters of the alphabet, characters of different languages (e.g., the Chinese language, the Japanese language, the Korean language, or the Arabic language), graphics of animals and/or plants, and/or cryptographic codes. In some embodiments, each of the sides of an object 144 is imprinted with one or more graphics. Using a die as an exemplary object, in some embodiments, one of the faces of the die is imprinted with letter(s) of the English alphabet, another face of the die is imprinted with a Chinese character, a third face of the die is imprinted with a graphic of an animal, or a fourth face of the die is imprinted with a letter of the English alphabet and a dot. In some embodiments, the random number generation circuit 150 is configured to generate the random numbers based on detected pixels within the graphics of the objects detected in the one or more images captured by the one or more cameras 146.
In some embodiments, a captured image includes a plurality of pixels (e.g., 256by 256 pixels or 512 by 512 pixels) that can be described using an x-and y-coordinate system. For example, the x-direction or x-axis extends along a width of the image, and the y-direction or y-axis extends along a height of the image. In some embodiments, the random number generation circuit 150 is configured to determine the x-and y-coordinates corresponding to pixels of visible corners of the objects detected in the one or more images, and generate the random numbers based on the x-and y-coordinates.
In some embodiments, each of the images includes a plurality of pixels. Each of the images has a total pixel count. The random number generation circuit 150 is configured to generate random numbers based on a number of white (or negative) pixels relative to the pixel count of detected objects in each of the captured images. For example, in some embodiments, the random number generation circuit 150 is configured to generate random numbers based on (i) the count of the pixels in an image, associated with the one or more objects in the image and (ii) the total pixel count of the image. In some embodiments, the random number generation circuit 150 is configured to generate random images based on a plurality of captured images, based on (i) an aggregate count of the pixels in the plurality of images that are associated with the one or more objects in the images and (ii) an aggregate total pixel count of the plurality of images.
In some embodiments, each of the captured images includes a date stamp and/or a time stamp. The random number generation circuit 150 is configured to generate the random numbers based on the date stamp and/or the time stamp of each of the captured images.
In some embodiments, the random number generation circuit 150 is configured to assign a respective time zone location to each of the one or images captured by the one or more cameras 146, and generate the random numbers based on the assigned time zone location of each of the images.
In some embodiments, the random number generation circuit 150 is configured to generate the random numbers based on the count of the objects detected in the one or more images.
As disclosed herein, the apparatus 124 and methods can be used for quantum resistant encryption. For example, the apparatus 124 (e.g., combined with the disclosed methods) can be used to generate true random numbers to provide seed values for a QRNG. Because the seed values are neither generated by a QRNG nor by a pseudo-random number generator, they are secure against both quantum and classical computers.
In some embodiments, one or more strings, each consisting of one or more bits, of true random numbers are created (e.g., generated) by the apparatus 124 as presented in one or more images captured by one or more cameras of the apparatus. The benefit is that an attacker cannot reverse engineer the string because an algorithm and seed value were not used to create the string.
One or more cameras 146 capture one or more images of the one or more objects 144. In some embodiments, the cameras 146 are high-speed cameras that are configured to capture images during operation of the agitators 148. In some embodiments, the cameras 146 operate after a predetermined period of time (e.g., 1-2 seconds) after the agitators 148 stop stirring the fluid.
Based on the images captured by the cameras 146, the random number generation circuit 150 generates one or more random numbers (e.g., blocks of bits) and stores or provides the random numbers (e.g., using the entropy cache 114 in the database 110). In some embodiments, each generation step creates a large quantity of random numbers. For example, the generation step may create thousands of blocks of random bits, where the block size is based on typical usage (e.g., 64-bit blocks, 128-bit blocks, 256-bit blocks, 512-bit blocks, 1024-bit blocks, or a combination of these).
In some embodiments, each object 144 includes one or more physical features. The one or more images captured by one or more cameras 146 include a subset of physical features of the one or more physical features of the one or more objects, and generating the randomized key is further based on detecting the subset of physical features in the one or more images.
In some embodiments, the container 142 includes opposing first and second ends, (e.g., the ends 170-2 and 170-4), and the one or more agitators 148 include a first agitator 148-2 attached to the first end 170-2 and a second agitator 148-4 attached to the second end 170-4. In some embodiments, the first agitator stirs the fluid. Subsequently, the second agitator 148-4 joins the first agitator 148-2 and concurrently stirs the fluid in the container 142.
The major components of the EAAS system are an EAAS Server 708 (e.g., a server that provides RESTful and web based interfaces), a database 702 (e.g., a storage of entropy data from providers), and a management server 706 (e.g., a server that provides dashboard and overall control of the EAAS Server). Some embodiments include a back office server 704. In some embodiments, the database 702, the back office 704, and the EAAS server correspond to the database 110 and server system 130 described above in
The EAAS server 708 provides the web oriented interfaces to content publishers and consumers. A content publisher is an entity that publishes entropy for later consumption. A consumer is someone who requests entropy data of a certain length (e.g., 256-bit entropy). In some embodiments, these transactions use conventional GET and POST HTTP verbs over SSL/TLS. Some embodiments do not support non-encrypted access. In other words, clients must be authenticated in order to publish or consume entropy. In some embodiments, entropy is only supplied once to a consumer. That is, once the entropy has been taken out of the database for use, no further record of it is kept in the database 702 (the entropy is designated as single-use). There is no replay capability. Once entropy has been sent to a consumer, it no longer exists in the EAAS database 702.
Referring now back to
In some embodiments, the EAAS server 708 uses a relational database that provides one or more tables. In some embodiments, the one or more tables include an API table, which identifies applications, entropy (published entropy data), and/or sources (entropy sources). In some embodiments, the one or more tables include authentication and authorization information, which specifies groups (access control) and/or users (authorized users). In some embodiments, the one or more tables include a password management application (sometimes called Cryptex), which includes invalid passwords (e.g., a list of invalid passwords not to be allowed), and/or vaults (password vaults). In some embodiments, the one or more tables include OAUTH information, which identifies issued access tokens, registered applications, issued grants, and/or issued refresh tokens.
In some embodiments, the management server 706 provides a dashboard view of the EAAS server 708 and general user account management. In some embodiments, the dashboard provides one or more views that specify the amount of stored entropy (e.g., the inventory of available entropy), the number of publish transactions per second, the number of entropy requests per second, the number of active concurrent users, the average size of entropy requests, trend graphs, alerts (e.g., low inventory of entropy, low disk space, uptime, login failures, user management, account creation, account suspension, and/or account removal), the activity log, and/or continuous health check or test (e.g., similar to a NIST health check). In some embodiments, a separate dashboard (e.g., a user dashboard) is provided to end users to manage their accounts. See
In some embodiments, the back office server 704 handles gathering statistics and billing for clients, based on pricing models and techniques. In some embodiments, the tasks include overage assessment, invoicing, and/or credit card processing.
A publisher is a provider of entropy to the EAAS server 708. In some embodiments, there is no limit to the number of publishers. Each publisher provides entropy using the EAAS Rest API 806. In some embodiments, this API requires that each publisher is known to the EAAS server 708 and that each publisher has a client id and client secret, and authenticates using OAUTH2. In some embodiments, it is up to the publisher to protect the client id and client secret. In some embodiments, all publishing is done over SSL/TLS. In some embodiments, the minimum information required for each transaction includes the size or the number of bits of entropy being published, and the entropy data (e.g., 8 bit bytes, encoded in base64). In some embodiments, this information is serialized using JSON and published using a HTTP POST operation.
Some embodiments provide a stand-alone product for publishing entropy (sometimes called Zentropy Publisher). In some embodiments, the product is treated as a black box and the EAAS server 708 has no knowledge of its internal operations. In some embodiments, it is a known application (described above), and uses the REST API 806 to publish entropy.
