[go: up one dir, main page]

US20050190913A1 - Random number generation apparatus and randon number generation method - Google Patents

Random number generation apparatus and randon number generation method Download PDF

Info

Publication number
US20050190913A1
US20050190913A1 US11/105,376 US10537605A US2005190913A1 US 20050190913 A1 US20050190913 A1 US 20050190913A1 US 10537605 A US10537605 A US 10537605A US 2005190913 A1 US2005190913 A1 US 2005190913A1
Authority
US
United States
Prior art keywords
random number
gray scale
binary
image
pixel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/105,376
Inventor
Takuya Wada
Yoshihiro Tsukamura
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/105,376 priority Critical patent/US20050190913A1/en
Publication of US20050190913A1 publication Critical patent/US20050190913A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/582Pseudo-random number generators

Definitions

  • the present invention relates to a random number generation apparatus and a random number generation method for generating a random number sequence.
  • a random number sequence generated by the aforementioned methods inevitably has a regularity and its periodicity is a short. Accordingly, it is not proper to use such a random number sequence for generating an encryption key and a seed for generating an encryption key or for encryption of a message.
  • the random number generation apparatus includes: pick-up means, digital image conversion means for converting into a digital image a pick-up signal output from the pick-up means, storage means for storing the digital image as pixel values, and random number generating means for extracting a digital data from pixel values of a plurality of pixels in the digital image of the pick-up signal output when no subject is present from the pick-up means stored in the storage means and generating a random number from the digital data correlated to the plurality of pixels.
  • a pick-up signal output from the pick-up means is converted into a digital image by the digital image conversion means and pixel values of the digital image are stored in the storage means.
  • the random number generating apparatus extracts a digital data from pixel values of a plurality of pixels within the digital image of the pick-up signal output when no subject is present from the pick-up means stored in the storage means, so that the random number generation means generates a random number from the digital data correlated to the plurality of pixels.
  • the random number generated by the random number generating apparatus Since there is no regularity in the pixel values of the respective pixels of the digital image obtained when no subject is present, the random number generated by the random number generating apparatus has a long periodicity.
  • a pick-up signal output from the pick-up means when no subject is present is converted into a digital image and a digital data is extracted from pixel values of a plurality of pixels within the digital image, so that a random number is generated from the digital data correlated to the plurality of pixels.
  • the random number generated by the random number generating method Since there is no regularity in the pixel values of the respective pixels of the digital image obtained when no subject is present, the random number generated by the random number generating method has a long periodicity.
  • FIG. 1 is a block diagram showing a fingerprint identification apparatus including a random number generation apparatus according to the present invention as an encryption block.
  • FIG. 2 is a block diagram showing a configuration of a pick-up block of the aforementioned fingerprint identification apparatus.
  • FIG. 3 shows a binary image of a fingerprint obtained in the aforementioned fingerprint identification apparatus.
  • FIG. 4 shows an image made up by the least significant one bit of the gray scale image of the fingerprint obtained in the aforementioned fingerprint identification apparatus.
  • FIG. 5 is a flowchart showing a random number generation step, a prime number generation step, and a key generation step.
  • FIG. 6 is a block diagram showing a binary image generator in an image processing block of the aforementioned fingerprint identification apparatus.
  • this embodiment is a fingerprint identification apparatus including an A/D converter 1 , an encryption block 2 having a random number generator 3 and encryption means 4 , a CPU 5 , a memory 6 , an interface block 7 , and a fingerprint identifier 8 .
  • the A/D converter 1 , the random number generator 3 , and the memory 6 constitute an example of configuration of a random number generation apparatus according to the present invention.
  • the fingerprint identification apparatus constitutes a personal identification apparatus for identifying a person according to a fingerprint image fetched by a pick-up block 10 .
  • this fingerprint identification apparatus when a desired person is identified according to a fingerprint image as a living body information, an encryption key is generated according to a random number sequence generated in the random number generator 3 and a plain text is encrypted.
  • the pick-up block 10 is constructed so as to pick-up a fingerprint as a living body information. More specifically, as shown in FIG. 2 , the pick-up block 10 includes a light source 11 , a prism 12 , and pick-up means 13 .
  • the prism 12 has a triangular cross section.
  • the light from the light source 11 is incident from the first face 12 a , reflected from a subject placed on the second face 12 b , and goes out from the third face 12 c .
  • the subject is a fingerprint of a finger 100 for identifying an individual person.
  • the pick-up means 13 is arranged at a position so as to detect the light emitted from the third face 12 c .
  • the pick-up means 13 is, for example, a CCD (Charge-Coupled Device) camera.
  • the pick-up block 10 having the aforementioned configuration, when the finger 100 is placed on the second face 12 b of the prism 12 , the light emitted from the light source 11 comes into the prism through the first face 12 a and is reflected irregularly by the convex portion of the fingerprint of the finger 100 on the second face 12 b or reflected totally by the concave portion. These reflected lights go out from the third face 12 c and form an image in the pick-up means 13 .
  • the pick-up means 13 the convex portion of the finger 100 is picked up as a dark portion and the concave portion is picked up as a bright portion.
  • the pick-up means 13 outputs a pick-up signal as a pick-up information.
  • the pick-up signal output from the pick-up block 10 is sampled at an appropriate time interval and converted by the A/D converter 1 into a digital image of a size, for example, 256 ⁇ 128.
  • the A/D converter 1 performs an 8-bit conversion.
  • pixel values of the pixels constituting an image are digital data expressed by 256 gradations from 0 to 255.
  • the digital image obtained in this A/D converter 1 is stored in the memory 6 .
  • a digital image whose pixel value is expressed by multiple bits such as 8 bits will be referred to as a gray scale image.
  • the image processor 20 According to the gray scale image, the image processor 20 generates a binary image. For example, the image processor 20 fetches the gray scale image at an appropriate timing and using an appropriate binarization method, generates a binary image in which pixel value of each 8-bit pixel has been converted into ‘0‘or ’1’.
  • the binarization method may be a comparison between an average of pixel values of the entire image and pixel values of the respective pixels or a moving average method, i.e., comparison between a pixel value of a pixel to be considered and an average of pixel values of a plurality of pixels located in a predetermined range from the considered pixel.
  • the fingerprint image picked up in the pick-up block 10 is made into a binary image as shown in FIG. 3 by the moving average method.
  • the black portions represent convex portions of the fingerprint and the white portions represent concave portions of the fingerprint.
  • the binary image thus generated is subjected to a pre-processing such as a thinning and then processes such as registration and identification are performed. It should be noted that the binary image generation from the gray scale image by the aforementioned moving average method will be detailed later.
  • the fingerprint identifier 8 identifies the binary image. For example, the fingerprint identifier 8 identifies a registered image information on the fingerprint information which has been fetched in advance with the binary image of the fingerprint picked up by the pick-up block 10 . According to the identification result in the fingerprint identifier 8 , the fingerprint identification apparatus identifies a desired individual.
  • the CPU 5 is control means for controlling respective components constituting the fingerprint identification apparatus.
  • the fingerprint identification apparatus identifies a fingerprint from a digital image picked up by the pick-up block 10 to identify a desired individual.
  • the fingerprint identification apparatus encrypts a plain text using a private key. This encryption using a private key is performed according to a prime number obtained according to a random number sequence generated by the random number generator 2 .
  • the encryption block 2 causes the random number generator 3 to generate a random number sequence and the encryption means 4 to perform encryption using an encryption key according to the random number sequence.
  • the random number generator 3 is constructed to generate a random number sequence from the aforementioned gray scale image or the binary image, explanation will be given on a case of generating a random number sequence according to a gray scale image.
  • the pick-up block 10 when an image is taken in without placing a finger on the prism 12 , a pick-up signal output from the pick-up means 13 is overlapped with a noise.
  • the least significant bit of the gray scale image obtained by digital conversion in the A/D converter 1 shows a value of irregular ‘0’ or ‘1’.
  • similar irregular values are shown for a binary image. Accordingly, in the gray scale image, it is possible to obtain a random number sequence consisting of ‘0’ and ‘1’ and having an arbitrary length from a bit sequence of an arbitrary length starting at an appropriate position as a start address.
  • the least significant bit ‘0’ represents black and the least significant bit ‘1’ represents white
  • the least significant bits of the gray scale image have no regularity.
  • the encryption block 2 According to the random number sequence obtained by the random number generator 3 , the encryption block 2 generates an encryption key or seed as an origin of the encryption key and performs encryption in the encryption means 4 .
  • the random number generator 3 employs the RSA encryption method to create an encryption key. Explanation will be given on this case.
  • the RSA encryption method creates a 384-bit, 512-bit, or 1024-bit key for encryption.
  • explanation will be given on a case using the 512-bit key.
  • the outline of the RSA encryption method is as follows.
  • Equations (1) and (2) the other public key, i.e., the public key N (modulus) and a private key D (private exponent) will be obtained.
  • N p ⁇ q (1)
  • D E ⁇ 1 mod ⁇ ( p ⁇ 1) ⁇ ( q ⁇ 1) ⁇ (2)
  • the public key E and the multiple of (p ⁇ 1) and (q ⁇ 1) are mutually prime. If a message (plain text) is M and an encrypted message is C, then relations expressed by Equations (3) and (4) are satisfied.
  • C M E mod N (3)
  • M C D mod N (4)
  • the public key N is a very large 512-bit number and it is very difficult to factorize it into prime factors and accordingly, the addressee cannot obtain the previous message M from the encrypted message C unless the addressee knows the private key D.
  • the addresser encrypts the message C having his/her signature using his/her private key D according to Equation (4) when sending the message M.
  • the addressee decodes the message using the public key E and the public key N of the addresser according to Equation (3) and confirms that the signature of the addresser is added.
  • a 512-bit key is required.
  • a random number sequence generated in the random number generator 3 is used for creating such a 512-bit key.
  • Such a 512-bit key can be generated by generation of a random number sequence as follows.
  • the random number generator 3 Since the key length is 512-bits, firstly, the random number generator 3 generates two 256-bit random number. These two random numbers serve as seeds, i.e., initial values for finding two prime numbers.
  • the fingerprint identification apparatus when generating a random number, takes in an image without placing a finger 100 on the prism 12 and obtains a gray scale image as a digital image formed by the A/D converter 1 .
  • the fingerprint identification apparatus stores the gray scale image on memory 6 as having size of 256 pixels in the horizontal direction and 128 pixels in the vertical direction in which each pixel value is expressed by 8 bits. It should be noted that simultaneously with such a gray scale image, the fingerprint identification apparatus fetches a binary image from this gray scale image by the image processor 20 .
  • the fingerprint identification apparatus stores the binary image on memory 6 as having a size of 256 pixels in the horizontal direction and 128 pixels in the vertical direction in which each pixel is expressed by 1 bit.
  • the least significant bits of the pixel value of pixels in the gray scale image have no regularity. Accordingly, by extracting the least significant bits of the pixel values for a plurality of pixels, it is possible to generate a random number having a long periodicity.
  • the random number generator 3 generates a random number by extracting the least significant bits of pixel values of a plurality of pixels constituting a predetermined area starting at a pixel located at a start address.
  • the start address is an information indicating a position of a pixel where the least significant bit extraction is started.
  • pixels are scanned in the horizontal direction starting at the start address so as to extract the least significant bit value of the pixels, i.e., ‘0’ or ‘1’.
  • i for the horizontal direction address
  • j for the vertical direction address
  • an arbitrary point on the gray scale image is defined as g (i, j).
  • the start address is defined as (128, 0) and the 512 pixels are scanned from the pixel g (128, 0) to the pixel g (129, 255) and the least significant bit values are extracted to generate two 256-bit random numbers.
  • a random number by defining a start address at an appropriate position instead of a predetermined position.
  • values from 0 to 127 are expressed by 7 bits. Accordingly, by defining the start address by the horizontal address i and the vertical address j specified by the 8 bits of pixel values of the pixel g (0, 0) and the least significant 7 bits of the pixel values of the pixel g (0, 1), values of the least significant bits of the pixel values of pixels are extracted to generate a random number.
  • the least significant bit of the pixel value of the pixel g (100, 23) is extracted to generate a random number.
  • the least significant bit of the pixel value can be extracted. For example, scan is performed in the vertical direction and the least significant bit of the pixel value is extracted. Moreover, it is possible to perform an exclusive OR operation between two adjacent pixels in the vertical direction to extract a 1-bit data. Alternatively, it is possible to perform an image take-in twice and perform an exclusive OR operation between two images so as to extract a 1-bit data.
  • the random number generator 3 generates a complete random number having a long periodicity by extracting the least significant bit of pixel values of pixels.
  • the encryption means 4 generates two prime number p and q from the two random numbers generated by the random number generator 3 . As shown in FIG. 5 , the encryption means 4 generates an encryption key through a prime number generation process and a key generation process.
  • the encryption means 4 generates a prime number in the prime number generation process of steps S 2 to S 5 . It should be noted that the process described below is performed for each of the two random numbers p and q.
  • step S 2 the encryption means 4 sets the most significant bit and the least significant bit to ‘1’.
  • the random number generated in step S 1 has a length of 256 bits and is an odd number.
  • step S 3 the encryption means 4 performs division of the random number using all the prime numbers smaller than 256 to determine whether the random number can be divided by all the prime numbers without a remainder.
  • the encryption means 4 passes control to step S 4
  • the encryption means 4 passes control to step S 5 .
  • step S 4 the encryption means 4 uses the Rabin-Miller method which is a representative probability prime number checking method so as to further check whether the random number which has been subjected to division tests by all the prime numbers smaller than 256 in step S 3 is a prime number.
  • the number is determined to be a prime number, control is passed to step S 6 , and otherwise, control is passed to step S 5 .
  • step 5 which is performed even if the random number is divided by prime numbers without a remainder in step S 3 , the encryption means 4 subtracts 2 from the value of the random number p (or the random number q). Then, control is passed to step S 3 , where the encryption means 4 again checks whether the random number subtracted by 2 can be divided by all the prime numbers smaller than 256 without a remained so as to perform the aforementioned processes of step S 3 or step S 5 and after.
  • step S 6 as a key generation step, the encryption means 4 fetches a public key N from the aforementioned Equation (1) according to the two prime numbers p and q, and from this public key N and a public key E appropriately selected, obtains a private key D satisfying the aforementioned Equation (2).
  • the encryption means 4 obtains the private key D satisfying the aforementioned Equation (2) by an extended Euclidean algorithm.
  • the random number generated by the random number generation step the most significant bit and the least significant bit are set to ‘1’ in the prime number generation step and the key generation step.
  • the random number has a 256-bit length and is an odd number. This random number is successively divided by all the prime numbers smaller than 256 and it is confirmed that the random number cannot be divided without a remainder by any of the prime numbers. The random number which has been confirmed that it cannot be divided by any of the prime numbers smaller than 256 is then subjected to a check using the Rabin-Miller method which is a representative probabilistic primality test to determine whether the random number tested is a prime number.
  • the random number tested is subtracted by 2 and then again subjected to a check to determine whether the number is a prime number. If the random number is determined to be a prime number, the random number is used to obtain the private key D satisfying the Equation (2) from the public key N calculated from the Equation (1) and the public key E.
  • the encryption block 2 causes the random number generator 3 to generate a complete random number having a long periodicity and the encryption means 4 to generate a prime number according to this random number, so that the prime number is used to generate the private key D as an encryption key.
  • the fingerprint identification apparatus has private key custody means for keeping the private key D in custody.
  • the private key D thus generated is stored, for example, in the memory 6 functioning as the private key custody means and thus kept in custody within the fingerprint identification apparatus.
  • the encryption block 2 uses the private key D to encrypt a message (plain text).
  • the message is added by a digital signature as follows in the encryption block 2 .
  • the fingerprint identification apparatus identifies a binary image obtained when a finger is placed on the prism 12 in the fingerprint identification block 8 and identifies the individual.
  • the encryption block 2 uses the private key D to encrypt the message.
  • the fingerprint identification apparatus is connected via the interface block 6 to a personal computer (not depicted) and the message has been transmitted via the interface block 6 from the personal computer.
  • the fingerprint identification apparatus adds a digital signature to the encrypted message in the encryption block 2 and sends the message back to the personal computer.
  • the personal computer transmits to a desired addressee the encrypted message having the digital signature via a network.
  • the fingerprint identification apparatus upon identification of a desired individual, uses an encryption key to encrypt a message and sends the encrypted message to a desired addressee.
  • this fingerprint identification apparatus uses the least significant bits of a gray scale image obtained in the pick-up block 10 when no finger 100 is placed on the prism 12 and obtains a random number having a long periodicity. According to such a random number, the fingerprint identification apparatus generates a prime number to be used in encryption, thus providing an encryption with a high reliability.
  • the fingerprint identification apparatus stores the private key D used for encryption, in custody means dedicated for a private key and performed encryption without showing the private key D to an external apparatus such as a personal computer connected.
  • an encryption is performed entirely within the fingerprint identification apparatus while keeping the private key D in the fingerprint identification apparatus, so that the private key D will not be read by a third party and the sequence of processes for random number generation and encryption can be performed within one and the same fingerprint identification apparatus.
  • this encryption has an improved security.
  • the fingerprint identification apparatus can also generate a random number according to pixel values of the respective pixels of a binary image, and can generate a random number according to pixel values of respective pixels of a binary image as follows.
  • the horizontal direction address is i and the vertical direction address is j
  • an arbitrary pixel on the binary image is b (i, j).
  • the random number generator 3 extracts pixel values of respective pixels from pixel b(128, 0) to pixel b(129, 255) and generate two 256-bit random numbers.
  • the random number generator 3 can generate a random number at an arbitrary start address instead of a predetermined position on the screen.
  • the random number generator 3 uses as a start address the horizontal address i and the vertical address j specified by the pixel values of pixels from pixel b(0, 0) to pixel b(0, 7 and pixel values of respective pixels from pixel b(0, 8) to pixel b(0, 14) and extracts pixel values of pixels to generate a random number.
  • the random number generator 3 extracts pixel values starting at pixel b(100, 23) so as to generate a random number.
  • the random number generator 3 can generate a more complete random number.
  • the encryption means 4 According to the two random numbers generated according to the binary image in the random number generator 3 , the encryption means 4 generates an encryption key by the prime number generation process and the key generation process shown in FIG. 5 . That is, according to the random number based on the pixel values (binary data) of the binary image generated in step S 1 , an encryption key is generated through the prime number generation process and the key generation process in the steps S 2 to S 6 .
  • the image processor 20 includes a binary image generation block for generating a binary image from a gray scale image.
  • This image processor 20 is constructed corresponding to the moving average method. In this embodiment, explanation will be given on binarization performed using an average value of 7 pixels in the vertical direction and 7 pixels in the horizontal direction around a center pixel (7 ⁇ 7 pixels).
  • the binary image generation block includes: first to seventh FIFO (first-in, first-out) having a 256-byte capacity 21 , 22 , 23 , 24 , 25 , 26 , and 27 connected in series; horizontal direction summing blocks 28 , 29 , 30 , 31 , 32 , 33 , and 34 connected to the latter stage of the first and seventh FIFO 21 , 22 , 23 , 24 , 25 , 26 , and 27 , for calculating a total of pixel values of pixels in the horizontal direction; an adder 35 for adding outputs from all the horizontal direction summing blocks 28 , 29 , 30 , 31 , 32 , 33 , and 34 ; a divider 36 for dividing the output from the adder 35 by 49; and a subtractor 37 for subtracting the output from the divider 36 , from the pixel value of the center pixel output from the fourth horizontal direction summing block 31 .
  • first to seventh D flip-flops 41 , 42 , 43 , 44 , 45 , 56 , and 47 having an input data of 8-bit width are connected in series so that outputs from the first to the seventh D flip-flops 41 , 42 , 43 , 44 , 45 , 46 , and 47 are added by an adder 48 .
  • the binary image generation block having the aforementioned configuration, while pixel values of pixels of a gray scale image of N-th scan are output from the first FIFO 21 , the second FIFO 22 outputs pixel values of pixels of the gray scale image of N-1-th scan, the third FIFO 23 outputs pixel values of pixels of the gray scale image of N-2-th scan, and thus similarly the fourth to the seventh FIFO 24 , 25 , 26 , and 27 output corresponding pixel values of pixels of the gray scale image.
  • first to the seventh horizontal direction summing blocks 28 , 29 , 30 , 31 , 32 , 33 , and 34 a sum of pixel values of seven continuous pixels in the horizontal direction is calculated. Outputs from the first to the seventh horizontal direction summing blocks 28 , 29 , 30 , 31 , 32 , 33 , and 34 are added in the adder 35 constituting the vertical direction summing block and then input to the divider 36 .
  • the divider 36 divides the total by the number 49 of the pixels added in the horizontal direction and the vertical direction so as to calculate a binary threshold value.
  • the calculated value is compared by the comparator 37 to a binary threshold value of the fourth horizontal direction summing block 31 for binarization.
  • the binary image generation block generates a binary image from the gray scale image.
  • the random number generator 3 can generates a random number as has been described above according to pixel values of respective pixels of the binary image thus generated by the binary image generation block.
  • the fingerprint identifier 8 identifies a fingerprint according to the binary image generated by the binary image generation block.
  • the random number generation apparatus includes: digital image conversion means for converting a pick-up signal output from pick-up means, into a digital image; storage means for storing the digital image as pixel values; and random number generation means for extracting a digital data from pixel values of a plurality of pixels in a digital image of a pick-up signal output, when no subject is present, from pick-up means stored in the storage means and generating a random number from the digital data correlated to a plurality of pixels.
  • the pick-up function of encrypting a plain text employs the random number generation method for generating such a random number, so as to generate an encryption key within the apparatus and keep the encryption key generated, in custody within the apparatus. Thus, it is possible to perform encryption with an improved safety.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Image Input (AREA)

