Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2020 Oct 6;22(10):1134.
doi: 10.3390/e22101134.

Deep Learning-Based Security Verification for a Random Number Generator Using White Chaos

Affiliations

Deep Learning-Based Security Verification for a Random Number Generator Using White Chaos

Cai Li et al. Entropy (Basel). .

Abstract

In this paper, a deep learning (DL)-based predictive analysis is proposed to analyze the security of a non-deterministic random number generator (NRNG) using white chaos. In particular, the temporal pattern attention (TPA)-based DL model is employed to learn and analyze the data from both stages of the NRNG: the output data of a chaotic external-cavity semiconductor laser (ECL) and the final output data of the NRNG. For the ECL stage, the results show that the model successfully detects inherent correlations caused by the time-delay signature. After optical heterodyning of two chaotic ECLs and minimal post-processing are introduced, the model detects no patterns among corresponding data. It demonstrates that the NRNG has the strong resistance against the predictive model. Prior to these works, the powerful predictive capability of the model is investigated and demonstrated by applying it to a random number generator (RNG) using linear congruential algorithm. Our research shows that the DL-based predictive model is expected to provide an efficient supplement for evaluating the security and quality of RNGs.

Keywords: deep learning; predictive model; random number generator; security analysis; semiconductor laser; white chaos.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Experimental scheme for evaluating the security of RNGs, which comprises data collection and preprocessing, model training and validation, and system evaluation.
Figure 2
Figure 2
The structure of a NRNG based on white chaos. DFB1,2: distributed feedback semiconductor laser; PC1,2: polarization controller; FC1,2, FC: fiber coupler; OI1,2: optical isolator; VA1,2: variable attenuator; M1,2: fiber mirror; BPD: balanced photo-detector; ADC: analog-to-digital converter; LSBs: least significant bits.
Figure 3
Figure 3
Data preprocessing in a conventional approach where 10 consecutive adjacent numbers within the random sequence are used as one input sequence, whereas the next number after the input sequence is used as the output (label). The new sequence and corresponding output are updated by shifting three positions in the dataset.
Figure 4
Figure 4
Deep learning model based on temporal pattern attention, which consists of a one-hot encoder, a LSTM layer, a temporal pattern attention (TPA) layer, and a fully connected (FC) layer.
Figure 5
Figure 5
Distribution of standardized numbers from RNGs with different stages. (ac) represent the probability distribution of the data from the output of LC-RNG with the period of 224, the output of the ECL1, and the output of the NRNG, respectively.
Figure 6
Figure 6
Prediction performance of the deep learning-based predictive model at different stages of LC-RNG and the white chaos-based NRNG.
Figure 7
Figure 7
Temporal properties of the chaos of the ECL1 as well as the white chaos-based NRNG. (a1,b1) respectively represent the RF spectra of the chaos of the ECL1 and the white chaos. (a2,b2) respectively represent the autocorrelation traces of the chaos of the ECL1 and the white chaos.

References

    1. Barker E., Kelsey J. Recommendation for Random Bit Generator (RBG) Constructions. National Institute of Standards and Technology; Gaithersburg, MD, USA: 2016.
    1. Hastings M., Fried J., Heninger N. Weak keys remain widespread in network devices; Proceedings of the 2016 Internet Measurement Conference; Santa Monica, CA, USA. 14–16 November 2016; pp. 49–63.
    1. Strenzke F. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer; Berlin/Heidelberg, Germany: 2016. An analysis of OpenSSL’s random number generator; pp. 644–669.
    1. Wang Z., Yu H., Zhang Z., Piao J., Liu J. ECDSA weak randomness in Bitcoin. Futur. Gener. Comp. Syst. 2020;102:507–513. doi: 10.1016/j.future.2019.08.034. - DOI
    1. Lambić D. Security analysis and improvement of the pseudo-random number generator based on piecewise logistic map. J. Electron. Test. 2019;35:519–527. doi: 10.1007/s10836-019-05818-8. - DOI

LinkOut - more resources