Algorithms and Sources of entropy for PRNG and TRNG?

Click For Summary

Discussion Overview

The discussion revolves around the implementation of random number generators (RNGs) using AVR microcontrollers, focusing on both pseudo-random number generators (PRNGs) and true random number generators (TRNGs). Participants seek suggestions for sources of entropy for TRNGs, algorithms for PRNGs, and methods to test randomness. The applicability of chaos theory to random number generation is also questioned.

Discussion Character

  • Exploratory
  • Technical explanation
  • Debate/contested
  • Mathematical reasoning

Main Points Raised

  • Some participants define PRNG as pseudo-random number generator and TRNG as true random number generator, discussing their differences.
  • There are suggestions to use hardware generators that sample noise from physical sources, such as a noisy diode or resistor, to create TRNGs.
  • One participant mentions using the power-up state of SRAM memory as a source of hardware randomness for PRNGs.
  • Concerns are raised about the quality of physical random generators, noting biases that may render them unsuitable for cryptographic applications without further processing.
  • Some argue that while hardware RNGs can be perfectly random, they may be too slow for practical use, and thus PRNGs are preferred for speed.
  • A later reply discusses the potential of hashing physical signals to improve randomness quality for cryptographic purposes.
  • Participants share links to external resources and examples of RNG implementations, including a specific RNG that passes the dieharder suite.
  • There is mention of using ring oscillators for physical unclonable functions (PUFs) in cryptographic key generation.

Areas of Agreement / Disagreement

Participants express differing views on the effectiveness and reliability of TRNGs versus PRNGs, particularly in the context of cryptography. There is no consensus on the best approach or the quality of physical random generators, indicating ongoing debate and exploration of the topic.

Contextual Notes

Participants highlight limitations in the randomness of physical sources, such as biases and speed issues, and the need for additional processing to ensure adequate randomness for cryptographic applications. The discussion remains open-ended regarding the best practices for implementing RNGs.

dexterdev
Messages
194
Reaction score
1
Hi PF,
I would like to implement different random number generators using AVR microcontroller (both PRNG and TRNG). So I would like to get suggestions about different sources of entropy for TRNG and algorithms for PRNG. Also wanted to test the randomness.

And What is chaos theory? Is it applicable for random number generation? Can I implement a chaos circuit for random number generator?

TIA

-Devanand T
 
Engineering news on Phys.org
need to define some acronyms. i know a bit about generating random numbers but don't know what the "P" or the "T" is.
 
ok here goes... PRNG - pseudo random number generator. (algorithms)
TRNG - true random number generator. (hardware generator)
 
dexterdev said:
ok here goes... PRNG - pseudo random number generator. (algorithms)
TRNG - true random number generator. (hardware generator)

so would a hardware generator using the same algorithm as a PRNG be a true RNG? if so, i fail to see any salient difference.

or is a TRNG an A/D converter that samples the noise from a noisy diode or resistor or some other noisy analog part? that might be fully unpredictable, in contrast to an algorithm.
 
justsomeguy said:
You can build something with known jitter/instability and read from that. Example: http://electronics.stackexchange.com/questions/18379/entropy-source-on-microchip-pic24f

okay, so i looked at that, and it's essentially a noisy analog circuit that is sampled with a 1-bit A/D converter (that's what the comparator is).

okay, if you use that, and if the biasing scheme works as planned, then you should have some random bits coming out of that. there isn't a clock in the circuit, so i do not know how fast the bits might be toggling back and forth.

i can't say that they bits would be good and white because of that capacitor makes for a high-pass filter (a differentiator). so, if i understand it right, whatever is the value of the previous bit, the current bit will more likely be the complement than the same value. that's what high-pass noise is. if it were white, then the likelihood of the current bit being "1" is 50% no matter what the value of the previous bit was.
 
rbj said:
so would a hardware generator using the same algorithm as a PRNG be a true RNG? if so, i fail to see any salient difference.

Hardware RNGs use true sources of randomness, like the LSB of a microphone input, phase jitter between out of sync clocks, background radiation, etc.

PRNGs are simply algorithms that eventually repeat. If you know the seed value, then you know all the random numbers it will generate when called, and in what order.

The difference between a good and bad PRNG is life and death to encryption, since the most secure encryption (a one time pad) depends entirely on the randomness of the keystream.
 
Physical random generators tend to be very bad. They have bias like 1% or 0.1% which makes them totally unusable as is in cryptography, which wants 10-9 to the very least.

So the next step is to hash by software the physical signal, and then you can begin to wonder if the physical source is really that useful.

Practical crypto programs use physical randomness only as seed for software random generators. Good choice.
 
Enthalpy said:
Physical random generators tend to be very bad. They have bias like 1% or 0.1% which makes them totally unusable as is in cryptography, which wants 10-9 to the very least.

So the next step is to hash by software the physical signal, and then you can begin to wonder if the physical source is really that useful.

Practical crypto programs use physical randomness only as seed for software random generators. Good choice.

This is not quite correct. The main failing of hardware RNGs is not bias or anything to do with their randomness -- they are, when used correctly, perfectly random. The problem is they are generally just too slow. You need to wait for entropy to build up or you get a stream of identical or predictably oscillating values. PRNGs can go as fast as you want.

However, dedicated hardware RNGs are both fast and random. Their downside is simply that they are expensive (unless you DIY).
 
  • #10
guy, i think that Enthalpy is completely correct.
 
  • #11
dexterdev said:
Hi PF,
I would like to implement different random number generators using AVR microcontroller (both PRNG and TRNG). So I would like to get suggestions about different sources of entropy for TRNG and algorithms for PRNG. Also wanted to test the randomness.

A possible source of hardware randomness (a random seed for a good PRNG) in a microcontroller is the powerup bit state of the SRAM memory. What I've done in the past was to examine a large section of memory bits to see what bits usually power up as random instead of a steady 1 or 0. I would then mask out the fixed bits using a hamming code fuzzy extractor and then use a CRC of the unstuck random bits to generated a seed for a PRNG.

This describes a similar process:
https://www2.lirmm.fr/lirmm/interne/BIBLI/CDROM/MIC/2012/DATE_2012/PAPERS/2012/DATE12/PDFFILES/11.4_1.pdf
http://users.wpi.edu/~martin/MQP/edwardsetal.pdf
 
Last edited by a moderator:
  • #12
This one could be quite cool: http://warmcat.com/_wp/whirlygig-rng/ It passes the dieharder suite so there is definitely no bias and it has high quality randomness, but it is not clear to me if it is truly impossible to find a statistical model to kill it.
 

Similar threads

  • · Replies 20 ·
Replies
20
Views
3K
Replies
5
Views
2K
  • · Replies 3 ·
Replies
3
Views
2K
  • · Replies 2 ·
Replies
2
Views
2K
  • · Replies 5 ·
Replies
5
Views
3K
Replies
2
Views
2K
  • · Replies 5 ·
Replies
5
Views
1K
  • · Replies 5 ·
Replies
5
Views
2K
  • · Replies 11 ·
Replies
11
Views
3K
Replies
1
Views
2K