Abstract

The random number generating apparatus includes as a random number generation block: an A/D converter for converting a pick-up signal output from a pick-up block, into a digital image; a memory where the digital image is stored as pixel values; and a random number generator for extracting a digital data from pixel values of a plurality of pixels within the digital image of the pick-up signal output when no subject is present from the pick-up block stored in the memory and generating a random number from the digital data correlated to the plurality of pixels. Thus, it is possible to generate a random number having a long periodicity.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to a random number generation apparatus and a random number generation method for generating a random number sequence.
  • 2. Description of the Related Arts
  • As a conventional random number generation method on a computer, there can be exemplified the linear congruence method or multiplication congruence method and method using a shift register or DES (data encryption standard) which is one of the data encryption standards.
  • A random number sequence generated by the aforementioned methods inevitably has a regularity and its periodicity is a short. Accordingly, it is not proper to use such a random number sequence for generating an encryption key and a seed for generating an encryption key or for encryption of a message.
  • SUMMARY OF THE INVENTION
  • It is therefore an object of the present invention to provide a random number generating apparatus and a random number generating method for generating a random number sequence having a long periodicity.
  • The random number generation apparatus according to the present invention includes: pick-up means, digital image conversion means for converting into a digital image a pick-up signal output from the pick-up means, storage means for storing the digital image as pixel values, and random number generating means for extracting a digital data from pixel values of a plurality of pixels in the digital image of the pick-up signal output when no subject is present from the pick-up means stored in the storage means and generating a random number from the digital data correlated to the plurality of pixels.
  • In the random number generating apparatus having the aforementioned configuration, a pick-up signal output from the pick-up means is converted into a digital image by the digital image conversion means and pixel values of the digital image are stored in the storage means. The random number generating apparatus extracts a digital data from pixel values of a plurality of pixels within the digital image of the pick-up signal output when no subject is present from the pick-up means stored in the storage means, so that the random number generation means generates a random number from the digital data correlated to the plurality of pixels.
  • Since there is no regularity in the pixel values of the respective pixels of the digital image obtained when no subject is present, the random number generated by the random number generating apparatus has a long periodicity.
  • Moreover, in the random number generating apparatus according to the present invention, in order to solve the aforementioned problem, a pick-up signal output from the pick-up means when no subject is present is converted into a digital image and a digital data is extracted from pixel values of a plurality of pixels within the digital image, so that a random number is generated from the digital data correlated to the plurality of pixels.
  • Since there is no regularity in the pixel values of the respective pixels of the digital image obtained when no subject is present, the random number generated by the random number generating method has a long periodicity.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram showing a fingerprint identification apparatus including a random number generation apparatus according to the present invention as an encryption block.
  • FIG. 2 is a block diagram showing a configuration of a pick-up block of the aforementioned fingerprint identification apparatus.
  • FIG. 3 shows a binary image of a fingerprint obtained in the aforementioned fingerprint identification apparatus.
  • FIG. 4 shows an image made up by the least significant one bit of the gray scale image of the fingerprint obtained in the aforementioned fingerprint identification apparatus.
  • FIG. 5 is a flowchart showing a random number generation step, a prime number generation step, and a key generation step.
  • FIG. 6 is a block diagram showing a binary image generator in an image processing block of the aforementioned fingerprint identification apparatus.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • Hereinafter, a detailed explanation will be given on an embodiment of the present invention with reference to the attached drawings. As shown in FIG. 1, this embodiment is a fingerprint identification apparatus including an A/D converter 1, an encryption block 2 having a random number generator 3 and encryption means 4, a CPU 5, a memory 6, an interface block 7, and a fingerprint identifier 8. Here, the A/D converter 1, the random number generator 3, and the memory 6 constitute an example of configuration of a random number generation apparatus according to the present invention.
  • The fingerprint identification apparatus constitutes a personal identification apparatus for identifying a person according to a fingerprint image fetched by a pick-up block 10. In this fingerprint identification apparatus, when a desired person is identified according to a fingerprint image as a living body information, an encryption key is generated according to a random number sequence generated in the random number generator 3 and a plain text is encrypted.
  • The pick-up block 10 is constructed so as to pick-up a fingerprint as a living body information. More specifically, as shown in FIG. 2, the pick-up block 10 includes a light source 11, a prism 12, and pick-up means 13.
  • The prism 12 has a triangular cross section. The light from the light source 11 is incident from the first face 12 a, reflected from a subject placed on the second face 12 b, and goes out from the third face 12 c. Here, the subject is a fingerprint of a finger 100 for identifying an individual person. The pick-up means 13 is arranged at a position so as to detect the light emitted from the third face 12 c. The pick-up means 13 is, for example, a CCD (Charge-Coupled Device) camera.
  • In the pick-up block 10 having the aforementioned configuration, when the finger 100 is placed on the second face 12 b of the prism 12, the light emitted from the light source 11 comes into the prism through the first face 12 a and is reflected irregularly by the convex portion of the fingerprint of the finger 100 on the second face 12 b or reflected totally by the concave portion. These reflected lights go out from the third face 12 c and form an image in the pick-up means 13. Thus, in the pick-up means 13, the convex portion of the finger 100 is picked up as a dark portion and the concave portion is picked up as a bright portion. The pick-up means 13 outputs a pick-up signal as a pick-up information.
  • The pick-up signal output from the pick-up block 10 is sampled at an appropriate time interval and converted by the A/D converter 1 into a digital image of a size, for example, 256×128. In this embodiment, the A/D converter 1 performs an 8-bit conversion. Thus, pixel values of the pixels constituting an image are digital data expressed by 256 gradations from 0 to 255. The digital image obtained in this A/D converter 1 is stored in the memory 6. Hereinafter, a digital image whose pixel value is expressed by multiple bits such as 8 bits will be referred to as a gray scale image.
  • According to the gray scale image, the image processor 20 generates a binary image. For example, the image processor 20 fetches the gray scale image at an appropriate timing and using an appropriate binarization method, generates a binary image in which pixel value of each 8-bit pixel has been converted into ‘0‘or ’1’. The binarization method may be a comparison between an average of pixel values of the entire image and pixel values of the respective pixels or a moving average method, i.e., comparison between a pixel value of a pixel to be considered and an average of pixel values of a plurality of pixels located in a predetermined range from the considered pixel. For example, the fingerprint image picked up in the pick-up block 10 is made into a binary image as shown in FIG. 3 by the moving average method. In FIG. 3, the black portions represent convex portions of the fingerprint and the white portions represent concave portions of the fingerprint.
  • The binary image thus generated is subjected to a pre-processing such as a thinning and then processes such as registration and identification are performed. It should be noted that the binary image generation from the gray scale image by the aforementioned moving average method will be detailed later.
  • The fingerprint identifier 8 identifies the binary image. For example, the fingerprint identifier 8 identifies a registered image information on the fingerprint information which has been fetched in advance with the binary image of the fingerprint picked up by the pick-up block 10. According to the identification result in the fingerprint identifier 8, the fingerprint identification apparatus identifies a desired individual.
  • It should be noted that the CPU 5 is control means for controlling respective components constituting the fingerprint identification apparatus.
  • As has been described above, the fingerprint identification apparatus identifies a fingerprint from a digital image picked up by the pick-up block 10 to identify a desired individual. When an individual is identified by such a fingerprint identification process, the fingerprint identification apparatus encrypts a plain text using a private key. This encryption using a private key is performed according to a prime number obtained according to a random number sequence generated by the random number generator 2.
  • Next, explanation will be given on the process how the encryption block 2 causes the random number generator 3 to generate a random number sequence and the encryption means 4 to perform encryption using an encryption key according to the random number sequence. It should be noted that although the random number generator 3 is constructed to generate a random number sequence from the aforementioned gray scale image or the binary image, explanation will be given on a case of generating a random number sequence according to a gray scale image.
  • In the pick-up block 10, when an image is taken in without placing a finger on the prism 12, a pick-up signal output from the pick-up means 13 is overlapped with a noise. As a result, the least significant bit of the gray scale image obtained by digital conversion in the A/D converter 1 shows a value of irregular ‘0’ or ‘1’. For example, similar irregular values are shown for a binary image. Accordingly, in the gray scale image, it is possible to obtain a random number sequence consisting of ‘0’ and ‘1’ and having an arbitrary length from a bit sequence of an arbitrary length starting at an appropriate position as a start address. For example, in the gray scale image, when it is assumed that the least significant bit ‘0’ represents black and the least significant bit ‘1’ represents white, it is possible to obtain a binary image as shown in FIG. 4. As shown in this FIG. 4, the least significant bits of the gray scale image have no regularity.
  • According to the random number sequence obtained by the random number generator 3, the encryption block 2 generates an encryption key or seed as an origin of the encryption key and performs encryption in the encryption means 4.
  • In general, in order to generate an encryption key, there is a case to use a random number sequence directly as a key or to create a key according to the random number sequence. The former, for example, is the DES (data encryption standard) and the latter, for example, is the RSA encryption method utilizing the difficulty of factorization of a very large number into prime factors. It should be noted that the RSA encryption method is an encryption method invented by Rivest, Shamit, and Adleman of the MIT. In the present embodiment, the random number generator 3 employs the RSA encryption method to create an encryption key. Explanation will be given on this case.
  • Moreover, the RSA encryption method creates a 384-bit, 512-bit, or 1024-bit key for encryption. Here, explanation will be given on a case using the 512-bit key. The outline of the RSA encryption method is as follows.
  • In the RSA encryption method, from two prime number p and q and one of the public keys E (public exponent), using Equations (1) and (2), the other public key, i.e., the public key N (modulus) and a private key D (private exponent) will be obtained.
    N=p×q  (1)
    D=E −1 mod {(p−1)×(q−1)}  (2)
    Here, the public key E and the multiple of (p−1) and (q−1) are mutually prime. If a message (plain text) is M and an encrypted message is C, then relations expressed by Equations (3) and (4) are satisfied.
    C=M E mod N  (3)
    M=C D mod N  (4)
  • The public key N is a very large 512-bit number and it is very difficult to factorize it into prime factors and accordingly, the addressee cannot obtain the previous message M from the encrypted message C unless the addressee knows the private key D. Moreover, in order to add a digital signature to the message C when sent to the addressee, the addresser encrypts the message C having his/her signature using his/her private key D according to Equation (4) when sending the message M. The addressee decodes the message using the public key E and the public key N of the addresser according to Equation (3) and confirms that the signature of the addresser is added.
  • This is the outline of the RSA encryption method. In the encryption means 4 employing the RSA encryption method, a 512-bit key is required. A random number sequence generated in the random number generator 3 is used for creating such a 512-bit key. Such a 512-bit key can be generated by generation of a random number sequence as follows.
  • Since the key length is 512-bits, firstly, the random number generator 3 generates two 256-bit random number. These two random numbers serve as seeds, i.e., initial values for finding two prime numbers.
  • As has been described above, when generating a random number, the fingerprint identification apparatus takes in an image without placing a finger 100 on the prism 12 and obtains a gray scale image as a digital image formed by the A/D converter 1. The fingerprint identification apparatus stores the gray scale image on memory 6 as having size of 256 pixels in the horizontal direction and 128 pixels in the vertical direction in which each pixel value is expressed by 8 bits. It should be noted that simultaneously with such a gray scale image, the fingerprint identification apparatus fetches a binary image from this gray scale image by the image processor 20. The fingerprint identification apparatus stores the binary image on memory 6 as having a size of 256 pixels in the horizontal direction and 128 pixels in the vertical direction in which each pixel is expressed by 1 bit.
  • As has been described above, the least significant bits of the pixel value of pixels in the gray scale image have no regularity. Accordingly, by extracting the least significant bits of the pixel values for a plurality of pixels, it is possible to generate a random number having a long periodicity. The random number generator 3 generates a random number by extracting the least significant bits of pixel values of a plurality of pixels constituting a predetermined area starting at a pixel located at a start address. Here, the start address is an information indicating a position of a pixel where the least significant bit extraction is started.
  • More specifically, pixels are scanned in the horizontal direction starting at the start address so as to extract the least significant bit value of the pixels, i.e., ‘0’ or ‘1’. Assuming i for the horizontal direction address and j for the vertical direction address, an arbitrary point on the gray scale image is defined as g (i, j).
  • For example, the start address is defined as (128, 0) and the 512 pixels are scanned from the pixel g (128, 0) to the pixel g (129, 255) and the least significant bit values are extracted to generate two 256-bit random numbers.
  • Moreover, it is also possible to generate a random number by defining a start address at an appropriate position instead of a predetermined position. In this case, values from 0 to 127 are expressed by 7 bits. Accordingly, by defining the start address by the horizontal address i and the vertical address j specified by the 8 bits of pixel values of the pixel g (0, 0) and the least significant 7 bits of the pixel values of the pixel g (0, 1), values of the least significant bits of the pixel values of pixels are extracted to generate a random number. For example, when the value expressed by an 8-bit pixel value of the pixel g (0, 0) is 100 and the value expressed by the least significant 7 bits of the pixel value of the pixel g (0, 1) is 23, the least significant bit of the pixel value of the pixel g (100, 23) is extracted to generate a random number.
  • Furthermore, when there is a correlation between two adjacent pixels in the horizontal direction, a particular pattern (random number) is easily generated. Taking this into consideration, the least significant bit of the pixel value can be extracted. For example, scan is performed in the vertical direction and the least significant bit of the pixel value is extracted. Moreover, it is possible to perform an exclusive OR operation between two adjacent pixels in the vertical direction to extract a 1-bit data. Alternatively, it is possible to perform an image take-in twice and perform an exclusive OR operation between two images so as to extract a 1-bit data.
  • As has been described above, the random number generator 3 generates a complete random number having a long periodicity by extracting the least significant bit of pixel values of pixels. The encryption means 4 generates two prime number p and q from the two random numbers generated by the random number generator 3. As shown in FIG. 5, the encryption means 4 generates an encryption key through a prime number generation process and a key generation process.
  • Firstly, as shown in FIG. 5, according to a random number generated by the least significant bits of pixel values (gray scale data) of a gray scale image in step 1, the encryption means 4 generates a prime number in the prime number generation process of steps S2 to S5. It should be noted that the process described below is performed for each of the two random numbers p and q.
  • As shown in step S2, the encryption means 4 sets the most significant bit and the least significant bit to ‘1’. Thus, the random number generated in step S1 has a length of 256 bits and is an odd number.
  • Next, in step S3, the encryption means 4 performs division of the random number using all the prime numbers smaller than 256 to determine whether the random number can be divided by all the prime numbers without a remainder. Here, unless the random number can be divided by all the prime numbers without a remainder, the encryption means 4 passes control to step S4, and if the random number can be divided by all the prime numbers without a remainder, the encryption means 4 passes control to step S5.
  • In step S4, the encryption means 4 uses the Rabin-Miller method which is a representative probability prime number checking method so as to further check whether the random number which has been subjected to division tests by all the prime numbers smaller than 256 in step S3 is a prime number. Here, if the number is determined to be a prime number, control is passed to step S6, and otherwise, control is passed to step S5.
  • In step 5 which is performed even if the random number is divided by prime numbers without a remainder in step S3, the encryption means 4 subtracts 2 from the value of the random number p (or the random number q). Then, control is passed to step S3, where the encryption means 4 again checks whether the random number subtracted by 2 can be divided by all the prime numbers smaller than 256 without a remained so as to perform the aforementioned processes of step S3 or step S5 and after.
  • In step S6, as a key generation step, the encryption means 4 fetches a public key N from the aforementioned Equation (1) according to the two prime numbers p and q, and from this public key N and a public key E appropriately selected, obtains a private key D satisfying the aforementioned Equation (2). For example, the encryption means 4 obtains the private key D satisfying the aforementioned Equation (2) by an extended Euclidean algorithm.