An entropy consumer is an application that may request entropy from the EAAS server 708. In some embodiments, in order for a consumer to retrieve entropy, the consumer must first authenticate itself to the EAAS server 708, to establish a session. Then, using the session, the consumer may request entropy of various lengths. In some embodiments, entropy data is returned as JSON encoded data with the following fields: a timestamp, a size (e.g., the number of bits of data), the data (e.g., base64 encoded entropy data), and/or an optional signature (e.g., a digital signature for entropy).
Some embodiments provide a secure password manager 900 (sometimes called Cryptex) as an application to handle password storage (e.g., on a per-user basis). Some embodiments create passwords using entropy from the EAAS server 708. In some embodiments, the password manager is a client side application utilizing a set of web based requests to perform user management, random password creation, and/or storage of passwords for different applications.
The Cryptex system is secure: Cryptex 2FA uses a QR code to pair a mobile device with web applications, ensuring that only a single, air-gapped connection ever occurs between the application and the mobile device. Any data that Cryptex 2FA stores on the mobile device is encrypted prior to storage to safeguard the data.
The Cryptex system is also easy to use. Setting up Cryptex 2FA on an account is straightforward and only takes a few seconds. When a user wants to log into an account that is protected by Cryptex 2FA, the user just opens up the Cryptex 2FA application on the mobile device, selects the desired account for authentication, and types the six digit code that is displayed in the Cryptex 2FA application when prompted.
Some embodiments provide a facility (e.g., an EAAS bucket) to request large amounts of entropy in a single transaction, and to store the results in a file on a local file system.
EAAS OpenSSL provides entropy to OpenSSL via a loadable OpenSSL extension that communicates with the EAAS Server to request entropy using high level commands contained in OpenSSL. An example architecture of EAAS OpenSSL 1100 is shown in
In some embodiments, the EAAS OpenSSL 1100 architecture includes a command line interface 1102, which accepts user commands. In some embodiments, the architecture 1100 also includes a cryptosystem interface 1104, such as an envelope (EVP) interface, which supports the ability to perform authenticated encryption and decryption and/or the option to attach unencrypted, associated data to a message. In some embodiments, the cryptosystem interface 1104 provides functions used to perform various cryptographic operations. In some embodiments, the architecture 1100 includes an SSL interface 1106, a default crypto implementation 1108, an engine interface 1110, a BIO interface 1112 (e.g., interfaces that support biometric encryption/decryption), and utilities 1114 (e.g., data structures and error reporting). Some embodiments include external hardware accelerators 1116 and/or an external communication API 1118 (e.g., interfaces or hooks).
In some embodiments, the example architecture shown in
Note that the movement of the dice (and/or other objects) in the liquid cannot be modeled by particle simulation or predicted. In particular, the random weight and mixture of viscous fluid, the randomization of the agitators, and the multiple color values used ensure that it is impossible to replicate by particle simulation.
The apparatus 124 also includes one or more cameras 146 configured to capture one or more images of the one or more objects 144. The cameras are mounted on the outside of the container with clear visibility into the container. In some embodiments, the cameras are mounted on the top, on the bottom, and/or on the sides of the container.
The apparatus also includes a random number generation circuit 150 coupled to the one or more cameras 146. The circuit 150 can be directly attached to the apparatus or remotely situated (either close to the apparatus, such as a couple of feet, or distant from the apparatus, such as a different node on a network). In some embodiments, the circuit 150 comprises a Raspberry Pi device, an SSD device, and the one or more cameras. In some embodiments, the process (i) captures the images, (ii) hashes the images to extract image noise, (iii) converts the hashed images to binary, (iv) tests the binary data using the Diehard suite, then (v) publishes the binary data to the EAAS server. The random number generation circuit 150 is configured to generate random numbers based on the one or more images captured by the one or more cameras 146. When the one or more agitators 148-6 agitate the fluid, the one or more objects 144 move freely in the fluid in the container 142.
In some embodiments, each object 144 includes one or more physical features. The one or more images captured by the one or more cameras 146 include a subset of physical features of the one or more physical features of the one or more objects 144. The random number generation circuit 150 is further configured to generate the random numbers based on detecting the subset of physical features in the one or more images. In some embodiments, the one or more objects 144 include dice. The one or more physical features include dots on faces of each die. In some embodiments, the features include color, shade, and/or number of faces/sides of each die. In some embodiments, the subset of physical features includes one or more dots on each die, and the random number generation circuit 150 is further configured to generate the random numbers based on number of dots detected in the one or more images.
