US20190310830A1 - Apparatus, systems, and methods comprising tritium random number generator - Google Patents
Apparatus, systems, and methods comprising tritium random number generator Download PDFInfo
- Publication number
- US20190310830A1 US20190310830A1 US16/273,365 US201916273365A US2019310830A1 US 20190310830 A1 US20190310830 A1 US 20190310830A1 US 201916273365 A US201916273365 A US 201916273365A US 2019310830 A1 US2019310830 A1 US 2019310830A1
- Authority
- US
- United States
- Prior art keywords
- tritium
- trng
- true random
- decay
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01T—MEASUREMENT OF NUCLEAR OR X-RADIATION
- G01T1/00—Measuring X-radiation, gamma radiation, corpuscular radiation, or cosmic radiation
- G01T1/16—Measuring radiation intensity
- G01T1/17—Circuit arrangements not adapted to a particular type of detector
- G01T1/178—Circuit arrangements not adapted to a particular type of detector for measuring specific activity in the presence of other radioactive substances, e.g. natural, in the air or in liquids such as rain water
Landscapes
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Analysis (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- General Engineering & Computer Science (AREA)
- Computational Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- High Energy & Nuclear Physics (AREA)
- Molecular Biology (AREA)
- Spectroscopy & Molecular Physics (AREA)
- Measurement Of Radiation (AREA)
Abstract
Description
- This application claims priority as the non-provisional of U.S. Provisional Application Ser. 62/655,172 filed on Apr. 9, 2018 titled “Apparatus, Systems, and Methods Comprising Tritium Random Number Generator”, and also claims priority as the non-provisional of U.S. Provisional Application Ser. 62/803,476 filed on Feb. 9, 2019 titled “Apparatus, Systems, and Methods Comprising Tritium Random Number Generator”, and the contents of both of these applications are incorporated herein as if fully set forth herein.
- The present disclosure relates generally to true random number generators, specifically random number generator technologies utilizing the spontaneous tritium decay, as well as apparatus, systems, and methods regarding the same.
- As opposed to pseudo-random number generators based on algorithms, there are true random number generator (TRNG) devices that depend on natural random processes: multiple bipolar switches, thermal noise, light scattering by dichroic mirrors, chaotic systems, or decay of radioactive nuclei. Some of these TRNG are listed in the provisional applications to which the present application claims priority, and those references are incorporated herein by reference as if fully set forth herein.
- The decay of radioactive nuclei types is considered to be the most independent of environmental influences like temperature, pressure or acceleration. However, typical nuclear-based TRNGs require large-sized detectors to enable registration of particles emitted as a result of radioactive decay. Also, many nuclei used in such devices are highly radioactive and poisonous, hence dangerous to humans if the device is broken.
- Therefore, a safe and small TRNG that will not expose the user to dangerous levels of radiation would be advantageous. Such a TRNG can then be used in compact personal devices.
- The invention disclosed herein is a true random number generator (TRNG). The TRNG includes a cavity filled with tritium and an electronic sensor constructed to detect energy from the decay of the tritium. The sensor produces a signal for the detected energy, and an amplifier amplifies the signal while a filter filters the signal. A processor (a) determines whether the signal represents decay events for tritium; (b) sets a timer to determine the time period between decay events; (c) based on the time period in step (b), assigns a value of a 0 or a 1; (d) stores the value in a memory; (e) repeat steps (b)-(d) resulting in a string of values; and (f) generates a true random number based on the string of values. The TRNG may be formed on an integrated circuit.
- In step (b), the processor may further determine a first time period T1 between a first pair of decay events and a second time period T2 between a second pair of decay events. It may in step (c) compare T1 to T2 and assign the value based on the comparison. The first pair of decay events and the second pair of decay events may share a common decay event.
- The processor may generate an array of true random numbers. The processor may provide one of an array of true random numbers to a cryptographic client and then delete the delivered true random number from the memory. The one of an array of true random number provided to the cryptographic client may be the oldest one in the array. When the memory is full, the processor may delete the oldest one in the array of true random numbers. The true random numbers generated may be comprised of 256 bits or 512 bits.
- The volume of tritium may be less than 0.03 μL, and the maximum radioactivity of the tritium may be less than 3×10−5 Ci. The amount of tritium may be sufficient to create at least one million decay events per second.