  • As has been described above, in the random number generated by the random number generation step, the most significant bit and the least significant bit are set to ‘1’ in the prime number generation step and the key generation step. Thus, the random number has a 256-bit length and is an odd number. This random number is successively divided by all the prime numbers smaller than 256 and it is confirmed that the random number cannot be divided without a remainder by any of the prime numbers. The random number which has been confirmed that it cannot be divided by any of the prime numbers smaller than 256 is then subjected to a check using the Rabin-Miller method which is a representative probabilistic primality test to determine whether the random number tested is a prime number. Here, if the number is determined not to be a prime number, the random number tested is subtracted by 2 and then again subjected to a check to determine whether the number is a prime number. If the random number is determined to be a prime number, the random number is used to obtain the private key D satisfying the Equation (2) from the public key N calculated from the Equation (1) and the public key E.
  • As has been described above, the encryption block 2 causes the random number generator 3 to generate a complete random number having a long periodicity and the encryption means 4 to generate a prime number according to this random number, so that the prime number is used to generate the private key D as an encryption key. The fingerprint identification apparatus has private key custody means for keeping the private key D in custody. The private key D thus generated is stored, for example, in the memory 6 functioning as the private key custody means and thus kept in custody within the fingerprint identification apparatus.
  • The encryption block 2 uses the private key D to encrypt a message (plain text). The message is added by a digital signature as follows in the encryption block 2.
  • The fingerprint identification apparatus identifies a binary image obtained when a finger is placed on the prism 12 in the fingerprint identification block 8 and identifies the individual. When the individual is identified, the encryption block 2 uses the private key D to encrypt the message. Here, the fingerprint identification apparatus is connected via the interface block 6 to a personal computer (not depicted) and the message has been transmitted via the interface block 6 from the personal computer.
  • The fingerprint identification apparatus adds a digital signature to the encrypted message in the encryption block 2 and sends the message back to the personal computer.
  • The personal computer transmits to a desired addressee the encrypted message having the digital signature via a network.
  • As has been described above, the fingerprint identification apparatus, upon identification of a desired individual, uses an encryption key to encrypt a message and sends the encrypted message to a desired addressee.
  • As has been described above, this fingerprint identification apparatus uses the least significant bits of a gray scale image obtained in the pick-up block 10 when no finger 100 is placed on the prism 12 and obtains a random number having a long periodicity. According to such a random number, the fingerprint identification apparatus generates a prime number to be used in encryption, thus providing an encryption with a high reliability.
  • Furthermore, the fingerprint identification apparatus stores the private key D used for encryption, in custody means dedicated for a private key and performed encryption without showing the private key D to an external apparatus such as a personal computer connected. Thus, it is possible to provide an encryption with a high reliability. That is, an encryption is performed entirely within the fingerprint identification apparatus while keeping the private key D in the fingerprint identification apparatus, so that the private key D will not be read by a third party and the sequence of processes for random number generation and encryption can be performed within one and the same fingerprint identification apparatus. Thus, this encryption has an improved security.
  • It should be noted that in the aforementioned embodiment, an explanation has been given on a case of generating a random number form the least significant bits of pixel values of a gray scale image. However, the fingerprint identification apparatus can also generate a random number according to pixel values of the respective pixels of a binary image, and can generate a random number according to pixel values of respective pixels of a binary image as follows. Here, it is assumed that the horizontal direction address is i and the vertical direction address is j, and an arbitrary pixel on the binary image is b (i, j).
  • For example, similarly as in the aforementioned gray scale image, when the start address is (128, 0), the random number generator 3 extracts pixel values of respective pixels from pixel b(128, 0) to pixel b(129, 255) and generate two 256-bit random numbers.
  • Moreover, the random number generator 3 can generate a random number at an arbitrary start address instead of a predetermined position on the screen. For example, the random number generator 3 uses as a start address the horizontal address i and the vertical address j specified by the pixel values of pixels from pixel b(0, 0) to pixel b(0, 7 and pixel values of respective pixels from pixel b(0, 8) to pixel b(0, 14) and extracts pixel values of pixels to generate a random number. For example, when the value specified by the pixel values of pixels from pixel b(0, 0) to pixel b(0, 7) is 100 and the value specified by the pixel values of pixels from pixel b(0, 8) to pixel b(0, 14) is 23, the random number generator 3 extracts pixel values starting at pixel b(100, 23) so as to generate a random number.
  • Moreover, similarly as in the gray scale image, it is possible to extract pixel values by scanning in the vertical direction, to extract a one-bit data by the exclusive OR operations between two pixels adjacent in the vertical direction, and to perform take-in of an image twice and perform the exclusive OR operation between the two images so as to extract a one-bit data. By such extracts, the random number generator 3 can generate a more complete random number.
  • According to the two random numbers generated according to the binary image in the random number generator 3, the encryption means 4 generates an encryption key by the prime number generation process and the key generation process shown in FIG. 5. That is, according to the random number based on the pixel values (binary data) of the binary image generated in step S1, an encryption key is generated through the prime number generation process and the key generation process in the steps S2 to S6.
  • It should be noted that as shown in FIG. 6, the image processor 20 includes a binary image generation block for generating a binary image from a gray scale image. This image processor 20 is constructed corresponding to the moving average method. In this embodiment, explanation will be given on binarization performed using an average value of 7 pixels in the vertical direction and 7 pixels in the horizontal direction around a center pixel (7×7 pixels).
  • The binary image generation block includes: first to seventh FIFO (first-in, first-out) having a 256- byte capacity 21, 22, 23, 24, 25, 26, and 27 connected in series; horizontal direction summing blocks 28, 29, 30, 31, 32, 33, and 34 connected to the latter stage of the first and seventh FIFO 21, 22, 23, 24, 25, 26, and 27, for calculating a total of pixel values of pixels in the horizontal direction; an adder 35 for adding outputs from all the horizontal direction summing blocks 28, 29, 30, 31, 32, 33, and 34; a divider 36 for dividing the output from the adder 35 by 49; and a subtractor 37 for subtracting the output from the divider 36, from the pixel value of the center pixel output from the fourth horizontal direction summing block 31.
  • Here, in the first to the seventh horizontal direction summing blocks 28, 29, 30, 31, 32, 33, and 34, first to seventh D flip- flops 41, 42, 43, 44, 45, 56, and 47 having an input data of 8-bit width are connected in series so that outputs from the first to the seventh D flip- flops 41, 42, 43, 44, 45, 46, and 47 are added by an adder 48.
  • In the binary image generation block having the aforementioned configuration, while pixel values of pixels of a gray scale image of N-th scan are output from the first FIFO 21, the second FIFO 22 outputs pixel values of pixels of the gray scale image of N-1-th scan, the third FIFO 23 outputs pixel values of pixels of the gray scale image of N-2-th scan, and thus similarly the fourth to the seventh FIFO 24, 25, 26, and 27 output corresponding pixel values of pixels of the gray scale image.
  • In the first to the seventh horizontal direction summing blocks 28, 29, 30, 31, 32, 33, and 34, a sum of pixel values of seven continuous pixels in the horizontal direction is calculated. Outputs from the first to the seventh horizontal direction summing blocks 28, 29, 30, 31, 32, 33, and 34 are added in the adder 35 constituting the vertical direction summing block and then input to the divider 36.
  • The divider 36 divides the total by the number 49 of the pixels added in the horizontal direction and the vertical direction so as to calculate a binary threshold value. The calculated value is compared by the comparator 37 to a binary threshold value of the fourth horizontal direction summing block 31 for binarization.
  • By the aforementioned configuration, the binary image generation block generates a binary image from the gray scale image.
  • The random number generator 3 can generates a random number as has been described above according to pixel values of respective pixels of the binary image thus generated by the binary image generation block.
  • Moreover, the fingerprint identifier 8 identifies a fingerprint according to the binary image generated by the binary image generation block.
  • The random number generation apparatus according to the present invention includes: digital image conversion means for converting a pick-up signal output from pick-up means, into a digital image; storage means for storing the digital image as pixel values; and random number generation means for extracting a digital data from pixel values of a plurality of pixels in a digital image of a pick-up signal output, when no subject is present, from pick-up means stored in the storage means and generating a random number from the digital data correlated to a plurality of pixels. The pick-up function of encrypting a plain text employs the random number generation method for generating such a random number, so as to generate an encryption key within the apparatus and keep the encryption key generated, in custody within the apparatus. Thus, it is possible to perform encryption with an improved safety.

