US20190310830A1 - Apparatus, systems, and methods comprising tritium random number generator - Google Patents

Apparatus, systems, and methods comprising tritium random number generator Download PDF

Info

Publication number
US20190310830A1
US20190310830A1 US16/273,365 US201916273365A US2019310830A1 US 20190310830 A1 US20190310830 A1 US 20190310830A1 US 201916273365 A US201916273365 A US 201916273365A US 2019310830 A1 US2019310830 A1 US 2019310830A1
Authority
US
United States
Prior art keywords
tritium
trng
true random
decay
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/273,365
Other versions
US10430161B1 (en
Inventor
Jan J. Tatarkiewicz
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Randaemon Sp Zoo
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US16/273,365 priority Critical patent/US10430161B1/en
Priority to EP19847508.9A priority patent/EP3776179B1/en
Priority to PCT/US2019/017748 priority patent/WO2020033002A1/en
Application granted granted Critical
Publication of US10430161B1 publication Critical patent/US10430161B1/en
Publication of US20190310830A1 publication Critical patent/US20190310830A1/en
Assigned to RANDAEMON SP. Z O.O. reassignment RANDAEMON SP. Z O.O. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TATARKIEWICZ, JAN JAKUB
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01TMEASUREMENT OF NUCLEAR OR X-RADIATION
    • G01T1/00Measuring X-radiation, gamma radiation, corpuscular radiation, or cosmic radiation
    • G01T1/16Measuring radiation intensity
    • G01T1/17Circuit arrangements not adapted to a particular type of detector
    • G01T1/178Circuit arrangements not adapted to a particular type of detector for measuring specific activity in the presence of other radioactive substances, e.g. natural, in the air or in liquids such as rain water

Landscapes

  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Analysis (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • General Engineering & Computer Science (AREA)
  • Computational Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • High Energy & Nuclear Physics (AREA)
  • Molecular Biology (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Measurement Of Radiation (AREA)

Abstract

Disclosed herein is a true random number generator (TRNG). The TRNG includes a cavity filled with tritium and an electronic sensor constructed to detect energy from the decay of the tritium. The sensor produces a signal for the detected energy, and an amplifier amplifies the signal while a filter filters the signal. A processor (a) determines whether the signal represents decay events for tritium; (b) sets a timer to determine the time period between decay events; (c) based on the time period in step (b), assigns a value of a 0 or a 1; (d) stores the value in a memory; (e) repeats steps (b)-(d), resulting in a string of values; and (f) generates a true random number based on the string of values. This TRNG may be formed on an integrated circuit.

Description

    PRIORITY APPLICATIONS
  • This application claims priority as the non-provisional of U.S. Provisional Application Ser. 62/655,172 filed on Apr. 9, 2018 titled “Apparatus, Systems, and Methods Comprising Tritium Random Number Generator”, and also claims priority as the non-provisional of U.S. Provisional Application Ser. 62/803,476 filed on Feb. 9, 2019 titled “Apparatus, Systems, and Methods Comprising Tritium Random Number Generator”, and the contents of both of these applications are incorporated herein as if fully set forth herein.
  • TECHNICAL FIELD
  • The present disclosure relates generally to true random number generators, specifically random number generator technologies utilizing the spontaneous tritium decay, as well as apparatus, systems, and methods regarding the same.
  • BACKGROUND
  • As opposed to pseudo-random number generators based on algorithms, there are true random number generator (TRNG) devices that depend on natural random processes: multiple bipolar switches, thermal noise, light scattering by dichroic mirrors, chaotic systems, or decay of radioactive nuclei. Some of these TRNG are listed in the provisional applications to which the present application claims priority, and those references are incorporated herein by reference as if fully set forth herein.
  • The decay of radioactive nuclei types is considered to be the most independent of environmental influences like temperature, pressure or acceleration. However, typical nuclear-based TRNGs require large-sized detectors to enable registration of particles emitted as a result of radioactive decay. Also, many nuclei used in such devices are highly radioactive and poisonous, hence dangerous to humans if the device is broken.
  • Therefore, a safe and small TRNG that will not expose the user to dangerous levels of radiation would be advantageous. Such a TRNG can then be used in compact personal devices.
  • SUMMARY
  • The invention disclosed herein is a true random number generator (TRNG). The TRNG includes a cavity filled with tritium and an electronic sensor constructed to detect energy from the decay of the tritium. The sensor produces a signal for the detected energy, and an amplifier amplifies the signal while a filter filters the signal. A processor (a) determines whether the signal represents decay events for tritium; (b) sets a timer to determine the time period between decay events; (c) based on the time period in step (b), assigns a value of a 0 or a 1; (d) stores the value in a memory; (e) repeat steps (b)-(d) resulting in a string of values; and (f) generates a true random number based on the string of values. The TRNG may be formed on an integrated circuit.
  • In step (b), the processor may further determine a first time period T1 between a first pair of decay events and a second time period T2 between a second pair of decay events. It may in step (c) compare T1 to T2 and assign the value based on the comparison. The first pair of decay events and the second pair of decay events may share a common decay event.
  • The processor may generate an array of true random numbers. The processor may provide one of an array of true random numbers to a cryptographic client and then delete the delivered true random number from the memory. The one of an array of true random number provided to the cryptographic client may be the oldest one in the array. When the memory is full, the processor may delete the oldest one in the array of true random numbers. The true random numbers generated may be comprised of 256 bits or 512 bits.
  • The volume of tritium may be less than 0.03 μL, and the maximum radioactivity of the tritium may be less than 3×10−5 Ci. The amount of tritium may be sufficient to create at least one million decay events per second.
  • The amplifier may be a low noise charge-sensitive preamplifier or a pulse shaping amplifier. The timer may have a have a clock frequency of at least 1 GHz.
  • A personal electronic device may be constructed from the TRNG. This device may use the true random numbers to encrypt a communication channel, to render computer simulations, or to render computer gaming.
  • A method to generate to a true random number using tritium is also disclosed. The method includes: (a) providing a volume of tritium; (b) detecting an energy signal from the decay of the tritium; (c) determining whether the energy signal represents decay events for tritium; (d) setting a timer to determine the time period between decay events; (e) assigning a value of a 0 or a 1 based on the time period; (f) storing the value; (g) repeating steps (b)-(f), resulting in a string of values; and (h) generating an array of true random numbers based on the string of values.
  • Additional aspects, alternatives and variations as would be apparent to persons of skill in the art are also disclosed herein and are specifically contemplated as included as part of the invention. The invention is set forth only in the claims as allowed by the patent office in this or related applications, and the following summary descriptions of certain examples are not in any way to limit, define or otherwise establish the scope of legal protection.
  • BRIEF DESCRIPTION OF DRAWINGS
  • The invention can be better understood with reference to the following figures. The components within the figures are not necessarily to scale, emphasis instead being placed on clearly illustrating example aspects of the invention. In the figures, like reference numerals designate corresponding parts throughout the different views and/or embodiments. Furthermore, various features of different disclosed embodiments can be combined to form additional embodiments, which are part of this disclosure. It will be understood that certain components and details may not appear in the figures to assist in more clearly describing the invention.
  • FIG. 1A is a cross-sectional view of a PIN diode detector.
  • FIG. 1B is a cross-sectional view of a CCD detector.
  • FIG. 2 is a flow diagram of the various components that may be placed on the integrated circuit.
  • FIG. 3A illustrates the four pulse per random bit schema.
  • FIG. 3B illustrates the two pulse per random bit schema.
  • DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS
  • Reference is made herein to some specific examples of the present invention, including any best modes contemplated by the inventor for carrying out the invention. Examples of these specific embodiments are illustrated in the accompanying figures. While the invention is described in conjunction with these specific embodiments, it will be understood that it is not intended to limit the invention to the described or illustrated embodiments. To the contrary, it is intended to cover alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims.
  • In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. Particular example embodiments of the present invention may be implemented without some or all of these specific details. In other instances, process operations well known to persons of skill in the art have not been described in detail in order not to obscure unnecessarily the present invention. Various techniques and mechanisms of the present invention will sometimes be described in singular form for clarity. However, it should be noted that some embodiments include multiple iterations of a technique or multiple mechanisms, unless noted otherwise. Similarly, various steps of the methods shown and described herein are not necessarily performed in the order indicated, or performed at all in certain embodiments. Accordingly, some implementations of the methods discussed herein may include more or fewer steps than those shown or described. Further, the techniques and mechanisms of the present invention will sometimes describe a connection, relationship or communication between two or more entities. It should be noted that a connection or relationship between entities does not necessarily mean a direct, unimpeded connection, as a variety of other entities or processes may reside or occur between any two entities. Consequently, an indicated connection does not necessarily mean a direct, unimpeded connection, unless otherwise noted.
  • The following list of example features corresponds with FIGS. 1-4 and is provided for ease of reference, where like reference numerals designate corresponding features throughout the specification and figures:
      • Cavity 10
      • Filler Tubes 15
      • PIN Diode 18
      • N-type silicon 20
      • P-type silicon 25
      • CCD 28
      • Silicon Substrate 30
      • Electrodes 35
      • Insulation 40
      • Upper casing 45
      • Lower casing 50
      • IC 200
      • Detector 205
      • Amplifier 210
      • Filter 215
      • Processor 220
      • Signal Processor 225
      • Timer 230
      • Memory 235
      • Cryptographical Client 240
  • As opposed to pseudo-random number generators based on algorithms, there are many true random number generator (TRNG) devices that depend on natural random processes: multiple bipolar switches, thermal noise, light scattering by dichroic mirrors, chaotic systems, or decay of radioactive nuclei. The latter group is considered to be the most independent of t environmental influences like temperature, pressure or acceleration. However, typical nuclear-based TRNGs require large-sized detectors to enable registration of particles emitted as a result of radioactive decay. Also, many nuclei used in such devices are highly radioactive and poisonous, hence dangerous to humans if the device is broken. Various example embodiments of the present apparatus, systems, and methods demonstrate that by using gaseous tritium paired with a suitable solid-state detector, one is able to make a very compact device that can be incorporated into an integrated circuit (IC) chip. Because of the small amounts of radioactive material deployed, such an IC can be used inside consumer products like cell phones without endangering people even if the device is destroyed and the radioactive material is released. Analog and digital circuits that need to be incorporated into the proposed design of TRNG on IC chip can be easily manufactured with standard epitaxial, implantation and laser annealing procedures used throughout the industry that makes solid-state devices. As various example embodiments of the present apparatus, systems, and methods demonstrate, ICs can be filled with suitable gases after they are manufactured and already packaged; see, e.g., FIG. 1. Even with a very small amount of radioactive tritium, each such chip can generate many thousands of random bits per second. Then, these bits can be stored for later use in a solid-state memory incorporated inside ICs. Thus, such a standalone TRNG on a chip can easily provide on demand thousands of multi-byte random numbers needed for the encryption of communication channels (like voice or text messages) or for processes requiring plenty of random numbers (like simulations or gaming).
  • Radioactive tritium is simply an isotope of hydrogen that, like hydrogen, contains in each nucleus one proton with two additional neutrons. These two neutrons make tritium an unstable isotope with a half-life of about 12.3 years. Because of that short half-life, the natural abundance of tritium on Earth is only barely traceable. However, tritium can be easily produced inside nuclear reactors by neutron activation of lithium-6 or boron-10 and their subsequent, fast decay to tritium. In heavy-water moderated reactors, a deuterium nucleus that captures a neutron is also converted into tritium. Because of the use of tritium in the construction of nuclear weapons, production of that material is continued all the time, excess of the obtained gas being stored, which is also available for commercial applications. Recently there exists a whole cottage industry that produces devices that are self-illuminating like gun sights, flashlights and jewelry. All these devices are based on the fluorescence of various fluorophores excited by electrons emitted by decaying tritium. Natural decay of tritium into helium produces electrons with the average energy of about 5.7 keV that is sufficient to excite many fluorophores and thus helps emit visible light with different colors depending on the fluorophore. Such devices use only minute amounts of tritium and are thus allowed to be sold and used by the general public. See the RoHS list of restricted materials for electronic components that do not contain tritium.