- The amplifier may be a low noise charge-sensitive preamplifier or a pulse shaping amplifier. The timer may have a have a clock frequency of at least 1 GHz.
- A personal electronic device may be constructed from the TRNG. This device may use the true random numbers to encrypt a communication channel, to render computer simulations, or to render computer gaming.
- A method to generate to a true random number using tritium is also disclosed. The method includes: (a) providing a volume of tritium; (b) detecting an energy signal from the decay of the tritium; (c) determining whether the energy signal represents decay events for tritium; (d) setting a timer to determine the time period between decay events; (e) assigning a value of a 0 or a 1 based on the time period; (f) storing the value; (g) repeating steps (b)-(f), resulting in a string of values; and (h) generating an array of true random numbers based on the string of values.
- Additional aspects, alternatives and variations as would be apparent to persons of skill in the art are also disclosed herein and are specifically contemplated as included as part of the invention. The invention is set forth only in the claims as allowed by the patent office in this or related applications, and the following summary descriptions of certain examples are not in any way to limit, define or otherwise establish the scope of legal protection.
- The invention can be better understood with reference to the following figures. The components within the figures are not necessarily to scale, emphasis instead being placed on clearly illustrating example aspects of the invention. In the figures, like reference numerals designate corresponding parts throughout the different views and/or embodiments. Furthermore, various features of different disclosed embodiments can be combined to form additional embodiments, which are part of this disclosure. It will be understood that certain components and details may not appear in the figures to assist in more clearly describing the invention.
-
FIG. 1A is a cross-sectional view of a PIN diode detector. -
FIG. 1B is a cross-sectional view of a CCD detector. -
FIG. 2 is a flow diagram of the various components that may be placed on the integrated circuit. -
FIG. 3A illustrates the four pulse per random bit schema. -
FIG. 3B illustrates the two pulse per random bit schema. - Reference is made herein to some specific examples of the present invention, including any best modes contemplated by the inventor for carrying out the invention. Examples of these specific embodiments are illustrated in the accompanying figures. While the invention is described in conjunction with these specific embodiments, it will be understood that it is not intended to limit the invention to the described or illustrated embodiments. To the contrary, it is intended to cover alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims.
- In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. Particular example embodiments of the present invention may be implemented without some or all of these specific details. In other instances, process operations well known to persons of skill in the art have not been described in detail in order not to obscure unnecessarily the present invention. Various techniques and mechanisms of the present invention will sometimes be described in singular form for clarity. However, it should be noted that some embodiments include multiple iterations of a technique or multiple mechanisms, unless noted otherwise. Similarly, various steps of the methods shown and described herein are not necessarily performed in the order indicated, or performed at all in certain embodiments. Accordingly, some implementations of the methods discussed herein may include more or fewer steps than those shown or described. Further, the techniques and mechanisms of the present invention will sometimes describe a connection, relationship or communication between two or more entities. It should be noted that a connection or relationship between entities does not necessarily mean a direct, unimpeded connection, as a variety of other entities or processes may reside or occur between any two entities. Consequently, an indicated connection does not necessarily mean a direct, unimpeded connection, unless otherwise noted.
- The following list of example features corresponds with
FIGS. 1-4 and is provided for ease of reference, where like reference numerals designate corresponding features throughout the specification and figures: -
-
Cavity 10 -
Filler Tubes 15 -
PIN Diode 18 - N-type silicon 20
- P-
type silicon 25 -
CCD 28 -
Silicon Substrate 30 -
Electrodes 35 -
Insulation 40 -
Upper casing 45 -
Lower casing 50 -
IC 200 -
Detector 205 -
Amplifier 210 -
Filter 215 -
Processor 220 -
Signal Processor 225 -
Timer 230 -
Memory 235 -
Cryptographical Client 240
-
- As opposed to pseudo-random number generators based on algorithms, there are many true random number generator (TRNG) devices that depend on natural random processes: multiple bipolar switches, thermal noise, light scattering by dichroic mirrors, chaotic systems, or decay of radioactive nuclei. The latter group is considered to be the most independent of t environmental influences like temperature, pressure or acceleration. However, typical nuclear-based TRNGs require large-sized detectors to enable registration of particles emitted as a result of radioactive decay. Also, many nuclei used in such devices are highly radioactive and poisonous, hence dangerous to humans if the device is broken. Various example embodiments of the present apparatus, systems, and methods demonstrate that by using gaseous tritium paired with a suitable solid-state detector, one is able to make a very compact device that can be incorporated into an integrated circuit (IC) chip. Because of the small amounts of radioactive material deployed, such an IC can be used inside consumer products like cell phones without endangering people even if the device is destroyed and the radioactive material is released. Analog and digital circuits that need to be incorporated into the proposed design of TRNG on IC chip can be easily manufactured with standard epitaxial, implantation and laser annealing procedures used throughout the industry that makes solid-state devices. As various example embodiments of the present apparatus, systems, and methods demonstrate, ICs can be filled with suitable gases after they are manufactured and already packaged; see, e.g.,
FIG. 1 . Even with a very small amount of radioactive tritium, each such chip can generate many thousands of random bits per second. Then, these bits can be stored for later use in a solid-state memory incorporated inside ICs. Thus, such a standalone TRNG on a chip can easily provide on demand thousands of multi-byte random numbers needed for the encryption of communication channels (like voice or text messages) or for processes requiring plenty of random numbers (like simulations or gaming). - Radioactive tritium is simply an isotope of hydrogen that, like hydrogen, contains in each nucleus one proton with two additional neutrons. These two neutrons make tritium an unstable isotope with a half-life of about 12.3 years. Because of that short half-life, the natural abundance of tritium on Earth is only barely traceable. However, tritium can be easily produced inside nuclear reactors by neutron activation of lithium-6 or boron-10 and their subsequent, fast decay to tritium. In heavy-water moderated reactors, a deuterium nucleus that captures a neutron is also converted into tritium. Because of the use of tritium in the construction of nuclear weapons, production of that material is continued all the time, excess of the obtained gas being stored, which is also available for commercial applications. Recently there exists a whole cottage industry that produces devices that are self-illuminating like gun sights, flashlights and jewelry. All these devices are based on the fluorescence of various fluorophores excited by electrons emitted by decaying tritium. Natural decay of tritium into helium produces electrons with the average energy of about 5.7 keV that is sufficient to excite many fluorophores and thus helps emit visible light with different colors depending on the fluorophore. Such devices use only minute amounts of tritium and are thus allowed to be sold and used by the general public. See the RoHS list of restricted materials for electronic components that do not contain tritium.
- Using tritium to generate plenty of random numbers (bits or bytes) corresponding to the detection of emitted electrons allows for estimation of the amount of tritium gas needed. Let's assume that one wants to detect on average 1 million spontaneous decays of tritium per second. With the density of tritium being 6 grams per mole and the half-life of tritium being about 12.3 years or about 400 million seconds, one can estimate that to have on average 1 million decays per second, one will need an amount of about 8×1014 tritium atoms. Since one mole of any substance contains about 6×1023 atoms (Avogadro's number), and one mole of any gas in normal conditions has the volume of about 22.4 liters, the number of tritium atoms needed for 1 million decays per second will have the volume of about 2.9×10−8 liters or 0.029 μL, which is equal to 0.029 mm3. The latter number means that a rectangular volume restricted by dimensions of 0.3 mm×0.3 mm×0.3 mm will contain the desired amount of tritium gas that can emit about 1 million electrons every second for at least 12 years. With 1 gram of tritium gas costing about $30,000.00, the amount of gas needed for the above calculated decays will cost less than 1 cent. The dose of radiation received by a human person (if all that amount of tritium is digested or otherwise swallowed) is equal to about 7 percent of the US natural background dose (about 0.23 mSv/year vs. 3.1 mSv/year). This makes TRNG based on tritium made as per this patent application very safe indeed. These numbers are presented in the Appendix.
- Electrons emitted in the spontaneous decay of tritium that have on average the energy of 5.7 keV can be easily detected by a PIN diode, having heavily doped P and N semiconductor regions with an intrinsic semiconductor region sandwiched between them, or by a typical CCD circuit; both these devices can be easily incorporated into a design of a specialized IC with a TRNG. Such a
detector 205 is shown inFIG. 1A . Thecavity 10 is filled with tritium via the fillingtubes 15. ThePIN diode 18 is formed by the N-type silicon 20 and P-type silicon 25 formed on asilicon substrate 30.Electrodes 35 carry the detected signal.Insulation 40 may be used to better insulate the tritium from both escaping thecavity 10 and to contain the energy emitted by the decay so that thePIN diode 18 can more robustly detect the decay. To further protect the tritium from escaping, the entire detector 205 (indeed the entire IC 200) may have upper andlower casings FIG. 1B illustrates aCCD 28 used as the electronic sensor. Other types of electronic sensors may be used, including, as a non-limiting example, a CMOS electronic sensor. - The
detector 205 may be included on anIC 200, which may further include an amplifier 210 (such as a low noise charge-sensitive preamplifier and pulse shaping amplifier), afilter 215, andprocessor 220, as shown inFIG. 2 . Acryptographic client 240 may optionally also be on theIC 200. - The following is a method for converting random tritium decays resulting in the emission of electrons that are being sensed by a PIN diode-type or a CCD-type built-in on-
chip detector 205 discussed above to random bits: -
- 1. After each decay of a tritium nuclei, one electron with an energy of about 5.7 KeV is emitted.
- 2. Each such electron creates a pulse of electrons in the
detector 205 with a very typical time profile that enables the detection of just that event and not the other possible types of energetic ionizing particles hitting thedetector 205. - 3. The analog pulse from the
detector 205 is amplified by theamplifier 210. Theamplifier 210 may have a pre-amplifier. - 4. The amplified signal from the
amplifier 210 is filtered by adigital filter 215. - 5. The filtered signal is processed by a
processor 220 to determine if the signal corresponds to the electron emitted in a decay of tritium and not by other energetic ionizing particle(s). Theprocessor 220 may include asignal processor 225 that performs this function. - 6. If the signal is indeed an electron emitted in the decay of tritium, then the
processor 220 starts atimer 230, which may also be part of theprocessor 220. The time may optimally be at a clock frequency of the order of several GHz (several times 109 per second). Because electron pulses will be detected on average every microsecond (10−6 seconds or between an average number of clock ticks of several thousands), one would have enough accuracy to detect differences of randomness of appearances of pulses in time. - 7. Steps 1-6 are repeated to detect a second pulse from the subsequent decay, which triggers the
processor 220 to stop thetimer 230. - 8. The value of the
timer 230 is stored in thememory 235. This is shown as T1 inFIG. 3A . - 9. The next two pulses result in another timer value (T2;
FIG. 3A ) to be stored in thememory 235. To generate T1 and T2, four pulses are used inFIG. 3A . - 10. Two numbers (T1 and T2) stored in memory are compared—if the first is larger, then the system creates a bit with the
value 1; in the other case, the value is zero. (This schema can be inverted as well). These bit values are stored in thememory 235. In the very rare situation that two numbers are exactly the same, the whole sequence may be discarded. Thus, for each random bit, four pulses are used. - 11. Steps 1-10 are repeated, typically several hundred thousand times per second.
- 12. The system generates multi-byte numbers, typically 256 bits or 512 bits long, and these are stored in the memory bank for further use by the
cryptographic client 240 of thechip 200, providing long (large) random numbers needed for the encryption of communication channels. - 13. After a number is used by the
cryptographic client 240, the FILO system (first in, last out) moves to the other number while the process described above adds more numbers to thememory 235 until it is filled. In such a case of filling the whole memory bank, the numbers kept longest in thememory 235 are expunged to make space for new numbers generated by the system. This capability makes the system much more resistant against hacking.
