US20050190913A1 - Random number generation apparatus and randon number generation method - Google Patents
Random number generation apparatus and randon number generation method Download PDFInfo
- Publication number
- US20050190913A1 US20050190913A1 US11/105,376 US10537605A US2005190913A1 US 20050190913 A1 US20050190913 A1 US 20050190913A1 US 10537605 A US10537605 A US 10537605A US 2005190913 A1 US2005190913 A1 US 2005190913A1
- Authority
- US
- United States
- Prior art keywords
- random number
- gray scale
- binary
- image
- pixel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/582—Pseudo-random number generators
Definitions
- the present invention relates to a random number generation apparatus and a random number generation method for generating a random number sequence.
- a random number sequence generated by the aforementioned methods inevitably has a regularity and its periodicity is a short. Accordingly, it is not proper to use such a random number sequence for generating an encryption key and a seed for generating an encryption key or for encryption of a message.
- the random number generation apparatus includes: pick-up means, digital image conversion means for converting into a digital image a pick-up signal output from the pick-up means, storage means for storing the digital image as pixel values, and random number generating means for extracting a digital data from pixel values of a plurality of pixels in the digital image of the pick-up signal output when no subject is present from the pick-up means stored in the storage means and generating a random number from the digital data correlated to the plurality of pixels.
- a pick-up signal output from the pick-up means is converted into a digital image by the digital image conversion means and pixel values of the digital image are stored in the storage means.
- the random number generating apparatus extracts a digital data from pixel values of a plurality of pixels within the digital image of the pick-up signal output when no subject is present from the pick-up means stored in the storage means, so that the random number generation means generates a random number from the digital data correlated to the plurality of pixels.
- the random number generated by the random number generating apparatus Since there is no regularity in the pixel values of the respective pixels of the digital image obtained when no subject is present, the random number generated by the random number generating apparatus has a long periodicity.
- a pick-up signal output from the pick-up means when no subject is present is converted into a digital image and a digital data is extracted from pixel values of a plurality of pixels within the digital image, so that a random number is generated from the digital data correlated to the plurality of pixels.
- the random number generated by the random number generating method Since there is no regularity in the pixel values of the respective pixels of the digital image obtained when no subject is present, the random number generated by the random number generating method has a long periodicity.
- FIG. 1 is a block diagram showing a fingerprint identification apparatus including a random number generation apparatus according to the present invention as an encryption block.
- FIG. 2 is a block diagram showing a configuration of a pick-up block of the aforementioned fingerprint identification apparatus.
- FIG. 3 shows a binary image of a fingerprint obtained in the aforementioned fingerprint identification apparatus.
- FIG. 4 shows an image made up by the least significant one bit of the gray scale image of the fingerprint obtained in the aforementioned fingerprint identification apparatus.
- FIG. 5 is a flowchart showing a random number generation step, a prime number generation step, and a key generation step.
- FIG. 6 is a block diagram showing a binary image generator in an image processing block of the aforementioned fingerprint identification apparatus.
- this embodiment is a fingerprint identification apparatus including an A/D converter 1 , an encryption block 2 having a random number generator 3 and encryption means 4 , a CPU 5 , a memory 6 , an interface block 7 , and a fingerprint identifier 8 .
- the A/D converter 1 , the random number generator 3 , and the memory 6 constitute an example of configuration of a random number generation apparatus according to the present invention.
- the fingerprint identification apparatus constitutes a personal identification apparatus for identifying a person according to a fingerprint image fetched by a pick-up block 10 .
- this fingerprint identification apparatus when a desired person is identified according to a fingerprint image as a living body information, an encryption key is generated according to a random number sequence generated in the random number generator 3 and a plain text is encrypted.
- the pick-up block 10 is constructed so as to pick-up a fingerprint as a living body information. More specifically, as shown in FIG. 2 , the pick-up block 10 includes a light source 11 , a prism 12 , and pick-up means 13 .
- the prism 12 has a triangular cross section.
- the light from the light source 11 is incident from the first face 12 a , reflected from a subject placed on the second face 12 b , and goes out from the third face 12 c .
- the subject is a fingerprint of a finger 100 for identifying an individual person.
- the pick-up means 13 is arranged at a position so as to detect the light emitted from the third face 12 c .
- the pick-up means 13 is, for example, a CCD (Charge-Coupled Device) camera.
- the pick-up block 10 having the aforementioned configuration, when the finger 100 is placed on the second face 12 b of the prism 12 , the light emitted from the light source 11 comes into the prism through the first face 12 a and is reflected irregularly by the convex portion of the fingerprint of the finger 100 on the second face 12 b or reflected totally by the concave portion. These reflected lights go out from the third face 12 c and form an image in the pick-up means 13 .
- the pick-up means 13 the convex portion of the finger 100 is picked up as a dark portion and the concave portion is picked up as a bright portion.
- the pick-up means 13 outputs a pick-up signal as a pick-up information.
- the pick-up signal output from the pick-up block 10 is sampled at an appropriate time interval and converted by the A/D converter 1 into a digital image of a size, for example, 256 ⁇ 128.
- the A/D converter 1 performs an 8-bit conversion.
- pixel values of the pixels constituting an image are digital data expressed by 256 gradations from 0 to 255.
- the digital image obtained in this A/D converter 1 is stored in the memory 6 .
- a digital image whose pixel value is expressed by multiple bits such as 8 bits will be referred to as a gray scale image.
- the image processor 20 According to the gray scale image, the image processor 20 generates a binary image. For example, the image processor 20 fetches the gray scale image at an appropriate timing and using an appropriate binarization method, generates a binary image in which pixel value of each 8-bit pixel has been converted into ‘0‘or ’1’.
- the binarization method may be a comparison between an average of pixel values of the entire image and pixel values of the respective pixels or a moving average method, i.e., comparison between a pixel value of a pixel to be considered and an average of pixel values of a plurality of pixels located in a predetermined range from the considered pixel.
- the fingerprint image picked up in the pick-up block 10 is made into a binary image as shown in FIG. 3 by the moving average method.
- the black portions represent convex portions of the fingerprint and the white portions represent concave portions of the fingerprint.
- the binary image thus generated is subjected to a pre-processing such as a thinning and then processes such as registration and identification are performed. It should be noted that the binary image generation from the gray scale image by the aforementioned moving average method will be detailed later.
- the fingerprint identifier 8 identifies the binary image. For example, the fingerprint identifier 8 identifies a registered image information on the fingerprint information which has been fetched in advance with the binary image of the fingerprint picked up by the pick-up block 10 . According to the identification result in the fingerprint identifier 8 , the fingerprint identification apparatus identifies a desired individual.