Claims (26)

1-20. (canceled)
21. A random number generation apparatus comprising:
a pick-up block structurally adapted to capture living body information and to output a pick-up signal depicting said living body information;
A/D converter structurally adapted to convert said pick-up signal into a gray scale image composed of a plurality of gray scale pixels, a gray scale pixel of said plurality gray scale of pixels having a gray scale pixel value expressed by a plurality of bits;
a image processor structurally adapted to generate a binary image from said gray scale image, a binary image pixel of said binary image being generated by comparing said gray scale pixel value with an average of gray scale pixel values for said plurality of gray scale pixels, said binary image pixel having a binary pixel value expressed by a single bit; and
an encryption block having a random number generator structurally adapted to generate a random number sequence from said pick-up signal when no living body information is captured by said pick-up block, said random number sequence being generated using either said gray scale pixel value or said binary pixel value,
said binary pixel being located at a start address,
said random number generator generating said random number sequence by extracting the least significant bit of said binary pixel value and the least significant bit for each of the binary pixel values of a predetermined number of binary pixels succeeding said binary pixel,
said start address being located at an appropriate position in said binary image,
said appropriate position being at a horizontal address and a vertical address,
said horizontal address being a value expressed by said binary pixel value and,
said vertical address being a value expressed by another binary pixel value of another binary pixel of said plurality binary that is adjacent said binary pixel.
22. A random number generating apparatus as claimed in claim 21, wherein said living body information is a fingerprint.
23. A random number generating apparatus as claimed in claim 21, wherein said binary image is composed of a plurality of binary image pixels.
24. A random number generating apparatus as claimed in claim 21, further comprising memory structurally adapted to store said gray scale image.
25. A random number generating apparatus as claimed in claim 21, further comprising memory structurally adapted to store said binary image.
26. A random number generating apparatus as claimed in claim 21, wherein said plurality of gray scale pixels is the number of gray scale pixels for the entire gray scale image.
27. A random number generating apparatus as claimed in claim 21, wherein said plurality of gray scale pixels is the number of gray scale pixels located at a segment of said gray scale image in a predetermined range from said gray scale pixel.
28. A random number generating apparatus as claimed in claim 21, wherein black portions of said binary image represent convex portions of said living body information and the white portions of said binary image represent concave portions of said living body information.
29. A random number generating apparatus as claimed in claim 21, wherein said appropriate position is located at a predetermined position in said binary image.
30. A random number generating apparatus as claimed in claim 21, wherein said encryption block further comprises:
encryption means structurally adapted to perform encryption using an encryption key.
31. A random number generating apparatus as claimed in claim 30, wherein said encryption key is said random number sequence.
32. A random number generating apparatus as claimed in claim 30, wherein said encryption means employs the RSA encryption method for generating said encryption key according to two prime numbers and generates said two prime numbers according to said random number generated by said random number generating means, so that said two prime numbers are used for generating said encryption key.
33. A random number generating apparatus as claimed in claim 30, further comprising:
a fingerprint identification block structurally adapted to identify an individual by comparing said binary image with registered image information.
34. A random number generating apparatus as claimed in claim 33, wherein said fingerprint identification block performs an encryption of a plain text using said encryption key when said individual is identified.
35. A random number generating method comprising steps of:
capturing living body information;
outputting a pick-up signal depicting said living body information;
converting said pick-up signal into a gray scale image composed of a plurality of gray scale pixels, a gray scale pixel of said plurality gray scale of pixels having a gray scale pixel value expressed by a plurality of bits;
generating a binary image from said gray scale image, a binary image pixel of said binary image being generated by comparing said gray scale pixel value with an average of gray scale pixel values for said plurality of gray scale pixels, said binary image pixel having a binary pixel value expressed by a single bit; and
generating a random number sequence from said pick-up signal when no living body information is captured by said pick-up block, said random number sequence being generated using either said gray scale pixel value or said binary pixel value,
said binary pixel being located at a start address,
said random number sequence being generated by extracting the least significant bit of
said binary pixel value and the least significant bit for each of the binary pixel values of a predetermined number of binary pixels succeeding said binary pixel,
said start address being located at an appropriate position in said binary image,
said appropriate position being at a horizontal address and a vertical address,
said horizontal address being a value expressed by said binary pixel value and,
said vertical address being a value expressed by another binary pixel value of another binary pixel of said plurality binary that is adjacent said binary pixel.
36. A random number generating method as claimed in claim 35, wherein said living body information is a fingerprint.
37. A random number generating method as claimed in claim 35, wherein said binary image is composed of a plurality of binary image pixels.
38. A random number generating method as claimed in claim 35, wherein said plurality of gray scale pixels is the number of gray scale pixels for the entire gray scale image.
39. A random number generating method as claimed in claim 35, wherein said plurality of gray scale pixels is the number of gray scale pixels located at a segment of said gray scale image in a predetermined range from said gray scale pixel.
40. A random number generating method as claimed in claim 35, further comprising the step of:
identifying said binary image.
41. A random number generating method as claimed in claim 35, wherein said appropriate position is located at a predetermined position in said binary image.
42. A random number generating method as claimed in claim 35, further comprising the step of:
performing encryption using an encryption key.
43. A random number generating method as claimed in claim 42, wherein said step of performing encryption further comprises:
employing the RSA encryption method to generate said encryption key according to two prime numbers and generates said two prime numbers according to said random number generated by said random number generating means, so that said two prime numbers are used for generating said encryption key.
44. A random number generating method as claimed in claim 42, further comprising the step of:
identifying an individual by comparing said binary image with registered image information.
45. A random number generating method as claimed in claim 44, further comprising:
performing an encryption of a plain text using said encryption key when said individual is identified.
US11/105,376 1999-08-10 2005-04-14 Random number generation apparatus and randon number generation method Abandoned US20050190913A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/105,376 US20050190913A1 (en) 1999-08-10 2005-04-14 Random number generation apparatus and randon number generation method

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JPP11-226555 1999-08-10
JP11226555A JP2001051831A (en) 1999-08-10 1999-08-10 Device and method for random number generation
US09/634,841 US7020283B1 (en) 1999-08-10 2000-08-08 Random number generation apparatus and random number generation method
US11/105,376 US20050190913A1 (en) 1999-08-10 2005-04-14 Random number generation apparatus and randon number generation method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/634,841 Continuation US7020283B1 (en) 1999-08-10 2000-08-08 Random number generation apparatus and random number generation method

Publications (1)

Publication Number Publication Date
US20050190913A1 true US20050190913A1 (en) 2005-09-01

Family

ID=16847007

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/634,841 Expired - Fee Related US7020283B1 (en) 1999-08-10 2000-08-08 Random number generation apparatus and random number generation method
US11/105,376 Abandoned US20050190913A1 (en) 1999-08-10 2005-04-14 Random number generation apparatus and randon number generation method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/634,841 Expired - Fee Related US7020283B1 (en) 1999-08-10 2000-08-08 Random number generation apparatus and random number generation method

Country Status (2)

Country Link
US (2) US7020283B1 (en)
JP (1) JP2001051831A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040229681A1 (en) * 2003-05-12 2004-11-18 Romano James P. Apparatus and method for generating numbers
US20050249236A1 (en) * 2004-05-07 2005-11-10 Ltas Holdings, Llc Communication systems and methods for transmitting data in parallel over multiple channels
US20070286490A1 (en) * 2006-06-09 2007-12-13 Samsung Electronics Co., Ltd. Facial feature detection method and device
KR100806365B1 (en) 2007-10-10 2008-02-27 (주)케이씨엔테크 System and method for generating encryption seed using structural information of fingerprint
US20090262928A1 (en) * 2006-02-15 2009-10-22 Jaycrypto Limited Method and Apparatus For Seeding a Cryptographic Random Number Generator
US20130010952A1 (en) * 2011-07-07 2013-01-10 Joseph Gerard Muise Method of providing a portable true random number generator based on the microstructure and noise found in digital images
US8750504B1 (en) * 2011-07-07 2014-06-10 Cape Light Institute Incorporated Method of providing a portable true random number generator based on the microstructure and noise found in digital images
US20140219445A1 (en) * 2012-08-06 2014-08-07 Samsung Electronics Co., Ltd. Processors Including Key Management Circuits and Methods of Operating Key Management Circuits
CN110546916A (en) * 2017-07-11 2019-12-06 索尼半导体解决方案公司 Solid-state imaging device and information processing device
CN111162897A (en) * 2019-12-25 2020-05-15 杭州安司源科技有限公司 Mobile terminal true random number rapid generation method based on camera
CN111830489A (en) * 2020-07-22 2020-10-27 浙江光珀智能科技有限公司 Anti-interference method and system for multiple TOF cameras
US20220028301A1 (en) * 2019-01-30 2022-01-27 Sony Group Corporation Encryption device and encryption method
EP4390664A1 (en) * 2022-12-19 2024-06-26 ID Quantique S.A. Random number generator
EP4390663A1 (en) * 2022-12-19 2024-06-26 ID Quantique S.A. Random number generator
EP4390662A1 (en) * 2022-12-19 2024-06-26 ID Quantique S.A. Random number generator
WO2024132697A1 (en) * 2022-12-19 2024-06-27 Id Quantique Sa Random number generator
US20240348433A1 (en) * 2023-04-17 2024-10-17 Wells Fargo Bank, N.A. Quantum prime number generation (qpng)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7233663B2 (en) * 2001-10-29 2007-06-19 Safenet, Inc. Key generation performance improvement
JP4574144B2 (en) * 2003-09-09 2010-11-04 キヤノン株式会社 DIGITAL CLAMP DEVICE, DIGITAL CLAMP METHOD, PROGRAM, AND STORAGE MEDIUM
US7272245B1 (en) * 2004-05-13 2007-09-18 The United States Of America As Represented By The National Security Agency Method of biometric authentication
JP4547624B2 (en) * 2005-04-27 2010-09-22 ソニー株式会社 Pseudorandom number generation device, pseudorandom number generation method, and program
JP4792876B2 (en) * 2005-08-30 2011-10-12 株式会社日立製作所 Information processing apparatus and information processing method
FR2895541B3 (en) * 2005-12-23 2008-04-18 Signoptic Technologies Sarl METHOD FOR EXTRACTING A RANDOM SIGNATURE FROM A MATERIAL ELEMENT
WO2008132382A1 (en) * 2007-03-20 2008-11-06 France Telecom Method for generating a variable from a biometric datum
JP2009176009A (en) * 2008-01-24 2009-08-06 National Institute Of Information & Communication Technology Display device, display method, and program
US20110191129A1 (en) * 2010-02-04 2011-08-04 Netzer Moriya Random Number Generator Generating Random Numbers According to an Arbitrary Probability Density Function
EP2791784A1 (en) * 2011-12-15 2014-10-22 Inside Secure Method for generating prime numbers proven suitable for chip cards
JP6980407B2 (en) * 2016-05-30 2021-12-15 ローム株式会社 Random number generation method
KR102064286B1 (en) * 2018-08-13 2020-01-09 현대오트론 주식회사 Controller for vehicle, data communication method and random number generating method thereof
CN110928523B (en) * 2019-12-04 2021-11-19 中体彩科技发展有限公司 Random number acquisition method and system for lottery industry

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4225850A (en) * 1978-11-15 1980-09-30 Rockwell International Corporation Non-fingerprint region indicator
US5187748A (en) * 1990-07-21 1993-02-16 Goldstar, Inc. Optical apparatus for fingerprint identification system
US5541994A (en) * 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5550647A (en) * 1991-09-20 1996-08-27 Ricoh Company, Ltd. Image processing apparatus for converting a multilevel image signal into a bi-level image signal
US5577136A (en) * 1989-09-27 1996-11-19 Canon Kabushiki Kaisha Image processing apparatus
US5774549A (en) * 1995-12-04 1998-06-30 Sun Microsystems, Inc. Method and apparatus that processes a video signal to generate a random number generator seed
US6028677A (en) * 1997-09-16 2000-02-22 Hewlett-Packard Co. Method and apparatus for converting a gray level pixel image to a binary level pixel image
US6215874B1 (en) * 1996-10-09 2001-04-10 Dew Engineering And Development Limited Random number generator and method for same
US20020124176A1 (en) * 1998-12-14 2002-09-05 Michael Epstein Biometric identification mechanism that preserves the integrity of the biometric information

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2260094C (en) * 1999-01-19 2002-10-01 Nec Corporation A method for inserting and detecting electronic watermark data into a digital image and a device for the same

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4225850A (en) * 1978-11-15 1980-09-30 Rockwell International Corporation Non-fingerprint region indicator
US5577136A (en) * 1989-09-27 1996-11-19 Canon Kabushiki Kaisha Image processing apparatus
US5187748A (en) * 1990-07-21 1993-02-16 Goldstar, Inc. Optical apparatus for fingerprint identification system
US5550647A (en) * 1991-09-20 1996-08-27 Ricoh Company, Ltd. Image processing apparatus for converting a multilevel image signal into a bi-level image signal
US5541994A (en) * 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5774549A (en) * 1995-12-04 1998-06-30 Sun Microsystems, Inc. Method and apparatus that processes a video signal to generate a random number generator seed
US6215874B1 (en) * 1996-10-09 2001-04-10 Dew Engineering And Development Limited Random number generator and method for same
US6028677A (en) * 1997-09-16 2000-02-22 Hewlett-Packard Co. Method and apparatus for converting a gray level pixel image to a binary level pixel image
US20020124176A1 (en) * 1998-12-14 2002-09-05 Michael Epstein Biometric identification mechanism that preserves the integrity of the biometric information

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040229681A1 (en) * 2003-05-12 2004-11-18 Romano James P. Apparatus and method for generating numbers
US20050249236A1 (en) * 2004-05-07 2005-11-10 Ltas Holdings, Llc Communication systems and methods for transmitting data in parallel over multiple channels
US7424040B2 (en) * 2004-05-07 2008-09-09 Ltas Holdings, Llc Communication systems and methods for transmitting data in parallel over multiple channels
US20090262928A1 (en) * 2006-02-15 2009-10-22 Jaycrypto Limited Method and Apparatus For Seeding a Cryptographic Random Number Generator
US20070286490A1 (en) * 2006-06-09 2007-12-13 Samsung Electronics Co., Ltd. Facial feature detection method and device
US7860280B2 (en) * 2006-06-09 2010-12-28 Samsung Electronics Co., Ltd. Facial feature detection method and device
KR100806365B1 (en) 2007-10-10 2008-02-27 (주)케이씨엔테크 System and method for generating encryption seed using structural information of fingerprint
AU2012278880B2 (en) * 2011-07-07 2017-07-27 Marie Lise Lavoie Method of providing a portable true random number generator based on the microstructure and noise found in digital images
CN107193531A (en) * 2011-07-07 2017-09-22 约瑟夫·杰勒德·缪斯 Method for providing a portable true random number generator based on microstructure and noise in digital images
CN103635874A (en) * 2011-07-07 2014-03-12 约瑟夫·杰勒德·缪斯 Method for providing a portable true random number generator based on microstructure and noise in digital images
US8750504B1 (en) * 2011-07-07 2014-06-10 Cape Light Institute Incorporated Method of providing a portable true random number generator based on the microstructure and noise found in digital images
US8379848B2 (en) * 2011-07-07 2013-02-19 Cape Light Institute, Inc. Method of providing a portable true random number generator based on the microstructure and noise found in digital images
JP2014521132A (en) * 2011-07-07 2014-08-25 ムイセ,ジョセフ,ジェラード Providing a true random number generator based on fine structure and noise found in digital images
EP2729869A4 (en) * 2011-07-07 2015-03-04 Joseph Gerard Muise Method of providing a portable true random number generator based on the microstructure and noise found in digital images
US20130010952A1 (en) * 2011-07-07 2013-01-10 Joseph Gerard Muise Method of providing a portable true random number generator based on the microstructure and noise found in digital images
US20140219445A1 (en) * 2012-08-06 2014-08-07 Samsung Electronics Co., Ltd. Processors Including Key Management Circuits and Methods of Operating Key Management Circuits
US9935768B2 (en) * 2012-08-06 2018-04-03 Samsung Electronics Co., Ltd. Processors including key management circuits and methods of operating key management circuits
CN110546916A (en) * 2017-07-11 2019-12-06 索尼半导体解决方案公司 Solid-state imaging device and information processing device
US11032503B2 (en) 2017-07-11 2021-06-08 Sony Semiconductor Solutions Corporation Solid-state imaging device and information processing device
US20220028301A1 (en) * 2019-01-30 2022-01-27 Sony Group Corporation Encryption device and encryption method
US12142164B2 (en) * 2019-01-30 2024-11-12 Sony Group Corporation Encryption device and encryption method
CN111162897A (en) * 2019-12-25 2020-05-15 杭州安司源科技有限公司 Mobile terminal true random number rapid generation method based on camera
CN111830489A (en) * 2020-07-22 2020-10-27 浙江光珀智能科技有限公司 Anti-interference method and system for multiple TOF cameras
EP4390664A1 (en) * 2022-12-19 2024-06-26 ID Quantique S.A. Random number generator
EP4390663A1 (en) * 2022-12-19 2024-06-26 ID Quantique S.A. Random number generator
EP4390662A1 (en) * 2022-12-19 2024-06-26 ID Quantique S.A. Random number generator
WO2024132697A1 (en) * 2022-12-19 2024-06-27 Id Quantique Sa Random number generator
US20240348433A1 (en) * 2023-04-17 2024-10-17 Wells Fargo Bank, N.A. Quantum prime number generation (qpng)

Also Published As

Publication number Publication date
US7020283B1 (en) 2006-03-28
JP2001051831A (en) 2001-02-23

Similar Documents

Publication Publication Date Title
US7020283B1 (en) Random number generation apparatus and random number generation method
US20230360165A1 (en) Method and apparatus for protecting digital photos from alteration
Naveh et al. Photoproof: Cryptographic image authentication for any set of permissible transformations
US6266429B1 (en) Method for confirming the integrity of an image transmitted with a loss
Lin et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation
US12177342B2 (en) Cipher key generation apparatus and cipher key generation method
US8315383B2 (en) Method and apparatus for random bit-string generation utilizing environment sensors
US6823076B2 (en) Method for embedding digital information in a three dimensional image from a scannerless range imaging system
JP2004094353A (en) Identity discrimination system based on reading of pda/portable telephone picture multiple one-dimensional bar code
CN1184294A (en) System for embedding authentication information into image and image change detection system
CN114785483B (en) Secure transmission method of medical images based on semi-tensor product compressed sensing and hybrid cloud
US7296161B1 (en) Image processing apparatus and image processing method
RU2316120C2 (en) Biometric authentication system
Sanguinetti et al. Perfectly secure steganography: hiding information in the quantum noise of a photograph
CN114564171B (en) True random number generation method, device, electronic equipment, storage medium and system
Lan et al. A Novel Multi-Image Encryption Scheme Using Generalized Rectangular Transform and Advanced 5-D Hyperchaotic Map
CN111093011A (en) Optical sensor with encryption function and image data encryption method
JP4804556B2 (en) Tamper detection digital watermark embedding method and apparatus, program, falsification detection method and apparatus using digital watermark, and program
TWI826638B (en) Sensor device, encryption method
Ranjani et al. Medical image reliability verification using hash signatures and sequential square encoding
Cahyono et al. Dual Protection on Message Transmission based on Chinese Remainder Theorem and Rivest Cipher 4
Fadhil et al. Secure reversible data hiding in the medical image using histogram shifting and RC4 encryption
CN115378591A (en) Anonymous biological characteristic key transmission method based on fusion
Powell Securing LSB embedding against structural steganalysis
CN114647835A (en) Data protection method

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION