Abstract:
Have you ever thought how devices produce random numbers? Majority of the random numbers used in our lives are generated from software-based generators which are deterministic in nature. These software-based generators are called Pseudo Random Number Generators (PRNGs). These are suitable for everyday use but when it comes to sensitive scenarios, like casino game machines or for cryptographic applications, then this method is not secure and is prone to receptiveness.
The security of any information security device relies heavily and primarily on the Random Number Generator (RNG). The majority of commercially available RNGs have backdoors implanted in them. There is a need to devise a True RNG, based on some unpredictable physical phenomenon, coupled with a P.C., allowing arbitrary users to employ RNG in their equipment/ systems, thereby eliminating the threats of RNG-based backdoors.
If we look at random numbers, they are used in our everyday life in various applications, however, true random number generators are slow and complex for many of the applications, but if we look at the pseudorandom number generators (PRNGs), they are secure enough for less sensitive day to day applications. Maximum number of random number generators are software based, however due to the rise of need of security, a high request is on the development of Hardware Random Number Generators (HRNGs), which are also known as True Random Number Generators (TRNGs).
HRNGs/TRNGs generate streams of random numbers which are unpredictable and non-repeatable. In recent times, the need for true random number generators has drastically increased and has become a striking research area. Therefore, researchers have started exploring this area in order to design and develop hardware random number generators to meet cryptographic requirements.