- the CPU 5 is control means for controlling respective components constituting the fingerprint identification apparatus.
- the fingerprint identification apparatus identifies a fingerprint from a digital image picked up by the pick-up block 10 to identify a desired individual.
- the fingerprint identification apparatus encrypts a plain text using a private key. This encryption using a private key is performed according to a prime number obtained according to a random number sequence generated by the random number generator 2 .
- the encryption block 2 causes the random number generator 3 to generate a random number sequence and the encryption means 4 to perform encryption using an encryption key according to the random number sequence.
- the random number generator 3 is constructed to generate a random number sequence from the aforementioned gray scale image or the binary image, explanation will be given on a case of generating a random number sequence according to a gray scale image.
- the pick-up block 10 when an image is taken in without placing a finger on the prism 12 , a pick-up signal output from the pick-up means 13 is overlapped with a noise.
- the least significant bit of the gray scale image obtained by digital conversion in the A/D converter 1 shows a value of irregular ‘0’ or ‘1’.
- similar irregular values are shown for a binary image. Accordingly, in the gray scale image, it is possible to obtain a random number sequence consisting of ‘0’ and ‘1’ and having an arbitrary length from a bit sequence of an arbitrary length starting at an appropriate position as a start address.
- the least significant bit ‘0’ represents black and the least significant bit ‘1’ represents white
- the least significant bits of the gray scale image have no regularity.
- the encryption block 2 According to the random number sequence obtained by the random number generator 3 , the encryption block 2 generates an encryption key or seed as an origin of the encryption key and performs encryption in the encryption means 4 .
- the random number generator 3 employs the RSA encryption method to create an encryption key. Explanation will be given on this case.
- the RSA encryption method creates a 384-bit, 512-bit, or 1024-bit key for encryption.
- explanation will be given on a case using the 512-bit key.
- the outline of the RSA encryption method is as follows.
- Equations (1) and (2) the other public key, i.e., the public key N (modulus) and a private key D (private exponent) will be obtained.
- N p ⁇ q (1)
- D E ⁇ 1 mod ⁇ ( p ⁇ 1) ⁇ ( q ⁇ 1) ⁇ (2)
- the public key E and the multiple of (p ⁇ 1) and (q ⁇ 1) are mutually prime. If a message (plain text) is M and an encrypted message is C, then relations expressed by Equations (3) and (4) are satisfied.
- C M E mod N (3)
- M C D mod N (4)
- the public key N is a very large 512-bit number and it is very difficult to factorize it into prime factors and accordingly, the addressee cannot obtain the previous message M from the encrypted message C unless the addressee knows the private key D.
- the addresser encrypts the message C having his/her signature using his/her private key D according to Equation (4) when sending the message M.
- the addressee decodes the message using the public key E and the public key N of the addresser according to Equation (3) and confirms that the signature of the addresser is added.
- a 512-bit key is required.
- a random number sequence generated in the random number generator 3 is used for creating such a 512-bit key.
- Such a 512-bit key can be generated by generation of a random number sequence as follows.
- the random number generator 3 Since the key length is 512-bits, firstly, the random number generator 3 generates two 256-bit random number. These two random numbers serve as seeds, i.e., initial values for finding two prime numbers.
- the fingerprint identification apparatus when generating a random number, takes in an image without placing a finger 100 on the prism 12 and obtains a gray scale image as a digital image formed by the A/D converter 1 .
- the fingerprint identification apparatus stores the gray scale image on memory 6 as having size of 256 pixels in the horizontal direction and 128 pixels in the vertical direction in which each pixel value is expressed by 8 bits. It should be noted that simultaneously with such a gray scale image, the fingerprint identification apparatus fetches a binary image from this gray scale image by the image processor 20 .
- the fingerprint identification apparatus stores the binary image on memory 6 as having a size of 256 pixels in the horizontal direction and 128 pixels in the vertical direction in which each pixel is expressed by 1 bit.
- the least significant bits of the pixel value of pixels in the gray scale image have no regularity. Accordingly, by extracting the least significant bits of the pixel values for a plurality of pixels, it is possible to generate a random number having a long periodicity.
- the random number generator 3 generates a random number by extracting the least significant bits of pixel values of a plurality of pixels constituting a predetermined area starting at a pixel located at a start address.
- the start address is an information indicating a position of a pixel where the least significant bit extraction is started.
- pixels are scanned in the horizontal direction starting at the start address so as to extract the least significant bit value of the pixels, i.e., ‘0’ or ‘1’.
- i for the horizontal direction address
- j for the vertical direction address
- an arbitrary point on the gray scale image is defined as g (i, j).
- the start address is defined as (128, 0) and the 512 pixels are scanned from the pixel g (128, 0) to the pixel g (129, 255) and the least significant bit values are extracted to generate two 256-bit random numbers.
- a random number by defining a start address at an appropriate position instead of a predetermined position.
- values from 0 to 127 are expressed by 7 bits. Accordingly, by defining the start address by the horizontal address i and the vertical address j specified by the 8 bits of pixel values of the pixel g (0, 0) and the least significant 7 bits of the pixel values of the pixel g (0, 1), values of the least significant bits of the pixel values of pixels are extracted to generate a random number.
- the least significant bit of the pixel value of the pixel g (100, 23) is extracted to generate a random number.
- the least significant bit of the pixel value can be extracted. For example, scan is performed in the vertical direction and the least significant bit of the pixel value is extracted. Moreover, it is possible to perform an exclusive OR operation between two adjacent pixels in the vertical direction to extract a 1-bit data. Alternatively, it is possible to perform an image take-in twice and perform an exclusive OR operation between two images so as to extract a 1-bit data.
- the random number generator 3 generates a complete random number having a long periodicity by extracting the least significant bit of pixel values of pixels.
- the encryption means 4 generates two prime number p and q from the two random numbers generated by the random number generator 3 . As shown in FIG. 5 , the encryption means 4 generates an encryption key through a prime number generation process and a key generation process.
- the encryption means 4 generates a prime number in the prime number generation process of steps S 2 to S 5 . It should be noted that the process described below is performed for each of the two random numbers p and q.
- step S 2 the encryption means 4 sets the most significant bit and the least significant bit to ‘1’.
- the random number generated in step S 1 has a length of 256 bits and is an odd number.
- step S 3 the encryption means 4 performs division of the random number using all the prime numbers smaller than 256 to determine whether the random number can be divided by all the prime numbers without a remainder.
- the encryption means 4 passes control to step S 4
- the encryption means 4 passes control to step S 5 .