In some embodiments, the apparatus 124 includes a housing configured to fit in a server rack. For example, the housing is sized and/or shaped (e.g., cut) to fit into any server rack environment, such as a 4U/rack assembly. The container 142 is disposed in the housing. In some embodiments, the housing includes an opposing first end 170-2 and a second end 170-4. An agitator 148-6 is attached to one end (e.g., the second end 170-4 of the housing). In some embodiments, the housing includes a top portion 172-2 and a bottom portion 172-4. In some embodiments, the one or more cameras 146 are attached to the top portion 172-2 of the housing, and the one or more cameras 146 are oriented toward the interior of the container 142.
In some embodiments, the apparatus 124 includes one or more lighting units 174 (e.g., a string of LED lights, or an LED light bar) configured to illuminate the container 142 when the one or more cameras 146 capture the one or more images of the one or more objects 144, and/or before/after the operation of the agitators 148-6.
In some embodiments, the random number generation circuit 150 is further configured to receive a request (e.g., from a device controller 134) to generate randomized keys. In response to receiving the request, the random number generation circuit 150 controls the one or more agitators 148-6 to stir the fluid, controls the one or more cameras 146 to capture the one or more images, generates the randomized keys based on the one or more images captured by the one or more cameras 146, stores the generated random numbers in the entropy cache 114, and/or provides the generated random numbers to external requestors (e.g., via an API call).
In some embodiments, the one or more objects 144 have a density similar to the fluid so that (i) the one or more objects 144 suspend freely in the fluid (e.g., move around rather than float/sink) and (ii) when the one or more agitators 148-6 stir the fluid, the one or more objects 144 move freely within the fluid.
In some embodiments, the one or more cameras 146 are disposed outside the container 142, and the container 142 is made of a substantially transparent or see-through material through which the one or more objects 144 are observable.
In the embodiment of
In some embodiments, the openings 1708-1 and 1708-2 are smaller than the objects 144 in the container so that they are not pulled into the hose by the pump 1702. In some embodiments, the openings 1708-1 and/or 1708-2 are covered by a mesh or screen (not shown). In some embodiments, the openings have metal threads to engage the hoses 1706-1 and 1706-2.
Some embodiments include two or more hydraulic pumps and/or use splitters on the hoses 1706-1 and 1708-2 so that the pumping action can be applied at more than one location on the container (e.g., pumping action at both ends 170-2 and 170-4). Some embodiments include two or more different types of agitators, such as a hydraulic pump as shown in
Some embodiments include a power supply 1804, as shown in
Thus, in various embodiments, systems and methods are described for generating truly random numbers and/or cryptographic keys. Some embodiments provide access to the keys via one or more secure architectures.
Although some of various drawings illustrate a number of logical stages in a particular order, stages that are not order dependent may be reordered and other stages may be combined or broken out. While some reordering or other groupings are specifically mentioned, others will be obvious to those of ordinary skill in the art, so the ordering and groupings presented herein are not an exhaustive list of alternatives. Moreover, it should be recognized that the stages could be implemented in hardware, firmware, software, or any combination thereof.
The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the scope to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the main principles and practical applications, to thereby enable others skilled in the art to best utilize the various embodiments and make various modifications as are suited to the particular use contemplated.
This application is a continuation-in-part of U.S. patent application Ser. No. 17/402,443, filed Aug. 13, 2021, entitled “Electromechanical Apparatus, System, and Method for Generating True Random Numbers,” which is a continuation-in-part of U.S. patent application Ser. No. 16/823,286, filed Mar. 18, 2020, entitled “Electromechanical Apparatus, System, and Method for Generating True Random Numbers,” each of which is incorporated by reference herein in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | 17402443 | Aug 2021 | US |
Child | 17863336 | US | |
Parent | 16823286 | Mar 2020 | US |
Child | 17402443 | US |