  • Using tritium to generate plenty of random numbers (bits or bytes) corresponding to the detection of emitted electrons allows for estimation of the amount of tritium gas needed. Let's assume that one wants to detect on average 1 million spontaneous decays of tritium per second. With the density of tritium being 6 grams per mole and the half-life of tritium being about 12.3 years or about 400 million seconds, one can estimate that to have on average 1 million decays per second, one will need an amount of about 8×1014 tritium atoms. Since one mole of any substance contains about 6×1023 atoms (Avogadro's number), and one mole of any gas in normal conditions has the volume of about 22.4 liters, the number of tritium atoms needed for 1 million decays per second will have the volume of about 2.9×10−8 liters or 0.029 μL, which is equal to 0.029 mm3. The latter number means that a rectangular volume restricted by dimensions of 0.3 mm×0.3 mm×0.3 mm will contain the desired amount of tritium gas that can emit about 1 million electrons every second for at least 12 years. With 1 gram of tritium gas costing about $30,000.00, the amount of gas needed for the above calculated decays will cost less than 1 cent. The dose of radiation received by a human person (if all that amount of tritium is digested or otherwise swallowed) is equal to about 7 percent of the US natural background dose (about 0.23 mSv/year vs. 3.1 mSv/year). This makes TRNG based on tritium made as per this patent application very safe indeed. These numbers are presented in the Appendix.
  • Electrons emitted in the spontaneous decay of tritium that have on average the energy of 5.7 keV can be easily detected by a PIN diode, having heavily doped P and N semiconductor regions with an intrinsic semiconductor region sandwiched between them, or by a typical CCD circuit; both these devices can be easily incorporated into a design of a specialized IC with a TRNG. Such a detector 205 is shown in FIG. 1A. The cavity 10 is filled with tritium via the filling tubes 15. The PIN diode 18 is formed by the N-type silicon 20 and P-type silicon 25 formed on a silicon substrate 30. Electrodes 35 carry the detected signal. Insulation 40 may be used to better insulate the tritium from both escaping the cavity 10 and to contain the energy emitted by the decay so that the PIN diode 18 can more robustly detect the decay. To further protect the tritium from escaping, the entire detector 205 (indeed the entire IC 200) may have upper and lower casings 45, 50. FIG. 1B illustrates a CCD 28 used as the electronic sensor. Other types of electronic sensors may be used, including, as a non-limiting example, a CMOS electronic sensor.
  • The detector 205 may be included on an IC 200, which may further include an amplifier 210 (such as a low noise charge-sensitive preamplifier and pulse shaping amplifier), a filter 215, and processor 220, as shown in FIG. 2. A cryptographic client 240 may optionally also be on the IC 200.
  • The following is a method for converting random tritium decays resulting in the emission of electrons that are being sensed by a PIN diode-type or a CCD-type built-in on-chip detector 205 discussed above to random bits:
      • 1. After each decay of a tritium nuclei, one electron with an energy of about 5.7 KeV is emitted.
      • 2. Each such electron creates a pulse of electrons in the detector 205 with a very typical time profile that enables the detection of just that event and not the other possible types of energetic ionizing particles hitting the detector 205.
      • 3. The analog pulse from the detector 205 is amplified by the amplifier 210. The amplifier 210 may have a pre-amplifier.
      • 4. The amplified signal from the amplifier 210 is filtered by a digital filter 215.
      • 5. The filtered signal is processed by a processor 220 to determine if the signal corresponds to the electron emitted in a decay of tritium and not by other energetic ionizing particle(s). The processor 220 may include a signal processor 225 that performs this function.
      • 6. If the signal is indeed an electron emitted in the decay of tritium, then the processor 220 starts a timer 230, which may also be part of the processor 220. The time may optimally be at a clock frequency of the order of several GHz (several times 109 per second). Because electron pulses will be detected on average every microsecond (10−6 seconds or between an average number of clock ticks of several thousands), one would have enough accuracy to detect differences of randomness of appearances of pulses in time.
      • 7. Steps 1-6 are repeated to detect a second pulse from the subsequent decay, which triggers the processor 220 to stop the timer 230.
      • 8. The value of the timer 230 is stored in the memory 235. This is shown as T1 in FIG. 3A.
      • 9. The next two pulses result in another timer value (T2; FIG. 3A) to be stored in the memory 235. To generate T1 and T2, four pulses are used in FIG. 3A.
      • 10. Two numbers (T1 and T2) stored in memory are compared—if the first is larger, then the system creates a bit with the value 1; in the other case, the value is zero. (This schema can be inverted as well). These bit values are stored in the memory 235. In the very rare situation that two numbers are exactly the same, the whole sequence may be discarded. Thus, for each random bit, four pulses are used.
      • 11. Steps 1-10 are repeated, typically several hundred thousand times per second.
      • 12. The system generates multi-byte numbers, typically 256 bits or 512 bits long, and these are stored in the memory bank for further use by the cryptographic client 240 of the chip 200, providing long (large) random numbers needed for the encryption of communication channels.
      • 13. After a number is used by the cryptographic client 240, the FILO system (first in, last out) moves to the other number while the process described above adds more numbers to the memory 235 until it is filled. In such a case of filling the whole memory bank, the numbers kept longest in the memory 235 are expunged to make space for new numbers generated by the system. This capability makes the system much more resistant against hacking.
  • It should be noted that the system may not use four pulses per random bit. Instead, the system may be constructed as shown in FIG. 3B, where the timer resets at each pulse detection and is always counting. The benefit to this system is that it only requires two pulses per random bit. But in such a case, the two time periods are somewhat dependent on each other because they are linked by a pulse event, so the resulting string of bits may not be as random as the schema provided in FIG. 3A.
  • The memory can supply the necessary number of bytes (bits) on demand for e.g. the secure random encryption of communication channels (i.e., cryptographic client 240) of the device in which this specialized IC 200 is mounted or for random processes required by simulations, modelling and gaming. Additional software testing of random number sequences built into IC chips allows for real-time quality control of the random character of the bits generated—if parts of the sequence do not pass test(s), such a sequence would be removed and never used as an output. This type of proofing further improves the random character of sequences that are being generated by the chip 200.
  • Various example embodiments of the present apparatus, systems, and methods provide the ability to manufacture TRNG IC on the standard semiconductor production line, the only difference being that the packaging should leave as calculated above the void of the size of about 0.03 mm3 with suitable openings that can be connected to the source of gaseous tritium to fill this void, and after that, being sealed by thermal and pressurizing means (like, for instance, a heat sealer). Otherwise, the produced IC will be very similar in shape and other characteristics to other ICs typically used in the manufacturing of consumer goods because the electrons emitted during decay of tritium won't be able to penetrate packaging material (plastic) of the IC. The range of 5.7 keV electrons in a material like plastic is less than 1 micrometer. The same packaging also will be shielding the embedded detector from any external radiation of comparable or even much higher energies. Even if such high energy particles pass through the packaging plastic, they would generate different type of pulses, and these can be differentiated by filtering them from the 5.7 keV pulses that are being used to generate random numbers.
  • RoHS specifies maximum levels for the following 10 restricted materials. The first six apply to the original RoHS, while the last four were added under RoHS 3. Following is the RoHS list of restricted materials from htttp://www.rohsguide.com/rohs-substances.htm:
      • Lead (Pb): <1000 ppm
      • Lead is commonly used in the electrical and electronics industry in solder, lead-acid batteries, electronic components, cable sheathing and the glass of cathode-ray tubes.
      • Mercury (Hg): <100 ppm
      • Mercury is a widely used metal in the production of electrical and electronic appliances and is concentrated in batteries, switches and thermostats, and fluorescent lamps.
      • Cadmium (Cd): <100 ppm
      • Cadmium is used in electronic equipment, car batteries, and pigments.
      • Hexavalent Chromium (Cr VI)<1000 ppm
      • While some forms of chromium are non-toxic, Chromium VI can produce toxic effects.
      • Polybrominated Biphenyls (PBB): 1000 ppm
      • These are flame retardants found in electronic and electrical appliances. They have been found in indoor dust and air through evaporation from plastics.
      • Polybrominated Diphenyl Ethers (PBDE): <1000 ppm
      • These are also flame retardants found in electronic and electrical appliances.
  • Combustion of printed wiring boards release toxic emissions.
      • Bis(2-Ethylhexyl) phthalate (DEHP): <1000 ppm
      • These are used to soften PVC and vinyl insulation on electrical wires.
      • Benzyl butyl phthalate (BBP): <1000 ppm
      • These are used to soften PVC and vinyl insulation on electrical wires.
      • Dibutyl phthalate (DBP): <1000 ppm
      • These are used to soften PVC and vinyl insulation on electrical wires.
      • Diisobutyl phthalate (DIBP): <1000 ppm
      • These are used to soften PVC and vinyl insulation on electrical wires.
  • Any of the suitable technologies, materials, and designs set forth and incorporated herein may be used to implement various example aspects of the invention, as would be apparent to one of skill in the art.
  • Although exemplary embodiments and applications of the invention have been described herein, including as described above and shown in the included example Figures, there is no intention that the invention be limited to these exemplary embodiments and applications or to the manner in which the exemplary embodiments and applications operate or are described herein. Indeed, many variations and modifications to the exemplary embodiments are possible, as would be apparent to a person of ordinary skill in the art. The invention may include any device, structure, method, or functionality, as long as the resulting device, system or method falls within the scope of one of the claims that are allowed by the patent office based on this or any related patent application.
  • 7.0 APPENDIX
    Density of Tritium: 6 g/mol
    Volume of Tritium: 22.4 L/mol
    Half life of Tritium 12.32 years
    388,523,520 seconds
    Needed Decay 1,000,000 decays/second
    1 decay/μsec
    Radioactivity 1,000,000 Bq
    2.70 × 10−5 Ci (with e energy 5.7 keV
    per decay; 1 rad = 1 rem =
    0.01 Sv; 1 rad = 0.01 J/kg)
    Dose per body 7.30 × 10−11 J/(kg · s) or Gy/s
    2.30 × 10−3 Gy/year
    0.23 mSv/year
    Natural background EUS 3.1 mSv/year
    % of US yearly from Tritium 7% (if fully absorbed in lungs)
    Tritium needed 7.77 × 1014 atoms
    Tritium volume needed 2.89 × 10−8 L
    2.89 × 10−2 μL (mm3)
    Tritium mass needed 7.74 × 10−9 g
    7.74 × 10−3 μg
    Tritium cost $30,000.00/gram
    Cost of Tritium needed $0.00023
    Cell size [mm3] 2.70 × 10−2