- step S 4 the encryption means 4 uses the Rabin-Miller method which is a representative probability prime number checking method so as to further check whether the random number which has been subjected to division tests by all the prime numbers smaller than 256 in step S 3 is a prime number.
- the number is determined to be a prime number, control is passed to step S 6 , and otherwise, control is passed to step S 5 .
- step 5 which is performed even if the random number is divided by prime numbers without a remainder in step S 3 , the encryption means 4 subtracts 2 from the value of the random number p (or the random number q). Then, control is passed to step S 3 , where the encryption means 4 again checks whether the random number subtracted by 2 can be divided by all the prime numbers smaller than 256 without a remained so as to perform the aforementioned processes of step S 3 or step S 5 and after.
- step S 6 as a key generation step, the encryption means 4 fetches a public key N from the aforementioned Equation (1) according to the two prime numbers p and q, and from this public key N and a public key E appropriately selected, obtains a private key D satisfying the aforementioned Equation (2).
- the encryption means 4 obtains the private key D satisfying the aforementioned Equation (2) by an extended Euclidean algorithm.
- the random number generated by the random number generation step the most significant bit and the least significant bit are set to ‘1’ in the prime number generation step and the key generation step.
- the random number has a 256-bit length and is an odd number. This random number is successively divided by all the prime numbers smaller than 256 and it is confirmed that the random number cannot be divided without a remainder by any of the prime numbers. The random number which has been confirmed that it cannot be divided by any of the prime numbers smaller than 256 is then subjected to a check using the Rabin-Miller method which is a representative probabilistic primality test to determine whether the random number tested is a prime number.
- the random number tested is subtracted by 2 and then again subjected to a check to determine whether the number is a prime number. If the random number is determined to be a prime number, the random number is used to obtain the private key D satisfying the Equation (2) from the public key N calculated from the Equation (1) and the public key E.
- the encryption block 2 causes the random number generator 3 to generate a complete random number having a long periodicity and the encryption means 4 to generate a prime number according to this random number, so that the prime number is used to generate the private key D as an encryption key.
- the fingerprint identification apparatus has private key custody means for keeping the private key D in custody.
- the private key D thus generated is stored, for example, in the memory 6 functioning as the private key custody means and thus kept in custody within the fingerprint identification apparatus.
- the encryption block 2 uses the private key D to encrypt a message (plain text).
- the message is added by a digital signature as follows in the encryption block 2 .
- the fingerprint identification apparatus identifies a binary image obtained when a finger is placed on the prism 12 in the fingerprint identification block 8 and identifies the individual.
- the encryption block 2 uses the private key D to encrypt the message.
- the fingerprint identification apparatus is connected via the interface block 6 to a personal computer (not depicted) and the message has been transmitted via the interface block 6 from the personal computer.
- the fingerprint identification apparatus adds a digital signature to the encrypted message in the encryption block 2 and sends the message back to the personal computer.
- the personal computer transmits to a desired addressee the encrypted message having the digital signature via a network.
- the fingerprint identification apparatus upon identification of a desired individual, uses an encryption key to encrypt a message and sends the encrypted message to a desired addressee.
- this fingerprint identification apparatus uses the least significant bits of a gray scale image obtained in the pick-up block 10 when no finger 100 is placed on the prism 12 and obtains a random number having a long periodicity. According to such a random number, the fingerprint identification apparatus generates a prime number to be used in encryption, thus providing an encryption with a high reliability.
- the fingerprint identification apparatus stores the private key D used for encryption, in custody means dedicated for a private key and performed encryption without showing the private key D to an external apparatus such as a personal computer connected.
- an encryption is performed entirely within the fingerprint identification apparatus while keeping the private key D in the fingerprint identification apparatus, so that the private key D will not be read by a third party and the sequence of processes for random number generation and encryption can be performed within one and the same fingerprint identification apparatus.
- this encryption has an improved security.
- the fingerprint identification apparatus can also generate a random number according to pixel values of the respective pixels of a binary image, and can generate a random number according to pixel values of respective pixels of a binary image as follows.
- the horizontal direction address is i and the vertical direction address is j
- an arbitrary pixel on the binary image is b (i, j).
- the random number generator 3 extracts pixel values of respective pixels from pixel b(128, 0) to pixel b(129, 255) and generate two 256-bit random numbers.
- the random number generator 3 can generate a random number at an arbitrary start address instead of a predetermined position on the screen.
- the random number generator 3 uses as a start address the horizontal address i and the vertical address j specified by the pixel values of pixels from pixel b(0, 0) to pixel b(0, 7 and pixel values of respective pixels from pixel b(0, 8) to pixel b(0, 14) and extracts pixel values of pixels to generate a random number.
- the random number generator 3 extracts pixel values starting at pixel b(100, 23) so as to generate a random number.
- the random number generator 3 can generate a more complete random number.
- the encryption means 4 According to the two random numbers generated according to the binary image in the random number generator 3 , the encryption means 4 generates an encryption key by the prime number generation process and the key generation process shown in FIG. 5 . That is, according to the random number based on the pixel values (binary data) of the binary image generated in step S 1 , an encryption key is generated through the prime number generation process and the key generation process in the steps S 2 to S 6 .
- the image processor 20 includes a binary image generation block for generating a binary image from a gray scale image.
- This image processor 20 is constructed corresponding to the moving average method. In this embodiment, explanation will be given on binarization performed using an average value of 7 pixels in the vertical direction and 7 pixels in the horizontal direction around a center pixel (7 ⁇ 7 pixels).
- the binary image generation block includes: first to seventh FIFO (first-in, first-out) having a 256-byte capacity 21 , 22 , 23 , 24 , 25 , 26 , and 27 connected in series; horizontal direction summing blocks 28 , 29 , 30 , 31 , 32 , 33 , and 34 connected to the latter stage of the first and seventh FIFO 21 , 22 , 23 , 24 , 25 , 26 , and 27 , for calculating a total of pixel values of pixels in the horizontal direction; an adder 35 for adding outputs from all the horizontal direction summing blocks 28 , 29 , 30 , 31 , 32 , 33 , and 34 ; a divider 36 for dividing the output from the adder 35 by 49; and a subtractor 37 for subtracting the output from the divider 36 , from the pixel value of the center pixel output from the fourth horizontal direction summing block 31 .
- first to seventh D flip-flops 41 , 42 , 43 , 44 , 45 , 56 , and 47 having an input data of 8-bit width are connected in series so that outputs from the first to the seventh D flip-flops 41 , 42 , 43 , 44 , 45 , 46 , and 47 are added by an adder 48 .