- It should be noted that the system may not use four pulses per random bit. Instead, the system may be constructed as shown in
FIG. 3B , where the timer resets at each pulse detection and is always counting. The benefit to this system is that it only requires two pulses per random bit. But in such a case, the two time periods are somewhat dependent on each other because they are linked by a pulse event, so the resulting string of bits may not be as random as the schema provided inFIG. 3A . - The memory can supply the necessary number of bytes (bits) on demand for e.g. the secure random encryption of communication channels (i.e., cryptographic client 240) of the device in which this
specialized IC 200 is mounted or for random processes required by simulations, modelling and gaming. Additional software testing of random number sequences built into IC chips allows for real-time quality control of the random character of the bits generated—if parts of the sequence do not pass test(s), such a sequence would be removed and never used as an output. This type of proofing further improves the random character of sequences that are being generated by thechip 200. - Various example embodiments of the present apparatus, systems, and methods provide the ability to manufacture TRNG IC on the standard semiconductor production line, the only difference being that the packaging should leave as calculated above the void of the size of about 0.03 mm3 with suitable openings that can be connected to the source of gaseous tritium to fill this void, and after that, being sealed by thermal and pressurizing means (like, for instance, a heat sealer). Otherwise, the produced IC will be very similar in shape and other characteristics to other ICs typically used in the manufacturing of consumer goods because the electrons emitted during decay of tritium won't be able to penetrate packaging material (plastic) of the IC. The range of 5.7 keV electrons in a material like plastic is less than 1 micrometer. The same packaging also will be shielding the embedded detector from any external radiation of comparable or even much higher energies. Even if such high energy particles pass through the packaging plastic, they would generate different type of pulses, and these can be differentiated by filtering them from the 5.7 keV pulses that are being used to generate random numbers.
- RoHS specifies maximum levels for the following 10 restricted materials. The first six apply to the original RoHS, while the last four were added under
RoHS 3. Following is the RoHS list of restricted materials from htttp://www.rohsguide.com/rohs-substances.htm: -
- Lead (Pb): <1000 ppm
- Lead is commonly used in the electrical and electronics industry in solder, lead-acid batteries, electronic components, cable sheathing and the glass of cathode-ray tubes.
- Mercury (Hg): <100 ppm
- Mercury is a widely used metal in the production of electrical and electronic appliances and is concentrated in batteries, switches and thermostats, and fluorescent lamps.
- Cadmium (Cd): <100 ppm
- Cadmium is used in electronic equipment, car batteries, and pigments.
- Hexavalent Chromium (Cr VI)<1000 ppm
- While some forms of chromium are non-toxic, Chromium VI can produce toxic effects.
- Polybrominated Biphenyls (PBB): 1000 ppm
- These are flame retardants found in electronic and electrical appliances. They have been found in indoor dust and air through evaporation from plastics.
- Polybrominated Diphenyl Ethers (PBDE): <1000 ppm
- These are also flame retardants found in electronic and electrical appliances.
- Combustion of printed wiring boards release toxic emissions.
-
- Bis(2-Ethylhexyl) phthalate (DEHP): <1000 ppm
- These are used to soften PVC and vinyl insulation on electrical wires.
- Benzyl butyl phthalate (BBP): <1000 ppm
- These are used to soften PVC and vinyl insulation on electrical wires.
- Dibutyl phthalate (DBP): <1000 ppm
- These are used to soften PVC and vinyl insulation on electrical wires.
- Diisobutyl phthalate (DIBP): <1000 ppm
- These are used to soften PVC and vinyl insulation on electrical wires.
- Any of the suitable technologies, materials, and designs set forth and incorporated herein may be used to implement various example aspects of the invention, as would be apparent to one of skill in the art.
- Although exemplary embodiments and applications of the invention have been described herein, including as described above and shown in the included example Figures, there is no intention that the invention be limited to these exemplary embodiments and applications or to the manner in which the exemplary embodiments and applications operate or are described herein. Indeed, many variations and modifications to the exemplary embodiments are possible, as would be apparent to a person of ordinary skill in the art. The invention may include any device, structure, method, or functionality, as long as the resulting device, system or method falls within the scope of one of the claims that are allowed by the patent office based on this or any related patent application.
-
7.0 APPENDIX Density of Tritium: 6 g/mol Volume of Tritium: 22.4 L/mol Half life of Tritium 12.32 years 388,523,520 seconds Needed Decay 1,000,000 decays/second 1 decay/μsec Radioactivity 1,000,000 Bq 2.70 × 10−5 Ci (with e− energy 5.7 keV per decay; 1 rad = 1 rem = 0.01 Sv; 1 rad = 0.01 J/kg) Dose per body 7.30 × 10−11 J/(kg · s) or Gy/s 2.30 × 10−3 Gy/year 0.23 mSv/year Natural background EUS 3.1 mSv/year % of US yearly from Tritium 7% (if fully absorbed in lungs) Tritium needed 7.77 × 1014 atoms Tritium volume needed 2.89 × 10−8 L 2.89 × 10−2 μL (mm3) Tritium mass needed 7.74 × 10−9 g 7.74 × 10−3 μg Tritium cost $30,000.00/gram Cost of Tritium needed $0.00023 Cell size [mm3] 2.70 × 10−2
Claims (25)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/273,365 US10430161B1 (en) | 2018-04-09 | 2019-02-12 | Apparatus, systems, and methods comprising tritium random number generator |
EP19847508.9A EP3776179B1 (en) | 2018-04-09 | 2019-02-13 | Apparatus, systems, and methods comprising tritium random number generator |
PCT/US2019/017748 WO2020033002A1 (en) | 2018-04-09 | 2019-02-13 | Apparatus, systems, and methods comprising tritium random number generator |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862655172P | 2018-04-09 | 2018-04-09 | |
US201962803476P | 2019-02-09 | 2019-02-09 | |
US16/273,365 US10430161B1 (en) | 2018-04-09 | 2019-02-12 | Apparatus, systems, and methods comprising tritium random number generator |
Publications (2)
Publication Number | Publication Date |
---|---|
US10430161B1 US10430161B1 (en) | 2019-10-01 |
US20190310830A1 true US20190310830A1 (en) | 2019-10-10 |
Family
ID=68063585
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/273,365 Active US10430161B1 (en) | 2018-04-09 | 2019-02-12 | Apparatus, systems, and methods comprising tritium random number generator |
Country Status (3)
Country | Link |
---|---|
US (1) | US10430161B1 (en) |
EP (1) | EP3776179B1 (en) |
WO (1) | WO2020033002A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11048478B1 (en) | 2020-03-03 | 2021-06-29 | Randaemon Sp. Z O.O. | Method and apparatus for tritium-based true random number generator |
WO2021178021A1 (en) * | 2020-03-03 | 2021-09-10 | Randaemon, Sp. Z O.O. | Method and apparatus for tritium-based true random number generator |
US11249725B1 (en) | 2021-07-22 | 2022-02-15 | Randaemon Sp. Zo.O. | Method and apparatus for highly effective on-chip true random number generator utilizing beta decay |
US11281432B1 (en) | 2021-07-22 | 2022-03-22 | Randaemon Sp. Z O.O. | Method and apparatus for true random number generator based on nuclear radiation |
US11567734B1 (en) | 2021-10-22 | 2023-01-31 | Randaemon Sp. Z O.O. | Method and apparatus for highly effective on-chip quantum random number generator |
US11586421B2 (en) | 2021-07-22 | 2023-02-21 | Randaemon Sp. Z O.O. | Method for making cost-effective nickel-63 radiation source for true random number generators |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102483374B1 (en) * | 2018-05-11 | 2022-12-30 | 한국전자통신연구원 | Apparatus and method for generating quantum random number |
KR102372740B1 (en) * | 2019-04-09 | 2022-03-14 | 한국전자통신연구원 | Random number generating device and operating method of the same |
US11474790B2 (en) | 2020-03-18 | 2022-10-18 | Real Random IP, LLC | Electromechanical apparatus, system, and method for generating true random numbers |
US11385865B2 (en) | 2020-03-18 | 2022-07-12 | Real Random IP, LLC | Electromechanical apparatus, system, and method for generating true random numbers |
WO2023001937A1 (en) | 2021-07-22 | 2023-01-26 | Randaemon Sp. Z O.O. | Method for making cost-effective nickel-63 radiation source for true random number generators |
WO2024042403A1 (en) | 2022-08-25 | 2024-02-29 | Randaemon Sp. Z O.O. | Method and apparatus for highly effective on-chip quantum random number generator |
CN115685301B (en) * | 2023-01-04 | 2023-04-07 | 中创智科(绵阳)科技有限公司 | Explosion-proof tritium concentration measuring instrument |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3445591A (en) | 1966-01-04 | 1969-05-20 | Dale R Koehler | Generator of mathematically random entities |
US3790768A (en) | 1972-09-28 | 1974-02-05 | Prayfel Inc | Random number generator |
