Skip to main content

A True Random Generator Using Human Gameplay

  • Conference paper
Decision and Game Theory for Security (GameSec 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8252))

Included in the following conference series:

Abstract

True Randomness Generators (TRG) use the output of an entropy source to generate a sequence of symbols that is sufficiently close to a uniformly random sequence, and so can be securely used in applications that require unpredictability of each symbol. A TRG algorithm generally consists of (i) an entropy source and (ii) an extractor algorithm that uses a random seed to extract the randomness of the entropy source. We propose a TRG that uses the user input in a game played between the user and the computer both as the output of an entropy source, and the random seed required for the extractor. An important property of this TRG is that the (randomness) quality of its output can be flexibly adjusted. We describe the theoretical foundation of the approach and design and implement a game that instantiates the approach. We give the results of our experiments with users playing the game, and analysis of the resulting output strings. Our results support effectiveness of the approach in generating high quality randomness. We discuss our results and propose directions for future work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arora, S., Barak, B.: Computational complexity: a modern approach, vol. 1. Cambridge University Press, Cambridge (2009)

    Book  Google Scholar 

  2. Alimomeni, M.: Sheep-wolf game to generate true random numbers by human (2013), http://pages.cpsc.ucalgary.ca/~malimome/expander/

  3. Barker, E., Kelsey, J.: Recommendation for the entropy sources used for random bit generation (August 2012), http://csrc.nist.gov/publications/drafts/800-90/draft-sp800-90b.pdf

  4. Barak, B., Shaltiel, R., Tromer, E.: True random number generators secure in a changing environment. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 166–180. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Dorrendorf, L., Gutterman, Z., Pinkas, B.: Cryptanalysis of the random number generator of the windows operating system. ACM Trans. Inf. Syst. Secur. 13(1), 10:1–10:32 (2009)

    Google Scholar 

  6. Rukhin, et al.: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications (2010), http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf .

  7. Goldberg, I., David, W.: Randomness and the netscape browser, http://www.cs.berkeley.edu/~daw/papers/ddj-netscape.html

  8. Gutterman, Z., Pinkas, B., Reinman, T.: Analysis of the linux random number generator. In: 2006 IEEE Symposium on Security and Privacy, p. 15. IEEE (2006)

    Google Scholar 

  9. Heninger, N., Durumeric, Z., Wustrow, E., Alex Halderman, J.: Mining your ps and qs: detection of widespread weak keys in network devices. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, p. 35. USENIX Association, Berkeley (2012)

    Google Scholar 

  10. Hoory, S., Linial, N., Wigderson, A.: Expander graphs and their application. Bulletin of the AMS 43(4), 439–561 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  11. Halprin, R., Naor, M.: Games for extracting randomness. In: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 12. ACM (2009)

    Google Scholar 

  12. Lenstra, A.K., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Public keys. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 626–642. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  13. Lubotzky, A., Phillips, R., Sarnak, P.: Explicit expanders and the ramanujan conjectures. In: Proceedings of the Eighteenth Annual ACM Symposium on Theory of Computing, pp. 240–246. ACM (1986)

    Google Scholar 

  14. L’Ecuyerand, P., Simard, R.: Testu01 (August 2007), http://www.iro.umontreal.ca/~simardr/testu01/tu01.html

  15. L’Ecuyer, P., Simard, R.: Testu01: A c library for empirical testing of random number generators. ACM Trans. Math. Softw. 33(4) (August 2007)

    Google Scholar 

  16. Marsaglia, G.: Diehard (1998), http://www.stat.fsu.edu/pub/diehard/

  17. Microsoft. Windows random number generator, http://msdn.microsoft.com/en-us/library/aa379942.aspx

  18. Osborne, M.J.: An introduction to game theory, vol. 3. Oxford University Press, Oxford (2004)

    Google Scholar 

  19. Rapoport, A., Budescu, D.V.: Generation of random series in two-person strictly competitive games. Journal of Experimental Psychology: General 121(3), 352 (1992)

    Article  Google Scholar 

  20. Reingold, O., Vadhan, S., Wigderson, A.: Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors. In: Proceedings of 41st Annual Symposium on Foundations of Computer Science, pp. 3–13 (2000)

    Google Scholar 

  21. Shaltiel, R.: An introduction to randomness extractors. Automata, Languages and Programming, 21–41 (2011)

    Google Scholar 

  22. von Neumann, J.: Various techniques used in connection with random digits. J. Research Nat. Bur. Stand., Appl. Math. Series 12, 36–38 (1951)

    Google Scholar 

  23. Wagenaar, W.A.: Generation of random sequences by human subjects: A critical survey of literature. Psychological Bulletin 77(1), 65 (1972)

    Article  Google Scholar 

  24. Zhou, Q., Liao, X., wo Wong, K., Hu, Y., Xiao, D.: True random number generator based on mouse movement and chaotic hash function. Information Sciences 179(19), 3442–3450 (2009)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Alimomeni, M., Safavi-Naini, R., Sharifian, S. (2013). A True Random Generator Using Human Gameplay. In: Das, S.K., Nita-Rotaru, C., Kantarcioglu, M. (eds) Decision and Game Theory for Security. GameSec 2013. Lecture Notes in Computer Science, vol 8252. Springer, Cham. https://doi.org/10.1007/978-3-319-02786-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-02786-9_2

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-02785-2

  • Online ISBN: 978-3-319-02786-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics