Knowledge

Applications of randomness

Source đź“ť

547:(i.e., unpredictability) to any attacker, thus increasing attack difficulty. With keys having low entropy (i.e., relatively easily guessable by attackers), security is likely to be compromised. To illustrate, imagine if a simple 32 bit linear congruential pseudo-random number generator of the type supplied with most programming languages (e.g., as the 'rand' or 'rnd' function) is used as a source of keys. There will only be some four billion possible values produced before the generator repeats itself. A suitably motivated adversary could simply test them all; this is practical as of 2010, using readily available computers. Even if a linear congruential RNG is used with 1000-bit parameters, it is a simple exercise in linear algebra to recover the modulus m, and the constants a and b, where x' = ax +b (mod m), given only five consecutive values. Even if a better random number generator is used, it might be insecure (e.g., the 258:, where mechanical reels seem to spin on the screen, the reels are actually spinning for entertainment value only. They eventually stop exactly where the machine's software decided they would stop when the handle was first pulled. It has been alleged that some gaming machines' software is deliberately biased to prevent true randomness, in the interests of maximizing their owners' revenue; the history of biased machines in the gambling industry is the reason government inspectors attempt to supervise the machines—electronic equipment has extended the range of supervision. Some thefts from casinos have used clever modifications of internal software to bias the outcomes of the machines—at least in those which have been discovered. Gambling establishments keep close track of machine payouts in an attempt to detect such alterations. 625:. All are available to an enterprising attacker. Put another way, in cryptography, random bit streams need to be not only random, but also secret and hence unpredictable. Public or third-party sources of random values, or random values computed from publicly observable phenomena (weather, sports game results, stock prices), are almost never cryptographically acceptable. Their use may be tempting, but in reality, they permit easier attacks than attacking the cryptography. 32: 577:
For cryptographic purposes, one normally assumes some upper limit on the work an adversary can do (usually this limit is astronomically sized). If one has a pseudo-random number generator whose output is "sufficiently difficult" to predict, one can generate true random numbers to use as the initial
449:
from an astronomical source and then analyze the result for periodic signals. Since random noise can be expected to appear to have faint periodic signals embedded in it, statistical analysis is required to determine the likelihood that a detected signal actually represents a genuine signal. Such
645:
An example of a need for randomness sometimes occurs in arranging items in an art exhibit. Usually this is avoided by using a theme. As John Cage pointed out, "While there are many ways that sounds might be produced , few are attempted". Similarly, the arrangement of art in exhibits is often
298:
to be essentially undemocratic. This was because citizens chosen on merit or popularity contradicted the democratic equality of all citizenry. In addition, allotment prevented the corrupt practice of buying votes as no one could know who would be selected as a magistrate, or to sit on a
641:
Some aesthetic theories claim to be based on randomness in one way or another. Little testing is done in these situations, and so claims of reliance on and use of randomness are generally poorly based in definite theory and more on an impression of randomness from technical fields.
646:
deliberately non-random. One case of this was Hitler's attempt to portray modern art in the worst possible light by arranging works in worst possible manner. A case can be made for trying to make art in the worst possible way; i.e., either as
555:, forcing the authors to quickly find a source of "more random" random numbers.) For these applications, truly random numbers are ideal, and very high quality pseudo-random numbers are necessary if truly random numbers, such as coming from a 695:
Now I, as the author of this novel might have them set upon by thieves, or I might have them rest by a tree until the rain stops, but in fact they kept on walking and then near night-fall they could see the light of an inn in the distance.
632:
at most, slow random number generators serve well—if they are actually random. This use of random generators is important; many informed observers believe every computer should have a way to generate true random numbers.
594:"truerand"). As with all cryptographic software, there are subtle issues beyond those discussed here, so care is certainly indicated in actual practice. In any case, it is sometimes impossible to avoid the need for true (i.e., 466:
of real phenomena are commonly used. When the real phenomena are affected by unpredictable processes, such as radio noise or day-to-day weather, these processes can be simulated using random or pseudo-random numbers.
700:
Diderot was making the point that the novel (then a recent introduction to European literature) seemed random (in the sense of being invented out of thin air by the author, not in a modern technical sense). See also
656:, as well as many other movements in art and letters, has attempted to accommodate and acknowledge randomness in various ways. Often people mistake order for randomness based on lack of information; e.g., 243:. Electronic gambling equipment cannot use these and so theoretical problems are less easy to avoid; methods of creating them are sometimes regulated by governmental gaming commissions. 202:. For example, applications in cryptography usually have strict requirements, whereas other uses (such as generating a "quote of the day") can use a looser standard of pseudorandomness. 579: 508:
in an attempt to predict the scope of an event in near future. The intent is to prove that large-scale events that are about to happen build up a "pressure" which affects the RNGs.
1086: 1037: 450:
analysis methods requires the generation of random numbers. If the statistical method is extremely sensitive to patterns in the data (such as those used to search for binary
1035:
Pluchino, A.; Garofalo, C.; Rapisarda, A.; Spagano, S.; Caserta, M. (2011). "Accidental Politicians: How Randomly Selected Legislators Can Improve Parliament Efficiency".
578:
value (i.e., the seed), and then use the pseudo-random number generator to produce numbers for use in cryptographic applications. Such random number generators are called
570:
algorithm. Furthermore, those random sequences cannot be reused and must never become available to any attacker, which implies a continuously operable generator. See
551:
might be guessable), producing predictable keys and reducing security to nil. (A vulnerability of this sort was famously discovered in an early release of
261:
Random draws are often used to make a decision where no rational or fair basis exists for making a deterministic decision, or to make unpredictable moves.
49: 327:. Proposals have been made for its use in government such as a new constitution for Iraq and various proposals for Upper Houses chosen by allotment—see 390:. Many elements of statistical practice depend on randomness via random numbers. Where those random numbers fail to be actually random, any subsequent 1084:
Caserta, Maurizio; Pluchino, Alessandro; Rapisarda, Andrea; Spagano, Salvatore (2021). "Why lot? How sortition could help representative democracy".
493:. More complicated situations are simulation of population genetics, or the behaviour of sub-atomic particles. Such simulation methods, often called 773:
Other examples include selecting, or generating, a "Random Quote of the Day" for a website, or determining which way a villain might move in a
664:'s abstractions (e.g., "For E.M."). Thus, in some theories of art, all art is random in that it's "just paint and canvas" (the explanation of 929:
Carson, Lyn (2006). "Avoiding Ghettos of Like-Minded People: Random Selection and Organizational Collaboration". In Schuman, Sandy (ed.).
96: 1189: 68: 1140: 902: 115: 75: 956:
Carson, Lyn; Lubensky, Ron (May 2009). "Appointments to Boards and Committees via Lottery, A Pathway to Fairness and Diversity".
595: 556: 505: 986: 938: 857: 53: 82: 199: 544: 501: 328: 880:"... it is thought to be democratic for the offices to be assigned by lot, for them to be elected is oligarchic." 286:(literally meaning "rule by the people") was actually run by the people: administration was in the hands of committees 64: 407: 160: 1006: 622: 591: 195: 191: 164: 471: 403: 356: 251: 232: 42: 282:(equality of political rights), and random selection was a principal way of achieving this fairness. Greek 671:
Similarly, the "unexpected" ending is part of the nature of interesting literature. An example of this is
614: 706: 582:, and several have been implemented (for example, the /dev/urandom device available on most Unixes, the 520:, which underlies most of the schemes which attempt to provide security in modern communications (e.g., 89: 562:
Truly random numbers are absolutely required to be assured of the theoretical security provided by the
331:. Scholars have studied the potential of random selection of personnel in politics and organizations. 1095: 1056: 845: 536: 474:
were first constructed to carry out computer simulation of physical phenomena, notably simulation of
463: 445:
in physics rely on a statistical analysis of their output. For example, an experiment might collect
895:
The Political Potential of Sortition: A Study of the Random Selection of Citizens for Public Office
735: 661: 529: 430: 426: 352: 344: 1132: 1111: 1072: 1046: 1023: 552: 540: 494: 411: 399: 383: 360: 275: 398:. Elements of statistical practice that depend on randomness include: choosing a representative 574:
for an example of what happens when these requirements are violated when using a one-time pad.
1146: 1136: 992: 982: 944: 934: 933:. Jossey-Bass Business & Management Series. San Francisco: Jossey-Bass. pp. 419–434. 908: 898: 863: 853: 808: 796: 759: 606: 475: 291: 182:, which leads to the use of different methods. Mathematically, there are distinctions between 156: 1128: 1103: 1064: 1015: 965: 792: 739: 727: 722: 583: 290:
from the people and regularly changed. Although it may seem strange to those used to modern
187: 168: 931:
Creating a Culture Of Collaboration: The International Association of Facilitators Handbook
183: 763: 731: 702: 657: 521: 479: 395: 1099: 1060: 785: 587: 525: 490: 367: 240: 605:
published random sequence is a poor choice, as are such sequences as the digits in an
1183: 1115: 1027: 850:
The Athenian Democracy in the Age of Demosthenes: Structure, Principles, and Ideology
774: 751: 672: 324: 1076: 665: 610: 563: 517: 371: 255: 144: 1107: 1068: 548: 497:
methods, have many applications in computer simulation of real-world processes.
348: 179: 172: 31: 750:
Random numbers are also used in situations where "fairness" is approximated by
1019: 1004:
Pek, Simon (2019). "Rekindling Union Democracy Through the Use of Sortition".
567: 486: 442: 391: 387: 216: 148: 140: 128: 20: 1150: 912: 996: 948: 867: 832: 789: 717: 312: 295: 287: 283: 224: 897:. The Luck of the Draw. Exeter, UK; Charlottesville, VA: Imprint Academic. 647: 418: 279: 236: 220: 152: 813: 653: 454:), very large amounts of data with no recognizable pattern are needed. 422: 340: 132: 504:, monitor fluctuations in the randomness of numbers generated by many 691:). At one point in the novel, Diderot speaks directly to the reader: 571: 451: 247: 215:
Unpredictable (by the humans involved) numbers (usually taken to be
1174: 969: 1051: 767: 755: 713: 489:
of statistical events, a very simple example being the outcome of
446: 316: 300: 254:
which decide the outcome of a trial in the game. Even in modern
228: 16:
Uses of an apparent lack of pattern or predictability in events
1125:
The Luck of the Draw: The Role of Lotteries in Decision-Making
629: 136: 25: 628:
Since most cryptographic applications require a few thousand
852:. The Ancient World. Oxford, UK; Cambridge, MA: Blackwell. 618: 320: 329:
Reform of the House of Lords § Allotment (sortition)
580:
cryptographically secure pseudo-random number generators
363:
in physics and computer science require random numbers.
516:
A ubiquitous use of unpredictable random numbers is in
770:
commands the Israelites to apportion the land by lot.
1169: 1087:
Physica A: Statistical Mechanics and its Applications
1038:
Physica A: Statistical Mechanics and its Applications
601:
Since a requirement in cryptography is high entropy,
539:, it is best that they select a random number as the 355:. Many methods of statistical analysis, such as the 219:numbers) were first investigated in the context of 56:. Unsourced material may be challenged and removed. 402:of the population being examined, disguising the 693: 239:wheels, seem to have been developed for use in 223:developing, sometimes, pathological forms like 1127:. Oxford; New York: Oxford University Press. 485:Pseudo-random numbers are frequently used in 8: 500:Some more speculative projects, such as the 386:which is, itself, founded on the concept of 462:In many scientific and engineering fields, 1133:10.1093/acprof:oso/9780199756100.001.0001 1050: 163:helps scientists to test hypotheses, and 116:Learn how and when to remove this message 888: 886: 19:For broader coverage of this topic, see 825: 535:For example, if a user wants to use an 566:— the only provably unbreakable 319:in Anglo-Saxon legal systems like the 7: 315:, is today used in the selection of 178:These uses have different levels of 54:adding citations to reliable sources 977:Carson, Lyn; Martin, Brian (1999). 421:(for determining samples - such as 406:of a study from a participant (see 227:. Many randomizing devices such as 689:Jacques the Servant and his Master 14: 784:are also closely associated with 506:hardware random number generators 417:These applications are useful in 382:Statistical practice is based on 366:Random numbers are often used in 294:, the Athenian Greeks considered 155:, and other fields. For example, 1175:https://flipcoins.net/en/numbers 557:hardware random number generator 429:(for example in the creation of 359:method, require random numbers. 250:games contain often one or more 30: 543:. The selection must have high 41:needs additional citations for 200:pseudorandom number generators 1: 650:, or as actually random art. 278:developed out of a notion of 979:Random Selection in Politics 598:) random number generators. 502:Global Consciousness Project 339:Random numbers have uses in 161:randomized controlled trials 65:"Applications of randomness" 1108:10.1016/j.physa.2020.125430 1069:10.1016/j.physa.2011.06.028 683:; sometimes referred to as 408:randomized controlled trial 1206: 1190:Applications of randomness 1007:Journal of Business Ethics 592:AT&T Bell Laboratories 18: 1020:10.1007/s10551-017-3526-2 981:. Westport, CT: Praeger. 958:Journal of Public Affairs 637:Literature, music and art 394:analysis may suffer from 171:help video games such as 760:military draft lotteries 472:random number generators 345:electronic noise studies 252:random number generators 196:random number generators 893:Dowlen, Oliver (2008). 311:Allotment, also called 233:shuffling playing cards 698: 615:transcendental numbers 1123:Stone, Peter (2011). 846:Hansen, Mogens Herman 707:Theatre of the Absurd 590:designs, server, and 194:, as well as between 1045:(21–22): 3944–3954. 754:, such as selecting 685:Jacques the Fatalist 677:Jacques le fataliste 537:encryption algorithm 464:computer simulations 378:Statistical sampling 169:pseudorandom numbers 50:improve this article 1100:2021PhyA..56525430C 1061:2011PhyA..390.3944P 736:indeterminate music 662:Helen Frankenthaler 660:'s drip paintings, 559:, are unavailable. 530:electronic commerce 431:double-blind trials 427:experimental design 361:Monte Carlo methods 353:operations research 188:pseudorandomization 797:sorting algorithms 720:'s chance-derived 681:James the Fatalist 553:Netscape Navigator 384:statistical theory 276:Athenian democracy 270:Athenian democracy 246:Modern electronic 192:quasirandomization 1170:http://random.org 809:Black swan theory 607:irrational number 476:neutron transport 292:liberal democracy 274:Fifth century BC 157:random assignment 131:has many uses in 126: 125: 118: 100: 1197: 1157: 1154: 1119: 1080: 1054: 1031: 1014:(4): 1033–1051. 1000: 973: 952: 923: 917: 916: 890: 881: 878: 872: 871: 842: 836: 830: 788:and in creating 780:Weaker forms of 740:generative music 728:stochastic music 723:Music of Changes 121: 114: 110: 107: 101: 99: 58: 34: 26: 1205: 1204: 1200: 1199: 1198: 1196: 1195: 1194: 1180: 1179: 1166: 1161: 1160: 1143: 1122: 1083: 1034: 1003: 989: 976: 955: 941: 928: 924: 920: 905: 892: 891: 884: 879: 875: 860: 844: 843: 839: 831: 827: 822: 805: 786:hash algorithms 764:Book of Numbers 748: 732:aleatoric music 703:Eugenio Montale 658:Jackson Pollock 639: 522:confidentiality 514: 480:nuclear fission 460: 439: 396:systematic bias 380: 337: 309: 307:Modern politics 272: 267: 241:games of chance 213: 208: 122: 111: 105: 102: 59: 57: 47: 35: 24: 17: 12: 11: 5: 1203: 1201: 1193: 1192: 1182: 1181: 1178: 1177: 1172: 1165: 1164:External links 1162: 1159: 1158: 1156: 1155: 1141: 1120: 1081: 1032: 1001: 987: 974: 970:10.1002/pa.317 953: 939: 918: 903: 882: 873: 858: 837: 824: 823: 821: 818: 817: 816: 811: 804: 801: 747: 744: 712:Randomness in 638: 635: 596:hardware-based 526:authentication 513: 510: 491:tossing a coin 459: 456: 438: 435: 379: 376: 368:parapsychology 336: 333: 308: 305: 271: 268: 266: 263: 212: 209: 207: 204: 165:random numbers 124: 123: 38: 36: 29: 15: 13: 10: 9: 6: 4: 3: 2: 1202: 1191: 1188: 1187: 1185: 1176: 1173: 1171: 1168: 1167: 1163: 1152: 1148: 1144: 1142:9780199756100 1138: 1134: 1130: 1126: 1121: 1117: 1113: 1109: 1105: 1101: 1097: 1093: 1089: 1088: 1082: 1078: 1074: 1070: 1066: 1062: 1058: 1053: 1048: 1044: 1040: 1039: 1033: 1029: 1025: 1021: 1017: 1013: 1009: 1008: 1002: 998: 994: 990: 984: 980: 975: 971: 967: 963: 959: 954: 950: 946: 942: 936: 932: 927: 926: 925:For example: 922: 919: 914: 910: 906: 904:9781845401795 900: 896: 889: 887: 883: 877: 874: 869: 865: 861: 855: 851: 847: 841: 838: 834: 829: 826: 819: 815: 812: 810: 807: 806: 802: 800: 798: 794: 791: 787: 783: 778: 776: 775:computer game 771: 769: 765: 761: 757: 753: 752:randomization 745: 743: 741: 737: 733: 729: 725: 724: 719: 715: 710: 708: 704: 697: 692: 690: 686: 682: 678: 674: 673:Denis Diderot 669: 667: 663: 659: 655: 651: 649: 643: 636: 634: 631: 626: 624: 620: 616: 612: 608: 604: 599: 597: 593: 589: 585: 581: 575: 573: 569: 565: 560: 558: 554: 550: 546: 542: 538: 533: 531: 527: 523: 519: 511: 509: 507: 503: 498: 496: 492: 488: 483: 481: 477: 473: 468: 465: 457: 455: 453: 448: 444: 436: 434: 432: 428: 424: 420: 415: 413: 409: 405: 401: 397: 393: 389: 385: 377: 375: 373: 370:as a test of 369: 364: 362: 358: 354: 350: 346: 342: 334: 332: 330: 326: 325:United States 322: 318: 314: 306: 304: 302: 297: 293: 289: 285: 281: 277: 269: 265:Political use 264: 262: 259: 257: 256:slot machines 253: 249: 244: 242: 238: 234: 230: 226: 222: 218: 210: 205: 203: 201: 197: 193: 189: 185: 184:randomization 181: 176: 174: 170: 166: 162: 158: 154: 150: 146: 142: 138: 134: 130: 120: 117: 109: 98: 95: 91: 88: 84: 81: 77: 74: 70: 67: â€“  66: 62: 61:Find sources: 55: 51: 45: 44: 39:This article 37: 33: 28: 27: 22: 1124: 1091: 1085: 1042: 1036: 1011: 1005: 978: 964:(2): 87–94. 961: 957: 930: 921: 894: 876: 849: 840: 828: 781: 779: 772: 749: 721: 711: 699: 694: 688: 684: 680: 679:(literally: 676: 670: 666:Frank Stella 652: 644: 640: 627: 609:such as the 602: 600: 576: 564:one-time pad 561: 534: 518:cryptography 515: 512:Cryptography 499: 484: 469: 461: 440: 416: 414:simulation. 381: 372:precognition 365: 338: 310: 273: 260: 245: 214: 180:requirements 177: 145:cryptography 127: 112: 103: 93: 86: 79: 72: 60: 48:Please help 43:verification 40: 613:or even in 443:experiments 412:Monte Carlo 392:statistical 349:engineering 173:video poker 1094:: 125430. 988:0275967026 940:0787981168 859:0631138226 820:References 782:randomness 746:Other uses 668:'s work). 568:encryption 495:stochastic 487:simulation 470:Automatic 458:Simulation 388:randomness 206:Early uses 141:statistics 129:Randomness 76:newspapers 21:Randomness 1151:664352650 1116:229495274 1052:1103.1224 1028:157605321 913:213307148 833:Herodotus 793:searching 790:amortized 766:(33:54), 762:. In the 718:John Cage 716:includes 675:'s novel 532:, etc.). 357:bootstrap 313:sortition 296:elections 284:democracy 225:apophenia 1184:Category 997:41184996 949:70659897 868:22809482 848:(1991). 803:See also 648:anti-art 617:such as 437:Analysis 423:invoices 419:auditing 404:protocol 343:such as 288:allotted 280:isonomia 237:roulette 221:gambling 153:gambling 106:May 2020 1096:Bibcode 1077:2928707 1057:Bibcode 814:Flipism 654:Dadaism 588:Fortuna 545:entropy 452:pulsars 341:physics 335:Science 133:science 90:scholar 1149:  1139:  1114:  1075:  1026:  995:  985:  947:  937:  911:  901:  866:  856:  756:jurors 584:Yarrow 572:Venona 447:X-rays 425:) and 410:) and 400:sample 351:, and 317:jurors 248:casino 235:, and 217:random 190:, and 149:gaming 92:  85:  78:  71:  63:  1112:S2CID 1073:S2CID 1047:arXiv 1024:S2CID 768:Moses 738:, or 714:music 621:, or 441:Many 211:Games 97:JSTOR 83:books 1147:OCLC 1137:ISBN 993:OCLC 983:ISBN 945:OCLC 935:ISBN 909:OCLC 899:ISBN 864:OCLC 854:ISBN 835:3.80 795:and 758:and 630:bits 586:and 549:seed 323:and 301:jury 229:dice 198:and 69:news 1129:doi 1104:doi 1092:565 1065:doi 1043:390 1016:doi 1012:155 966:doi 687:or 603:any 541:key 478:in 433:). 167:or 159:in 137:art 52:by 1186:: 1145:. 1135:. 1110:. 1102:. 1090:. 1071:. 1063:. 1055:. 1041:. 1022:. 1010:. 991:. 960:. 943:. 907:. 885:^ 862:. 799:. 777:. 742:. 734:, 730:, 726:, 709:. 705:, 528:, 524:, 482:. 374:. 347:, 321:UK 303:. 231:, 186:, 175:. 151:, 147:, 143:, 139:, 135:, 1153:. 1131:: 1118:. 1106:: 1098:: 1079:. 1067:: 1059:: 1049:: 1030:. 1018:: 999:. 972:. 968:: 962:9 951:. 915:. 870:. 623:e 619:Ď€ 611:φ 119:) 113:( 108:) 104:( 94:· 87:· 80:· 73:· 46:. 23:.

Index

Randomness

verification
improve this article
adding citations to reliable sources
"Applications of randomness"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Randomness
science
art
statistics
cryptography
gaming
gambling
random assignment
randomized controlled trials
random numbers
pseudorandom numbers
video poker
requirements
randomization
pseudorandomization
quasirandomization
random number generators
pseudorandom number generators

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