US4527798A (en) | 1981-02-23 | 1985-07-09 | Video Turf Incorporated | Random number generating techniques and gaming equipment employing such techniques |
US4855690A (en) | 1987-08-10 | 1989-08-08 | Dallas Semiconductor Corporation | Integrated circuit random number generator using sampled output of variable frequency oscillator |
US4905176A (en) | 1988-10-28 | 1990-02-27 | International Business Machines Corporation | Random number generator circuit |
DE4010305A1 (en) | 1990-03-30 | 1991-10-02 | Gao Ges Automation Org | RANDOM NUMBER GENERATOR |
US5570307A (en) | 1995-01-06 | 1996-10-29 | Vlsi Technology, Inc. | Digital randomizer for on-chip generation and storage of random self-programming data block |
US5732138A (en) | 1996-01-29 | 1998-03-24 | Silicon Graphics, Inc. | Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic system |
EP0828349A1 (en) | 1996-08-06 | 1998-03-11 | AMERSHAM INTERNATIONAL plc | Method of and apparatus for generating random numbers |
WO1998033075A2 (en) | 1997-01-13 | 1998-07-30 | Sage Technology, Incorporated | Random number generator based on directional randomness associated with naturally occurring random events, and method therefor |
US6249009B1 (en) | 1997-06-16 | 2001-06-19 | Hong J. Kim | Random number generator |
US6107619A (en) | 1997-07-14 | 2000-08-22 | California Institute Of Technology | Delta-doped hybrid advanced detector for low energy particle detection |
GB9803055D0 (en) * | 1998-02-12 | 1998-04-08 | Nycomed Amersham Plc | Method of and apparatus for generating random numbers |
EA003160B1 (en) | 1998-12-18 | 2003-02-27 | Дзе Риджентс Оф Дзе Юниверсити Оф Калифорния | A RANDOM NUMBER GENERATOR BASED ON THE SPONTANEOUS alpha-DECAY |
US6539410B1 (en) | 1999-03-17 | 2003-03-25 | Michael Jay Klass | Random number generator |
US6430170B1 (en) | 1999-05-27 | 2002-08-06 | Qualcomm Inc. | Method and apparatus for generating random numbers from a communication signal |
JP2001117756A (en) * | 1999-10-20 | 2001-04-27 | Iwaki Electronics Corp | Random pulse generator and random number generation device and probability generation device utilizing the random number generator |
JP3480822B2 (en) | 1999-11-02 | 2003-12-22 | 斎藤 威 | Thermal noise random pulse generator and random number generator |
US6687721B1 (en) | 2000-03-31 | 2004-02-03 | Intel Corporation | Random number generator with entropy accumulation |
WO2002037260A1 (en) | 2000-10-24 | 2002-05-10 | Hmi Co., Ltd. | Random number generator |
US8001054B1 (en) | 2001-07-10 | 2011-08-16 | American Express Travel Related Services Company, Inc. | System and method for generating an unpredictable number using a seeded algorithm |
US7031991B2 (en) | 2002-04-17 | 2006-04-18 | Koninklijke Philips Electronics N.V. | Hadamard-transform on-line randomness test |
JP4299064B2 (en) | 2003-06-19 | 2009-07-22 | 啓明 三頭 | Manufacturing method of sealed 210Pb-210Poα radiation source (α particle emitter) |
EP1755033B1 (en) | 2004-05-24 | 2013-12-11 | Leisure Electronics Technology Co., Ltd. | Random number extraction method and random number generation device using the same |
TWI408903B (en) | 2004-06-30 | 2013-09-11 | Noriyoshi Tsuyuzaki | Random pulse generation source, and semiconductor device, method and program for generating random number and/or probability using the source |
TWI496075B (en) * | 2010-06-03 | 2015-08-11 | Univ Michigan | Randomized value generation |
US9335972B2 (en) | 2013-11-29 | 2016-05-10 | The Regents Of The University Of Michigan | True random number generator |
US10664238B2 (en) * | 2017-01-27 | 2020-05-26 | The Research Foundation For The State University Of New York | Quantum true random number generator |
-
2019
- 2019-02-12 US US16/273,365 patent/US10430161B1/en active Active
- 2019-02-13 EP EP19847508.9A patent/EP3776179B1/en active Active
- 2019-02-13 WO PCT/US2019/017748 patent/WO2020033002A1/en unknown
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11048478B1 (en) | 2020-03-03 | 2021-06-29 | Randaemon Sp. Z O.O. | Method and apparatus for tritium-based true random number generator |
WO2021178021A1 (en) * | 2020-03-03 | 2021-09-10 | Randaemon, Sp. Z O.O. | Method and apparatus for tritium-based true random number generator |
US11249725B1 (en) | 2021-07-22 | 2022-02-15 | Randaemon Sp. Zo.O. | Method and apparatus for highly effective on-chip true random number generator utilizing beta decay |
US11281432B1 (en) | 2021-07-22 | 2022-03-22 | Randaemon Sp. Z O.O. | Method and apparatus for true random number generator based on nuclear radiation |
US11586421B2 (en) | 2021-07-22 | 2023-02-21 | Randaemon Sp. Z O.O. | Method for making cost-effective nickel-63 radiation source for true random number generators |
US11614921B2 (en) | 2021-07-22 | 2023-03-28 | Randaemon Sp. Z O.O. | Method and apparatus for highly effective on- chip quantum random number generator |
US11567734B1 (en) | 2021-10-22 | 2023-01-31 | Randaemon Sp. Z O.O. | Method and apparatus for highly effective on-chip quantum random number generator |
Also Published As
Publication number | Publication date |
---|---|
EP3776179B1 (en) | 2022-04-27 |
EP3776179A1 (en) | 2021-02-17 |
US10430161B1 (en) | 2019-10-01 |
WO2020033002A1 (en) | 2020-02-13 |
EP3776179A4 (en) | 2021-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10430161B1 (en) | Apparatus, systems, and methods comprising tritium random number generator | |
WO2021178021A1 (en) | Method and apparatus for tritium-based true random number generator | |
US11048478B1 (en) | Method and apparatus for tritium-based true random number generator | |
Ahmed | Physics and engineering of radiation detection | |
Silari et al. | Intercomparison of radiation protection devices in a high-energy stray neutron field. Part III: Instrument response | |
JP2015521372A (en) | Solid-state radiation detector with enhanced sensitivity to gamma rays | |
Moreno et al. | System for measurement of low yield neutron pulses from D–D fusion reactions based upon a 3He proportional counter | |
Totani | A failed Gamma-Ray Burst with dirty energetic jets spirited away? New implications for the Gamma-Ray Burst-supernova connection from SN 2002ap | |
Cikhardt et al. | Neutron spectrum measured by activation diagnostics in deuterium gas-puff experiments on the 3 MA GIT-12 Z-pinch | |
O'Mara | Retrospective Dosimetry for Nuclear Nonproliferation and Emergency Response | |
Dehning et al. | LHC beam loss detector design: Simulation and measurements | |
BAJO et al. | 81Kr‐Kr age and multiple cosmic‐ray exposure history of the Vaca Muerta mesosiderite | |
Kandlakunta | A Proof-of-Principle Investigation for a Neutron-Gamma Discrimination Technique in a Semiconductor Neutron Detector | |
Iwahashi et al. | Heavy ion and proton irradiation of gas electron multipliers with liquid crystal polymer insulator: evaluation tests for use in space | |
Lamotte et al. | Heavy-ions induced scintillation experiments | |
Segui et al. | Micromegas for beam loss monitoring | |
JP7373035B2 (en) | Boron trifluoride as a quench gas for neutron proportional counters | |
Bergmann et al. | Angular correlation function of the hypersatellite-satellite x-ray cascade following K-shell electron capture of Fe 55 | |
Hutchins | The area radiation gamma and neutron origin telemetry system | |
Savvidis | Sensor characterization and fiducial volume studies for the NEWS-G dark matter experiment | |
Downen | The Study of 29si (p, γ) 30p and Its Impact on Classical Nova Nucleosynthesis | |
Foxe et al. | Conceptual silicon beta cell design | |
Glebov et al. | Carbon activation diagnostic for tertiary neutron measurements | |
ANDOLA | INVESTIGATIONS ON Z-PINCH DEVICES FOR PULSED RADIOGRAPHY AND MATERIAL CHARACTERIZATION | |
Ravotti | AIDA-2020 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: MICROENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO MICRO (ORIGINAL EVENT CODE: MICR); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Free format text: ENTITY STATUS SET TO MICRO (ORIGINAL EVENT CODE: MICR); ENTITY STATUS OF PATENT OWNER: MICROENTITY Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: MICROENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: RANDAEMON SP. Z O.O., POLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TATARKIEWICZ, JAN JAKUB;REEL/FRAME:054656/0213 Effective date: 20201215 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |