Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Australian Information Security Management Conference

Analytics

Articles 1 - 1 of 1

Full-Text Articles in Information Security

Celestial Sources For Random Number Generation, Erin Chapman, Jerina Grewar, Tim Natusch Jan 2016

Celestial Sources For Random Number Generation, Erin Chapman, Jerina Grewar, Tim Natusch

Australian Information Security Management Conference

In this paper, we present an alternative method of gathering seed data for random number generation (RNG) in cryptographic applications. Our proposed method utilises the inherent randomness of signal data from celestial sources in radio astronomy to provide seeds for RNG. The data sets were collected from two separate celestial sources, and run through the SHA-256 algorithm to deskew the data and produce random numbers with a uniform distribution. The resulting data sets pass all tests in the NIST Statistical Test Suite for random data, with a mean of 98.9% of the 512 total bitstreams from the two sources passing …