Claims (25)

1. A true random number generator (TRNG) comprising:
a cavity filled with tritium;
an electronic sensor constructed to detect energy from the decay of the tritium and to produce a signal for the detected energy;
an amplifier connected to the sensor and constructed to amplify the signal;
a filter connected to the amplifier constructed to filter the signal;
a processor connected to the filter, constructed to perform the following steps:
a. determine whether the signal represents decay events for tritium;
b. set a timer to determine the time period between decay events;
c. based on the time period in step (b), assign a value of a 0 or a 1;
d. store the value in a memory;
e. repeat steps (b)-(d), resulting in a string of values; and
f. generate a true random number based on the string of values.
2. The TRNG of claim 1,
wherein step (b) further comprises determining:
a first time period T1 between a first pair of decay events;
a second time period T2 between a second pair of decay events; and
wherein step (c) further comprises comparing T1 to T2 and assigning the value based on the comparison.
3. The TRNG of claim 2, wherein the first pair of decay events and the second pair of decay events share a common decay event.
4. The TRNG of claim 1, wherein the cavity, sensor amplifier, filter and processor are formed on an integrated circuit.
5. The TRNG of claim 1, wherein the volume of tritium is less than 0.03 μL.
6. The TRNG of claim 1, wherein the maximum radioactivity of the tritium is less than 3×10−5 Ci.
7. The TRNG of claim 1, wherein the processor generates an array of true random numbers.
8. The TRNG of claim 7, wherein the processor provides one of an array of true random numbers to a cryptographic client; and deletes the delivered true random number from the memory.
9. The TRNG of claim 8, wherein the one of an array of true random number provided is the oldest one in the array.
10. The TRNG of claim 7, wherein when the memory is full, the processor deletes the oldest one in the array of true random numbers.
11. The TRNG of claim 1, wherein the true random number is comprised of 256 bits or 512 bits.
12. The TRNG of claim 1, wherein the amount of tritium is sufficient to create at least one million decay events per second.
13. The TRNG of claim 1, wherein the timer has a clock frequency of at least 1 GHz.
14. The TRNG of claim 1, wherein the amplifier comprises a low noise charge-sensitive preamplifier or a pulse shaping amplifier.
15. A personal electronic device comprising:
a true random number generator comprising:
a cavity filled with tritium;
an electronic sensor constructed to detect energy from the decay of the tritium and to produce a signal for the detected energy;
an amplifier connected to the sensor and constructed to amplify the signal;
a filter connected to the amplifier constructed to filter the signal;
a processor connected to the filter, constructed to perform the following steps:
a. determine whether the signal represents decay events for tritium;
b. set a timer to determine the time period between decay events;
c. based on the time period in step (b), assign a value of a 0 or a 1;
d. store the value in a memory;
e. repeat steps (b)-(d), resulting in a string of values; and
f. generate an array of true random numbers based on the string of values;
a cryptographic client adapted to receive one of an array of true random numbers.
16. The personal electronic device of claim 15, wherein the true random number is used to encrypt a communication channel, to render computer simulations, or to render computer gaming.
17. The personal electronic device of claim 15, wherein the cavity, sensor amplifier, filter and processor are formed on an integrated circuit.
18. The personal electronic device of claim 15, wherein the volume of tritium is less than 0.03 μL.
19. The personal electronic device of claim 15, wherein the maximum radioactivity of the tritium is less than 3×10−5 Ci.
20. A method of generating a true random number using tritium, the method comprising:
a. providing a volume of tritium;
b. detecting an energy signal from the decay of the tritium;
c. determining whether the energy signal represents decay events for tritium;
d. setting a timer to determine the time period between decay events;
e. assigning a value of a 0 or a 1 based on the time period;
f. storing the value;
g. repeating steps (b)-(f), resulting in a string of values; and
h. generating an array of true random numbers based on the string of values.
21. The method of claim 20,
wherein step (d) further comprises; determining:
a first time period T1 between a first pair of decay events;
a second time period T2 between a second pair of decay events;
wherein step (e) further comprises comparing T1 to T2 and assigning the value based on the comparison.
22. The method of claim 21, wherein the first pair of decay events and the second pair of decay events share a common decay event.
23. The method of claim 20, the method further comprising:
i. providing one of an array of true random numbers to a cryptographic client; and
j. deleting the delivered true random number from the memory.
24. The method of claim 23, wherein the one of an array of true random number provided is the oldest one in the array.
25. The method of claim 20, wherein the true random number is comprised of 256 bits or 512 bits.
US16/273,365 2018-04-09 2019-02-12 Apparatus, systems, and methods comprising tritium random number generator Active US10430161B1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US16/273,365 US10430161B1 (en) 2018-04-09 2019-02-12 Apparatus, systems, and methods comprising tritium random number generator
EP19847508.9A EP3776179B1 (en) 2018-04-09 2019-02-13 Apparatus, systems, and methods comprising tritium random number generator
PCT/US2019/017748 WO2020033002A1 (en) 2018-04-09 2019-02-13 Apparatus, systems, and methods comprising tritium random number generator

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201862655172P 2018-04-09 2018-04-09
US201962803476P 2019-02-09 2019-02-09
US16/273,365 US10430161B1 (en) 2018-04-09 2019-02-12 Apparatus, systems, and methods comprising tritium random number generator

Publications (2)

Publication Number Publication Date
US10430161B1 US10430161B1 (en) 2019-10-01
US20190310830A1 true US20190310830A1 (en) 2019-10-10

Family

ID=68063585

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/273,365 Active US10430161B1 (en) 2018-04-09 2019-02-12 Apparatus, systems, and methods comprising tritium random number generator

Country Status (3)

Country Link
US (1) US10430161B1 (en)
EP (1) EP3776179B1 (en)
WO (1) WO2020033002A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11048478B1 (en) 2020-03-03 2021-06-29 Randaemon Sp. Z O.O. Method and apparatus for tritium-based true random number generator
WO2021178021A1 (en) * 2020-03-03 2021-09-10 Randaemon, Sp. Z O.O. Method and apparatus for tritium-based true random number generator
US11249725B1 (en) 2021-07-22 2022-02-15 Randaemon Sp. Zo.O. Method and apparatus for highly effective on-chip true random number generator utilizing beta decay
US11281432B1 (en) 2021-07-22 2022-03-22 Randaemon Sp. Z O.O. Method and apparatus for true random number generator based on nuclear radiation
US11567734B1 (en) 2021-10-22 2023-01-31 Randaemon Sp. Z O.O. Method and apparatus for highly effective on-chip quantum random number generator
US11586421B2 (en) 2021-07-22 2023-02-21 Randaemon Sp. Z O.O. Method for making cost-effective nickel-63 radiation source for true random number generators

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102483374B1 (en) * 2018-05-11 2022-12-30 한국전자통신연구원 Apparatus and method for generating quantum random number
KR102372740B1 (en) * 2019-04-09 2022-03-14 한국전자통신연구원 Random number generating device and operating method of the same
US11474790B2 (en) 2020-03-18 2022-10-18 Real Random IP, LLC Electromechanical apparatus, system, and method for generating true random numbers
US11385865B2 (en) 2020-03-18 2022-07-12 Real Random IP, LLC Electromechanical apparatus, system, and method for generating true random numbers
WO2023001937A1 (en) 2021-07-22 2023-01-26 Randaemon Sp. Z O.O. Method for making cost-effective nickel-63 radiation source for true random number generators
WO2024042403A1 (en) 2022-08-25 2024-02-29 Randaemon Sp. Z O.O. Method and apparatus for highly effective on-chip quantum random number generator
CN115685301B (en) * 2023-01-04 2023-04-07 中创智科(绵阳)科技有限公司 Explosion-proof tritium concentration measuring instrument

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3445591A (en) 1966-01-04 1969-05-20 Dale R Koehler Generator of mathematically random entities
US3790768A (en) 1972-09-28 1974-02-05 Prayfel Inc Random number generator
US4527798A (en) 1981-02-23 1985-07-09 Video Turf Incorporated Random number generating techniques and gaming equipment employing such techniques
US4855690A (en) 1987-08-10 1989-08-08 Dallas Semiconductor Corporation Integrated circuit random number generator using sampled output of variable frequency oscillator
US4905176A (en) 1988-10-28 1990-02-27 International Business Machines Corporation Random number generator circuit
DE4010305A1 (en) 1990-03-30 1991-10-02 Gao Ges Automation Org RANDOM NUMBER GENERATOR
US5570307A (en) 1995-01-06 1996-10-29 Vlsi Technology, Inc. Digital randomizer for on-chip generation and storage of random self-programming data block
US5732138A (en) 1996-01-29 1998-03-24 Silicon Graphics, Inc. Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic system
EP0828349A1 (en) 1996-08-06 1998-03-11 AMERSHAM INTERNATIONAL plc Method of and apparatus for generating random numbers
WO1998033075A2 (en) 1997-01-13 1998-07-30 Sage Technology, Incorporated Random number generator based on directional randomness associated with naturally occurring random events, and method therefor
US6249009B1 (en) 1997-06-16 2001-06-19 Hong J. Kim Random number generator
US6107619A (en) 1997-07-14 2000-08-22 California Institute Of Technology Delta-doped hybrid advanced detector for low energy particle detection
GB9803055D0 (en) * 1998-02-12 1998-04-08 Nycomed Amersham Plc Method of and apparatus for generating random numbers
EA003160B1 (en) 1998-12-18 2003-02-27 Дзе Риджентс Оф Дзе Юниверсити Оф Калифорния A RANDOM NUMBER GENERATOR BASED ON THE SPONTANEOUS alpha-DECAY
US6539410B1 (en) 1999-03-17 2003-03-25 Michael Jay Klass Random number generator
US6430170B1 (en) 1999-05-27 2002-08-06 Qualcomm Inc. Method and apparatus for generating random numbers from a communication signal
JP2001117756A (en) * 1999-10-20 2001-04-27 Iwaki Electronics Corp Random pulse generator and random number generation device and probability generation device utilizing the random number generator
JP3480822B2 (en) 1999-11-02 2003-12-22 斎藤 威 Thermal noise random pulse generator and random number generator
US6687721B1 (en) 2000-03-31 2004-02-03 Intel Corporation Random number generator with entropy accumulation
WO2002037260A1 (en) 2000-10-24 2002-05-10 Hmi Co., Ltd. Random number generator
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US7031991B2 (en) 2002-04-17 2006-04-18 Koninklijke Philips Electronics N.V. Hadamard-transform on-line randomness test
JP4299064B2 (en) 2003-06-19 2009-07-22 啓明 三頭 Manufacturing method of sealed 210Pb-210Poα radiation source (α particle emitter)
EP1755033B1 (en) 2004-05-24 2013-12-11 Leisure Electronics Technology Co., Ltd. Random number extraction method and random number generation device using the same
TWI408903B (en) 2004-06-30 2013-09-11 Noriyoshi Tsuyuzaki Random pulse generation source, and semiconductor device, method and program for generating random number and/or probability using the source
TWI496075B (en) * 2010-06-03 2015-08-11 Univ Michigan Randomized value generation
US9335972B2 (en) 2013-11-29 2016-05-10 The Regents Of The University Of Michigan True random number generator
US10664238B2 (en) * 2017-01-27 2020-05-26 The Research Foundation For The State University Of New York Quantum true random number generator

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11048478B1 (en) 2020-03-03 2021-06-29 Randaemon Sp. Z O.O. Method and apparatus for tritium-based true random number generator
WO2021178021A1 (en) * 2020-03-03 2021-09-10 Randaemon, Sp. Z O.O. Method and apparatus for tritium-based true random number generator
US11249725B1 (en) 2021-07-22 2022-02-15 Randaemon Sp. Zo.O. Method and apparatus for highly effective on-chip true random number generator utilizing beta decay
US11281432B1 (en) 2021-07-22 2022-03-22 Randaemon Sp. Z O.O. Method and apparatus for true random number generator based on nuclear radiation
US11586421B2 (en) 2021-07-22 2023-02-21 Randaemon Sp. Z O.O. Method for making cost-effective nickel-63 radiation source for true random number generators
US11614921B2 (en) 2021-07-22 2023-03-28 Randaemon Sp. Z O.O. Method and apparatus for highly effective on- chip quantum random number generator
US11567734B1 (en) 2021-10-22 2023-01-31 Randaemon Sp. Z O.O. Method and apparatus for highly effective on-chip quantum random number generator

Also Published As

Publication number Publication date
EP3776179B1 (en) 2022-04-27
EP3776179A1 (en) 2021-02-17
US10430161B1 (en) 2019-10-01
WO2020033002A1 (en) 2020-02-13
EP3776179A4 (en) 2021-12-15

Similar Documents

Publication Publication Date Title
US10430161B1 (en) Apparatus, systems, and methods comprising tritium random number generator
WO2021178021A1 (en) Method and apparatus for tritium-based true random number generator
US11048478B1 (en) Method and apparatus for tritium-based true random number generator
Ahmed Physics and engineering of radiation detection
Silari et al. Intercomparison of radiation protection devices in a high-energy stray neutron field. Part III: Instrument response
JP2015521372A (en) Solid-state radiation detector with enhanced sensitivity to gamma rays
Moreno et al. System for measurement of low yield neutron pulses from D–D fusion reactions based upon a 3He proportional counter
Totani A failed Gamma-Ray Burst with dirty energetic jets spirited away? New implications for the Gamma-Ray Burst-supernova connection from SN 2002ap
Cikhardt et al. Neutron spectrum measured by activation diagnostics in deuterium gas-puff experiments on the 3 MA GIT-12 Z-pinch
O'Mara Retrospective Dosimetry for Nuclear Nonproliferation and Emergency Response
Dehning et al. LHC beam loss detector design: Simulation and measurements
BAJO et al. 81Kr‐Kr age and multiple cosmic‐ray exposure history of the Vaca Muerta mesosiderite
Kandlakunta A Proof-of-Principle Investigation for a Neutron-Gamma Discrimination Technique in a Semiconductor Neutron Detector
Iwahashi et al. Heavy ion and proton irradiation of gas electron multipliers with liquid crystal polymer insulator: evaluation tests for use in space
Lamotte et al. Heavy-ions induced scintillation experiments
Segui et al. Micromegas for beam loss monitoring
JP7373035B2 (en) Boron trifluoride as a quench gas for neutron proportional counters
Bergmann et al. Angular correlation function of the hypersatellite-satellite x-ray cascade following K-shell electron capture of Fe 55
Hutchins The area radiation gamma and neutron origin telemetry system
Savvidis Sensor characterization and fiducial volume studies for the NEWS-G dark matter experiment
Downen The Study of 29si (p, γ) 30p and Its Impact on Classical Nova Nucleosynthesis
Foxe et al. Conceptual silicon beta cell design
Glebov et al. Carbon activation diagnostic for tertiary neutron measurements
ANDOLA INVESTIGATIONS ON Z-PINCH DEVICES FOR PULSED RADIOGRAPHY AND MATERIAL CHARACTERIZATION
Ravotti AIDA-2020

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: MICROENTITY

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO MICRO (ORIGINAL EVENT CODE: MICR); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Free format text: ENTITY STATUS SET TO MICRO (ORIGINAL EVENT CODE: MICR); ENTITY STATUS OF PATENT OWNER: MICROENTITY

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: MICROENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: RANDAEMON SP. Z O.O., POLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TATARKIEWICZ, JAN JAKUB;REEL/FRAME:054656/0213

Effective date: 20201215

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4