Skip to main content

Human Assisted Randomness Generation Using Video Games

  • Conference paper
  • First Online:
Information Security

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7807))

  • 872 Accesses

Abstract

Random number generators have direct applications in information security, online gaming, gambling, and computer science in general. True random number generators need an entropy source which is a physical source with inherent uncertainty, to ensure unpredictability of the output. In this paper we propose a new indirect approach to collecting entropy using human errors in the game play of a user against a computer. We argue that these errors are due to a large set of factors and provide a good source of randomness. To show the viability of this proposal, we design and implement a game, conduct a user study in which we collect user input in the game, and extract randomness from it. We measure the rate and the quality of the resulting randomness that clearly show effectiveness of the approach. Our work opens a new direction for construction of entropy sources that can be incorporated into a large class of video games.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alimomeni, M.: Archery game 2013. http://pages.cpsc.ucalgary.ca/~malimome/game/

  2. Alimomeni, M., Safavi-Naini, R.: Human assisted randomness generation using video games. Cryptology ePrint Archive, Report 2014/045 (2014). http://eprint.iacr.org/

  3. Alimomeni, M., Safavi-Naini, R., Sharifian, S.: A true random generator using human gameplay. In: GameSec, pp. 10–28 (2014)

    Google Scholar 

  4. Barker, E., Kelsey, J.: Recommendation for the entropy sources used for random bit generation, August 2012. http://csrc.nist.gov/publications/drafts/800-90/draft-sp800-90b.pdf

  5. Barak, B., Shaltiel, R., Tromer, E.: True random number generators secure in a changing environment. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 166–180. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Walker, E.C.: DISPLAY DEVICE. Woodspeen, Forest Corner, Ringwood, Hampshire, England Filed Nov. 13, 1968, Ser. No. 775, 401 Claims priority, application Gr/e6a7t Britain, Nov. 14, 1967, 1 Int. Cl. G09f 13/24

    Google Scholar 

  7. Rukhin, A., et al.: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications (2010). http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf

  8. Gutterman, Z., Pinkas, B., Reinman, T.: Analysis of the linux random number generator. In: 2006 IEEE Symposium on Security and Privacy, p. 15. IEEE (2006)

    Google Scholar 

  9. Goldberg, I., Wagner, D.: Randomness and the netscape browser. Dr Dobb’s J.-Softw. Tools Prof. Program. 21(1), 66–71 (1996)

    Google Scholar 

  10. Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.A.: Mining your PS and QS: detection of widespread weak keys in network devices. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, Berkeley, CA, USA, pp. 35–35. USENIX Association (2012)

    Google Scholar 

  11. Halprin, R., Naor, M. Games for extracting randomness. In: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 12. ACM (2009)

    Google Scholar 

  12. Hotz Console hacking 2010-ps3 epic fail. In: 27th Chaos Communications Congress (2010)

    Google Scholar 

  13. Lenstra, A.K., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Public keys. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 626–642. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  14. L’Ecuyer, P., Simard, R.: Testu01, August 2007. http://www.iro.umontreal.ca/~simardr/testu01/tu01.html

  15. L’Ecuyer, P., Simard, R.: Testu01: a C library for empirical testing of random number generators. ACM Trans. Math. Softw. 33(4) (2007)

    Google Scholar 

  16. Marsaglia, G.: Diehard (1998). http://www.stat.fsu.edu/pub/diehard/

  17. Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43–52 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  18. Rapoport, A., Budescu, D.V.: Generation of random series in two-person strictly competitive games. J. Exp. Psychol. Gen. 121(3), 352 (1992)

    Article  Google Scholar 

  19. Wagenaar, W.A.: Generation of random sequences by human subjects: a critical survey of literature. Psychol. Bull. 77(1), 65 (1972)

    Article  Google Scholar 

  20. Zhou, Q., Liao, X., Wong, K.W., Hu, Y., Xiao, D.: True random number generator based on mouse movement and chaotic hash function. Inf. Sci. 179(19), 3442–3450 (2009)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohsen Alimomeni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Alimomeni, M., Safavi-Naini, R. (2015). Human Assisted Randomness Generation Using Video Games. In: Desmedt, Y. (eds) Information Security. Lecture Notes in Computer Science(), vol 7807. Springer, Cham. https://doi.org/10.1007/978-3-319-27659-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27659-5_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27658-8

  • Online ISBN: 978-3-319-27659-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics