Advertisement

Human Assisted Randomness Generation Using Video Games

  • Mohsen AlimomeniEmail author
  • Reihaneh Safavi-Naini
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7807)

Abstract

Random number generators have direct applications in information security, online gaming, gambling, and computer science in general. True random number generators need an entropy source which is a physical source with inherent uncertainty, to ensure unpredictability of the output. In this paper we propose a new indirect approach to collecting entropy using human errors in the game play of a user against a computer. We argue that these errors are due to a large set of factors and provide a good source of randomness. To show the viability of this proposal, we design and implement a game, conduct a user study in which we collect user input in the game, and extract randomness from it. We measure the rate and the quality of the resulting randomness that clearly show effectiveness of the approach. Our work opens a new direction for construction of entropy sources that can be incorporated into a large class of video games.

Keywords

Video Game Entropy Generation Game Play Game Design Floating Point Number 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [Ali13]
    Alimomeni, M.: Archery game 2013. http://pages.cpsc.ucalgary.ca/~malimome/game/
  2. [ASN14]
    Alimomeni, M., Safavi-Naini, R.: Human assisted randomness generation using video games. Cryptology ePrint Archive, Report 2014/045 (2014). http://eprint.iacr.org/
  3. [ASNS14]
    Alimomeni, M., Safavi-Naini, R., Sharifian, S.: A true random generator using human gameplay. In: GameSec, pp. 10–28 (2014)Google Scholar
  4. [BK12]
    Barker, E., Kelsey, J.: Recommendation for the entropy sources used for random bit generation, August 2012. http://csrc.nist.gov/publications/drafts/800-90/draft-sp800-90b.pdf
  5. [BST03]
    Barak, B., Shaltiel, R., Tromer, E.: True random number generators secure in a changing environment. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 166–180. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. [C71]
    Walker, E.C.: DISPLAY DEVICE. Woodspeen, Forest Corner, Ringwood, Hampshire, England Filed Nov. 13, 1968, Ser. No. 775, 401 Claims priority, application Gr/e6a7t Britain, Nov. 14, 1967, 1 Int. Cl. G09f 13/24Google Scholar
  7. [ea10]
    Rukhin, A., et al.: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications (2010). http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf
  8. [GPR06]
    Gutterman, Z., Pinkas, B., Reinman, T.: Analysis of the linux random number generator. In: 2006 IEEE Symposium on Security and Privacy, p. 15. IEEE (2006)Google Scholar
  9. [GW96]
    Goldberg, I., Wagner, D.: Randomness and the netscape browser. Dr Dobb’s J.-Softw. Tools Prof. Program. 21(1), 66–71 (1996)Google Scholar
  10. [HDWH12]
    Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.A.: Mining your PS and QS: detection of widespread weak keys in network devices. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, Berkeley, CA, USA, pp. 35–35. USENIX Association (2012)Google Scholar
  11. [HN09]
    Halprin, R., Naor, M. Games for extracting randomness. In: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 12. ACM (2009)Google Scholar
  12. [Hot10]
    Hotz Console hacking 2010-ps3 epic fail. In: 27th Chaos Communications Congress (2010)Google Scholar
  13. [LHA+12]
    Lenstra, A.K., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Public keys. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 626–642. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  14. [LS07a]
    L’Ecuyer, P., Simard, R.: Testu01, August 2007. http://www.iro.umontreal.ca/~simardr/testu01/tu01.html
  15. [LS07b]
    L’Ecuyer, P., Simard, R.: Testu01: a C library for empirical testing of random number generators. ACM Trans. Math. Softw. 33(4) (2007)Google Scholar
  16. [Mar98]
    Marsaglia, G.: Diehard (1998). http://www.stat.fsu.edu/pub/diehard/
  17. [NZ96]
    Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43–52 (1996)zbMATHMathSciNetCrossRefGoogle Scholar
  18. [RB92]
    Rapoport, A., Budescu, D.V.: Generation of random series in two-person strictly competitive games. J. Exp. Psychol. Gen. 121(3), 352 (1992)CrossRefGoogle Scholar
  19. [Wag72]
    Wagenaar, W.A.: Generation of random sequences by human subjects: a critical survey of literature. Psychol. Bull. 77(1), 65 (1972)CrossRefGoogle Scholar
  20. [ZLwW+09]
    Zhou, Q., Liao, X., Wong, K.W., Hu, Y., Xiao, D.: True random number generator based on mouse movement and chaotic hash function. Inf. Sci. 179(19), 3442–3450 (2009)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of CalgaryCalgaryCanada

Personalised recommendations