- the binary image generation block having the aforementioned configuration, while pixel values of pixels of a gray scale image of N-th scan are output from the first FIFO 21 , the second FIFO 22 outputs pixel values of pixels of the gray scale image of N-1-th scan, the third FIFO 23 outputs pixel values of pixels of the gray scale image of N-2-th scan, and thus similarly the fourth to the seventh FIFO 24 , 25 , 26 , and 27 output corresponding pixel values of pixels of the gray scale image.
- first to the seventh horizontal direction summing blocks 28 , 29 , 30 , 31 , 32 , 33 , and 34 a sum of pixel values of seven continuous pixels in the horizontal direction is calculated. Outputs from the first to the seventh horizontal direction summing blocks 28 , 29 , 30 , 31 , 32 , 33 , and 34 are added in the adder 35 constituting the vertical direction summing block and then input to the divider 36 .
- the divider 36 divides the total by the number 49 of the pixels added in the horizontal direction and the vertical direction so as to calculate a binary threshold value.
- the calculated value is compared by the comparator 37 to a binary threshold value of the fourth horizontal direction summing block 31 for binarization.
- the binary image generation block generates a binary image from the gray scale image.
- the random number generator 3 can generates a random number as has been described above according to pixel values of respective pixels of the binary image thus generated by the binary image generation block.
- the fingerprint identifier 8 identifies a fingerprint according to the binary image generated by the binary image generation block.
- the random number generation apparatus includes: digital image conversion means for converting a pick-up signal output from pick-up means, into a digital image; storage means for storing the digital image as pixel values; and random number generation means for extracting a digital data from pixel values of a plurality of pixels in a digital image of a pick-up signal output, when no subject is present, from pick-up means stored in the storage means and generating a random number from the digital data correlated to a plurality of pixels.
- the pick-up function of encrypting a plain text employs the random number generation method for generating such a random number, so as to generate an encryption key within the apparatus and keep the encryption key generated, in custody within the apparatus. Thus, it is possible to perform encryption with an improved safety.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Collating Specific Patterns (AREA)
- Image Input (AREA)
Abstract
The random number generating apparatus includes as a random number generation block: an A/D converter for converting a pick-up signal output from a pick-up block, into a digital image; a memory where the digital image is stored as pixel values; and a random number generator for extracting a digital data from pixel values of a plurality of pixels within the digital image of the pick-up signal output when no subject is present from the pick-up block stored in the memory and generating a random number from the digital data correlated to the plurality of pixels. Thus, it is possible to generate a random number having a long periodicity.
Description
- 1. Field of the Invention
- The present invention relates to a random number generation apparatus and a random number generation method for generating a random number sequence.
- 2. Description of the Related Arts
- As a conventional random number generation method on a computer, there can be exemplified the linear congruence method or multiplication congruence method and method using a shift register or DES (data encryption standard) which is one of the data encryption standards.
- A random number sequence generated by the aforementioned methods inevitably has a regularity and its periodicity is a short. Accordingly, it is not proper to use such a random number sequence for generating an encryption key and a seed for generating an encryption key or for encryption of a message.
- It is therefore an object of the present invention to provide a random number generating apparatus and a random number generating method for generating a random number sequence having a long periodicity.
- The random number generation apparatus according to the present invention includes: pick-up means, digital image conversion means for converting into a digital image a pick-up signal output from the pick-up means, storage means for storing the digital image as pixel values, and random number generating means for extracting a digital data from pixel values of a plurality of pixels in the digital image of the pick-up signal output when no subject is present from the pick-up means stored in the storage means and generating a random number from the digital data correlated to the plurality of pixels.
- In the random number generating apparatus having the aforementioned configuration, a pick-up signal output from the pick-up means is converted into a digital image by the digital image conversion means and pixel values of the digital image are stored in the storage means. The random number generating apparatus extracts a digital data from pixel values of a plurality of pixels within the digital image of the pick-up signal output when no subject is present from the pick-up means stored in the storage means, so that the random number generation means generates a random number from the digital data correlated to the plurality of pixels.
- Since there is no regularity in the pixel values of the respective pixels of the digital image obtained when no subject is present, the random number generated by the random number generating apparatus has a long periodicity.
- Moreover, in the random number generating apparatus according to the present invention, in order to solve the aforementioned problem, a pick-up signal output from the pick-up means when no subject is present is converted into a digital image and a digital data is extracted from pixel values of a plurality of pixels within the digital image, so that a random number is generated from the digital data correlated to the plurality of pixels.
- Since there is no regularity in the pixel values of the respective pixels of the digital image obtained when no subject is present, the random number generated by the random number generating method has a long periodicity.
-
FIG. 1 is a block diagram showing a fingerprint identification apparatus including a random number generation apparatus according to the present invention as an encryption block. -
FIG. 2 is a block diagram showing a configuration of a pick-up block of the aforementioned fingerprint identification apparatus. -
FIG. 3 shows a binary image of a fingerprint obtained in the aforementioned fingerprint identification apparatus. -
FIG. 4 shows an image made up by the least significant one bit of the gray scale image of the fingerprint obtained in the aforementioned fingerprint identification apparatus. -
FIG. 5 is a flowchart showing a random number generation step, a prime number generation step, and a key generation step. -
FIG. 6 is a block diagram showing a binary image generator in an image processing block of the aforementioned fingerprint identification apparatus. - Hereinafter, a detailed explanation will be given on an embodiment of the present invention with reference to the attached drawings. As shown in
FIG. 1 , this embodiment is a fingerprint identification apparatus including an A/D converter 1, anencryption block 2 having arandom number generator 3 and encryption means 4, aCPU 5, amemory 6, aninterface block 7, and afingerprint identifier 8. Here, the A/D converter 1, therandom number generator 3, and thememory 6 constitute an example of configuration of a random number generation apparatus according to the present invention. - The fingerprint identification apparatus constitutes a personal identification apparatus for identifying a person according to a fingerprint image fetched by a pick-
up block 10. In this fingerprint identification apparatus, when a desired person is identified according to a fingerprint image as a living body information, an encryption key is generated according to a random number sequence generated in therandom number generator 3 and a plain text is encrypted. - The pick-
up block 10 is constructed so as to pick-up a fingerprint as a living body information. More specifically, as shown inFIG. 2 , the pick-up block 10 includes alight source 11, aprism 12, and pick-up means 13. - The
prism 12 has a triangular cross section. The light from thelight source 11 is incident from thefirst face 12 a, reflected from a subject placed on thesecond face 12 b, and goes out from thethird face 12 c. Here, the subject is a fingerprint of afinger 100 for identifying an individual person. The pick-up means 13 is arranged at a position so as to detect the light emitted from thethird face 12 c. The pick-up means 13 is, for example, a CCD (Charge-Coupled Device) camera. - In the pick-
up block 10 having the aforementioned configuration, when thefinger 100 is placed on thesecond face 12 b of theprism 12, the light emitted from thelight source 11 comes into the prism through thefirst face 12 a and is reflected irregularly by the convex portion of the fingerprint of thefinger 100 on thesecond face 12 b or reflected totally by the concave portion. These reflected lights go out from thethird face 12 c and form an image in the pick-up means 13. Thus, in the pick-up means 13, the convex portion of thefinger 100 is picked up as a dark portion and the concave portion is picked up as a bright portion. The pick-up means 13 outputs a pick-up signal as a pick-up information. - The pick-up signal output from the pick-
up block 10 is sampled at an appropriate time interval and converted by the A/D converter 1 into a digital image of a size, for example, 256×128. In this embodiment, the A/D converter 1 performs an 8-bit conversion. Thus, pixel values of the pixels constituting an image are digital data expressed by 256 gradations from 0 to 255. The digital image obtained in this A/D converter 1 is stored in thememory 6. Hereinafter, a digital image whose pixel value is expressed by multiple bits such as 8 bits will be referred to as a gray scale image. - According to the gray scale image, the
image processor 20 generates a binary image. For example, theimage processor 20 fetches the gray scale image at an appropriate timing and using an appropriate binarization method, generates a binary image in which pixel value of each 8-bit pixel has been converted into ‘0‘or ’1’. The binarization method may be a comparison between an average of pixel values of the entire image and pixel values of the respective pixels or a moving average method, i.e., comparison between a pixel value of a pixel to be considered and an average of pixel values of a plurality of pixels located in a predetermined range from the considered pixel. For example, the fingerprint image picked up in the pick-up block 10 is made into a binary image as shown inFIG. 3 by the moving average method. InFIG. 3 , the black portions represent convex portions of the fingerprint and the white portions represent concave portions of the fingerprint. - The binary image thus generated is subjected to a pre-processing such as a thinning and then processes such as registration and identification are performed. It should be noted that the binary image generation from the gray scale image by the aforementioned moving average method will be detailed later.
- The
fingerprint identifier 8 identifies the binary image. For example, thefingerprint identifier 8 identifies a registered image information on the fingerprint information which has been fetched in advance with the binary image of the fingerprint picked up by the pick-up block 10. According to the identification result in thefingerprint identifier 8, the fingerprint identification apparatus identifies a desired individual. - It should be noted that the
CPU 5 is control means for controlling respective components constituting the fingerprint identification apparatus. - As has been described above, the fingerprint identification apparatus identifies a fingerprint from a digital image picked up by the pick-
up block 10 to identify a desired individual. When an individual is identified by such a fingerprint identification process, the fingerprint identification apparatus encrypts a plain text using a private key. This encryption using a private key is performed according to a prime number obtained according to a random number sequence generated by therandom number generator 2. - Next, explanation will be given on the process how the
encryption block 2 causes therandom number generator 3 to generate a random number sequence and the encryption means 4 to perform encryption using an encryption key according to the random number sequence. It should be noted that although therandom number generator 3 is constructed to generate a random number sequence from the aforementioned gray scale image or the binary image, explanation will be given on a case of generating a random number sequence according to a gray scale image. - In the pick-
up block 10, when an image is taken in without placing a finger on theprism 12, a pick-up signal output from the pick-up means 13 is overlapped with a noise. As a result, the least significant bit of the gray scale image obtained by digital conversion in the A/D converter 1 shows a value of irregular ‘0’ or ‘1’. For example, similar irregular values are shown for a binary image. Accordingly, in the gray scale image, it is possible to obtain a random number sequence consisting of ‘0’ and ‘1’ and having an arbitrary length from a bit sequence of an arbitrary length starting at an appropriate position as a start address. For example, in the gray scale image, when it is assumed that the least significant bit ‘0’ represents black and the least significant bit ‘1’ represents white, it is possible to obtain a binary image as shown inFIG. 4 . As shown in thisFIG. 4 , the least significant bits of the gray scale image have no regularity. - According to the random number sequence obtained by the
random number generator 3, theencryption block 2 generates an encryption key or seed as an origin of the encryption key and performs encryption in the encryption means 4. - In general, in order to generate an encryption key, there is a case to use a random number sequence directly as a key or to create a key according to the random number sequence. The former, for example, is the DES (data encryption standard) and the latter, for example, is the RSA encryption method utilizing the difficulty of factorization of a very large number into prime factors. It should be noted that the RSA encryption method is an encryption method invented by Rivest, Shamit, and Adleman of the MIT. In the present embodiment, the
random number generator 3 employs the RSA encryption method to create an encryption key. Explanation will be given on this case. - Moreover, the RSA encryption method creates a 384-bit, 512-bit, or 1024-bit key for encryption. Here, explanation will be given on a case using the 512-bit key. The outline of the RSA encryption method is as follows.
- In the RSA encryption method, from two prime number p and q and one of the public keys E (public exponent), using Equations (1) and (2), the other public key, i.e., the public key N (modulus) and a private key D (private exponent) will be obtained.
N=p×q (1)
D=E −1 mod {(p−1)×(q−1)} (2)
Here, the public key E and the multiple of (p−1) and (q−1) are mutually prime. If a message (plain text) is M and an encrypted message is C, then relations expressed by Equations (3) and (4) are satisfied.
C=M E mod N (3)
M=C D mod N (4) - The public key N is a very large 512-bit number and it is very difficult to factorize it into prime factors and accordingly, the addressee cannot obtain the previous message M from the encrypted message C unless the addressee knows the private key D. Moreover, in order to add a digital signature to the message C when sent to the addressee, the addresser encrypts the message C having his/her signature using his/her private key D according to Equation (4) when sending the message M. The addressee decodes the message using the public key E and the public key N of the addresser according to Equation (3) and confirms that the signature of the addresser is added.
- This is the outline of the RSA encryption method. In the encryption means 4 employing the RSA encryption method, a 512-bit key is required. A random number sequence generated in the
random number generator 3 is used for creating such a 512-bit key. Such a 512-bit key can be generated by generation of a random number sequence as follows. - Since the key length is 512-bits, firstly, the
random number generator 3 generates two 256-bit random number. These two random numbers serve as seeds, i.e., initial values for finding two prime numbers. - As has been described above, when generating a random number, the fingerprint identification apparatus takes in an image without placing a
finger 100 on theprism 12 and obtains a gray scale image as a digital image formed by the A/D converter 1. The fingerprint identification apparatus stores the gray scale image onmemory 6 as having size of 256 pixels in the horizontal direction and 128 pixels in the vertical direction in which each pixel value is expressed by 8 bits. It should be noted that simultaneously with such a gray scale image, the fingerprint identification apparatus fetches a binary image from this gray scale image by theimage processor 20. The fingerprint identification apparatus stores the binary image onmemory 6 as having a size of 256 pixels in the horizontal direction and 128 pixels in the vertical direction in which each pixel is expressed by 1 bit. - As has been described above, the least significant bits of the pixel value of pixels in the gray scale image have no regularity. Accordingly, by extracting the least significant bits of the pixel values for a plurality of pixels, it is possible to generate a random number having a long periodicity. The
random number generator 3 generates a random number by extracting the least significant bits of pixel values of a plurality of pixels constituting a predetermined area starting at a pixel located at a start address. Here, the start address is an information indicating a position of a pixel where the least significant bit extraction is started. - More specifically, pixels are scanned in the horizontal direction starting at the start address so as to extract the least significant bit value of the pixels, i.e., ‘0’ or ‘1’. Assuming i for the horizontal direction address and j for the vertical direction address, an arbitrary point on the gray scale image is defined as g (i, j).
- For example, the start address is defined as (128, 0) and the 512 pixels are scanned from the pixel g (128, 0) to the pixel g (129, 255) and the least significant bit values are extracted to generate two 256-bit random numbers.
- Moreover, it is also possible to generate a random number by defining a start address at an appropriate position instead of a predetermined position. In this case, values from 0 to 127 are expressed by 7 bits. Accordingly, by defining the start address by the horizontal address i and the vertical address j specified by the 8 bits of pixel values of the pixel g (0, 0) and the least significant 7 bits of the pixel values of the pixel g (0, 1), values of the least significant bits of the pixel values of pixels are extracted to generate a random number. For example, when the value expressed by an 8-bit pixel value of the pixel g (0, 0) is 100 and the value expressed by the least significant 7 bits of the pixel value of the pixel g (0, 1) is 23, the least significant bit of the pixel value of the pixel g (100, 23) is extracted to generate a random number.
- Furthermore, when there is a correlation between two adjacent pixels in the horizontal direction, a particular pattern (random number) is easily generated. Taking this into consideration, the least significant bit of the pixel value can be extracted. For example, scan is performed in the vertical direction and the least significant bit of the pixel value is extracted. Moreover, it is possible to perform an exclusive OR operation between two adjacent pixels in the vertical direction to extract a 1-bit data. Alternatively, it is possible to perform an image take-in twice and perform an exclusive OR operation between two images so as to extract a 1-bit data.
- As has been described above, the
random number generator 3 generates a complete random number having a long periodicity by extracting the least significant bit of pixel values of pixels. The encryption means 4 generates two prime number p and q from the two random numbers generated by therandom number generator 3. As shown inFIG. 5 , the encryption means 4 generates an encryption key through a prime number generation process and a key generation process. - Firstly, as shown in
FIG. 5 , according to a random number generated by the least significant bits of pixel values (gray scale data) of a gray scale image instep 1, the encryption means 4 generates a prime number in the prime number generation process of steps S2 to S5. It should be noted that the process described below is performed for each of the two random numbers p and q. - As shown in step S2, the encryption means 4 sets the most significant bit and the least significant bit to ‘1’. Thus, the random number generated in step S1 has a length of 256 bits and is an odd number.
- Next, in step S3, the encryption means 4 performs division of the random number using all the prime numbers smaller than 256 to determine whether the random number can be divided by all the prime numbers without a remainder. Here, unless the random number can be divided by all the prime numbers without a remainder, the encryption means 4 passes control to step S4, and if the random number can be divided by all the prime numbers without a remainder, the encryption means 4 passes control to step S5.
- In step S4, the encryption means 4 uses the Rabin-Miller method which is a representative probability prime number checking method so as to further check whether the random number which has been subjected to division tests by all the prime numbers smaller than 256 in step S3 is a prime number. Here, if the number is determined to be a prime number, control is passed to step S6, and otherwise, control is passed to step S5.
- In
step 5 which is performed even if the random number is divided by prime numbers without a remainder in step S3, the encryption means 4subtracts 2 from the value of the random number p (or the random number q). Then, control is passed to step S3, where the encryption means 4 again checks whether the random number subtracted by 2 can be divided by all the prime numbers smaller than 256 without a remained so as to perform the aforementioned processes of step S3 or step S5 and after. - In step S6, as a key generation step, the encryption means 4 fetches a public key N from the aforementioned Equation (1) according to the two prime numbers p and q, and from this public key N and a public key E appropriately selected, obtains a private key D satisfying the aforementioned Equation (2). For example, the encryption means 4 obtains the private key D satisfying the aforementioned Equation (2) by an extended Euclidean algorithm.
- As has been described above, in the random number generated by the random number generation step, the most significant bit and the least significant bit are set to ‘1’ in the prime number generation step and the key generation step. Thus, the random number has a 256-bit length and is an odd number. This random number is successively divided by all the prime numbers smaller than 256 and it is confirmed that the random number cannot be divided without a remainder by any of the prime numbers. The random number which has been confirmed that it cannot be divided by any of the prime numbers smaller than 256 is then subjected to a check using the Rabin-Miller method which is a representative probabilistic primality test to determine whether the random number tested is a prime number. Here, if the number is determined not to be a prime number, the random number tested is subtracted by 2 and then again subjected to a check to determine whether the number is a prime number. If the random number is determined to be a prime number, the random number is used to obtain the private key D satisfying the Equation (2) from the public key N calculated from the Equation (1) and the public key E.
- As has been described above, the
encryption block 2 causes therandom number generator 3 to generate a complete random number having a long periodicity and the encryption means 4 to generate a prime number according to this random number, so that the prime number is used to generate the private key D as an encryption key. The fingerprint identification apparatus has private key custody means for keeping the private key D in custody. The private key D thus generated is stored, for example, in thememory 6 functioning as the private key custody means and thus kept in custody within the fingerprint identification apparatus. - The
encryption block 2 uses the private key D to encrypt a message (plain text). The message is added by a digital signature as follows in theencryption block 2. - The fingerprint identification apparatus identifies a binary image obtained when a finger is placed on the
prism 12 in thefingerprint identification block 8 and identifies the individual. When the individual is identified, theencryption block 2 uses the private key D to encrypt the message. Here, the fingerprint identification apparatus is connected via theinterface block 6 to a personal computer (not depicted) and the message has been transmitted via theinterface block 6 from the personal computer. - The fingerprint identification apparatus adds a digital signature to the encrypted message in the
encryption block 2 and sends the message back to the personal computer. - The personal computer transmits to a desired addressee the encrypted message having the digital signature via a network.
- As has been described above, the fingerprint identification apparatus, upon identification of a desired individual, uses an encryption key to encrypt a message and sends the encrypted message to a desired addressee.
- As has been described above, this fingerprint identification apparatus uses the least significant bits of a gray scale image obtained in the pick-up
block 10 when nofinger 100 is placed on theprism 12 and obtains a random number having a long periodicity. According to such a random number, the fingerprint identification apparatus generates a prime number to be used in encryption, thus providing an encryption with a high reliability. - Furthermore, the fingerprint identification apparatus stores the private key D used for encryption, in custody means dedicated for a private key and performed encryption without showing the private key D to an external apparatus such as a personal computer connected. Thus, it is possible to provide an encryption with a high reliability. That is, an encryption is performed entirely within the fingerprint identification apparatus while keeping the private key D in the fingerprint identification apparatus, so that the private key D will not be read by a third party and the sequence of processes for random number generation and encryption can be performed within one and the same fingerprint identification apparatus. Thus, this encryption has an improved security.
- It should be noted that in the aforementioned embodiment, an explanation has been given on a case of generating a random number form the least significant bits of pixel values of a gray scale image. However, the fingerprint identification apparatus can also generate a random number according to pixel values of the respective pixels of a binary image, and can generate a random number according to pixel values of respective pixels of a binary image as follows. Here, it is assumed that the horizontal direction address is i and the vertical direction address is j, and an arbitrary pixel on the binary image is b (i, j).
- For example, similarly as in the aforementioned gray scale image, when the start address is (128, 0), the
random number generator 3 extracts pixel values of respective pixels from pixel b(128, 0) to pixel b(129, 255) and generate two 256-bit random numbers. - Moreover, the
random number generator 3 can generate a random number at an arbitrary start address instead of a predetermined position on the screen. For example, therandom number generator 3 uses as a start address the horizontal address i and the vertical address j specified by the pixel values of pixels from pixel b(0, 0) to pixel b(0, 7 and pixel values of respective pixels from pixel b(0, 8) to pixel b(0, 14) and extracts pixel values of pixels to generate a random number. For example, when the value specified by the pixel values of pixels from pixel b(0, 0) to pixel b(0, 7) is 100 and the value specified by the pixel values of pixels from pixel b(0, 8) to pixel b(0, 14) is 23, therandom number generator 3 extracts pixel values starting at pixel b(100, 23) so as to generate a random number. - Moreover, similarly as in the gray scale image, it is possible to extract pixel values by scanning in the vertical direction, to extract a one-bit data by the exclusive OR operations between two pixels adjacent in the vertical direction, and to perform take-in of an image twice and perform the exclusive OR operation between the two images so as to extract a one-bit data. By such extracts, the
random number generator 3 can generate a more complete random number. - According to the two random numbers generated according to the binary image in the
random number generator 3, the encryption means 4 generates an encryption key by the prime number generation process and the key generation process shown inFIG. 5 . That is, according to the random number based on the pixel values (binary data) of the binary image generated in step S1, an encryption key is generated through the prime number generation process and the key generation process in the steps S2 to S6. - It should be noted that as shown in
FIG. 6 , theimage processor 20 includes a binary image generation block for generating a binary image from a gray scale image. Thisimage processor 20 is constructed corresponding to the moving average method. In this embodiment, explanation will be given on binarization performed using an average value of 7 pixels in the vertical direction and 7 pixels in the horizontal direction around a center pixel (7×7 pixels). - The binary image generation block includes: first to seventh FIFO (first-in, first-out) having a 256-
21, 22, 23, 24, 25, 26, and 27 connected in series; horizontalbyte capacity 28, 29, 30, 31, 32, 33, and 34 connected to the latter stage of the first anddirection summing blocks 21, 22, 23, 24, 25, 26, and 27, for calculating a total of pixel values of pixels in the horizontal direction; anseventh FIFO adder 35 for adding outputs from all the horizontal 28, 29, 30, 31, 32, 33, and 34; adirection summing blocks divider 36 for dividing the output from theadder 35 by 49; and asubtractor 37 for subtracting the output from thedivider 36, from the pixel value of the center pixel output from the fourth horizontaldirection summing block 31. - Here, in the first to the seventh horizontal
28, 29, 30, 31, 32, 33, and 34, first to seventh D flip-direction summing blocks 41, 42, 43, 44, 45, 56, and 47 having an input data of 8-bit width are connected in series so that outputs from the first to the seventh D flip-flops 41, 42, 43, 44, 45, 46, and 47 are added by anflops adder 48. - In the binary image generation block having the aforementioned configuration, while pixel values of pixels of a gray scale image of N-th scan are output from the
first FIFO 21, thesecond FIFO 22 outputs pixel values of pixels of the gray scale image of N-1-th scan, thethird FIFO 23 outputs pixel values of pixels of the gray scale image of N-2-th scan, and thus similarly the fourth to the 24, 25, 26, and 27 output corresponding pixel values of pixels of the gray scale image.seventh FIFO - In the first to the seventh horizontal
28, 29, 30, 31, 32, 33, and 34, a sum of pixel values of seven continuous pixels in the horizontal direction is calculated. Outputs from the first to the seventh horizontaldirection summing blocks 28, 29, 30, 31, 32, 33, and 34 are added in thedirection summing blocks adder 35 constituting the vertical direction summing block and then input to thedivider 36. - The
divider 36 divides the total by thenumber 49 of the pixels added in the horizontal direction and the vertical direction so as to calculate a binary threshold value. The calculated value is compared by thecomparator 37 to a binary threshold value of the fourth horizontaldirection summing block 31 for binarization. - By the aforementioned configuration, the binary image generation block generates a binary image from the gray scale image.
- The
random number generator 3 can generates a random number as has been described above according to pixel values of respective pixels of the binary image thus generated by the binary image generation block. - Moreover, the
fingerprint identifier 8 identifies a fingerprint according to the binary image generated by the binary image generation block. - The random number generation apparatus according to the present invention includes: digital image conversion means for converting a pick-up signal output from pick-up means, into a digital image; storage means for storing the digital image as pixel values; and random number generation means for extracting a digital data from pixel values of a plurality of pixels in a digital image of a pick-up signal output, when no subject is present, from pick-up means stored in the storage means and generating a random number from the digital data correlated to a plurality of pixels. The pick-up function of encrypting a plain text employs the random number generation method for generating such a random number, so as to generate an encryption key within the apparatus and keep the encryption key generated, in custody within the apparatus. Thus, it is possible to perform encryption with an improved safety.
Claims (26)
1-20. (canceled)
21. A random number generation apparatus comprising:
a pick-up block structurally adapted to capture living body information and to output a pick-up signal depicting said living body information;
A/D converter structurally adapted to convert said pick-up signal into a gray scale image composed of a plurality of gray scale pixels, a gray scale pixel of said plurality gray scale of pixels having a gray scale pixel value expressed by a plurality of bits;
a image processor structurally adapted to generate a binary image from said gray scale image, a binary image pixel of said binary image being generated by comparing said gray scale pixel value with an average of gray scale pixel values for said plurality of gray scale pixels, said binary image pixel having a binary pixel value expressed by a single bit; and
an encryption block having a random number generator structurally adapted to generate a random number sequence from said pick-up signal when no living body information is captured by said pick-up block, said random number sequence being generated using either said gray scale pixel value or said binary pixel value,
said binary pixel being located at a start address,
said random number generator generating said random number sequence by extracting the least significant bit of said binary pixel value and the least significant bit for each of the binary pixel values of a predetermined number of binary pixels succeeding said binary pixel,
said start address being located at an appropriate position in said binary image,
said appropriate position being at a horizontal address and a vertical address,
said horizontal address being a value expressed by said binary pixel value and,
said vertical address being a value expressed by another binary pixel value of another binary pixel of said plurality binary that is adjacent said binary pixel.
22. A random number generating apparatus as claimed in claim 21 , wherein said living body information is a fingerprint.
23. A random number generating apparatus as claimed in claim 21 , wherein said binary image is composed of a plurality of binary image pixels.
24. A random number generating apparatus as claimed in claim 21 , further comprising memory structurally adapted to store said gray scale image.
25. A random number generating apparatus as claimed in claim 21 , further comprising memory structurally adapted to store said binary image.
26. A random number generating apparatus as claimed in claim 21 , wherein said plurality of gray scale pixels is the number of gray scale pixels for the entire gray scale image.
27. A random number generating apparatus as claimed in claim 21 , wherein said plurality of gray scale pixels is the number of gray scale pixels located at a segment of said gray scale image in a predetermined range from said gray scale pixel.
28. A random number generating apparatus as claimed in claim 21 , wherein black portions of said binary image represent convex portions of said living body information and the white portions of said binary image represent concave portions of said living body information.
29. A random number generating apparatus as claimed in claim 21 , wherein said appropriate position is located at a predetermined position in said binary image.
30. A random number generating apparatus as claimed in claim 21 , wherein said encryption block further comprises:
encryption means structurally adapted to perform encryption using an encryption key.
31. A random number generating apparatus as claimed in claim 30 , wherein said encryption key is said random number sequence.
32. A random number generating apparatus as claimed in claim 30 , wherein said encryption means employs the RSA encryption method for generating said encryption key according to two prime numbers and generates said two prime numbers according to said random number generated by said random number generating means, so that said two prime numbers are used for generating said encryption key.
33. A random number generating apparatus as claimed in claim 30 , further comprising:
a fingerprint identification block structurally adapted to identify an individual by comparing said binary image with registered image information.
34. A random number generating apparatus as claimed in claim 33 , wherein said fingerprint identification block performs an encryption of a plain text using said encryption key when said individual is identified.
35. A random number generating method comprising steps of:
capturing living body information;
outputting a pick-up signal depicting said living body information;
converting said pick-up signal into a gray scale image composed of a plurality of gray scale pixels, a gray scale pixel of said plurality gray scale of pixels having a gray scale pixel value expressed by a plurality of bits;
generating a binary image from said gray scale image, a binary image pixel of said binary image being generated by comparing said gray scale pixel value with an average of gray scale pixel values for said plurality of gray scale pixels, said binary image pixel having a binary pixel value expressed by a single bit; and
generating a random number sequence from said pick-up signal when no living body information is captured by said pick-up block, said random number sequence being generated using either said gray scale pixel value or said binary pixel value,
said binary pixel being located at a start address,
said random number sequence being generated by extracting the least significant bit of
said binary pixel value and the least significant bit for each of the binary pixel values of a predetermined number of binary pixels succeeding said binary pixel,
said start address being located at an appropriate position in said binary image,
said appropriate position being at a horizontal address and a vertical address,
said horizontal address being a value expressed by said binary pixel value and,
said vertical address being a value expressed by another binary pixel value of another binary pixel of said plurality binary that is adjacent said binary pixel.
36. A random number generating method as claimed in claim 35 , wherein said living body information is a fingerprint.
37. A random number generating method as claimed in claim 35 , wherein said binary image is composed of a plurality of binary image pixels.
38. A random number generating method as claimed in claim 35 , wherein said plurality of gray scale pixels is the number of gray scale pixels for the entire gray scale image.
39. A random number generating method as claimed in claim 35 , wherein said plurality of gray scale pixels is the number of gray scale pixels located at a segment of said gray scale image in a predetermined range from said gray scale pixel.
40. A random number generating method as claimed in claim 35 , further comprising the step of:
identifying said binary image.
41. A random number generating method as claimed in claim 35 , wherein said appropriate position is located at a predetermined position in said binary image.
42. A random number generating method as claimed in claim 35 , further comprising the step of:
performing encryption using an encryption key.
43. A random number generating method as claimed in claim 42 , wherein said step of performing encryption further comprises:
employing the RSA encryption method to generate said encryption key according to two prime numbers and generates said two prime numbers according to said random number generated by said random number generating means, so that said two prime numbers are used for generating said encryption key.
44. A random number generating method as claimed in claim 42 , further comprising the step of:
identifying an individual by comparing said binary image with registered image information.
45. A random number generating method as claimed in claim 44 , further comprising:
performing an encryption of a plain text using said encryption key when said individual is identified.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/105,376 US20050190913A1 (en) | 1999-08-10 | 2005-04-14 | Random number generation apparatus and randon number generation method |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JPP11-226555 | 1999-08-10 | ||
| JP11226555A JP2001051831A (en) | 1999-08-10 | 1999-08-10 | Device and method for random number generation |
| US09/634,841 US7020283B1 (en) | 1999-08-10 | 2000-08-08 | Random number generation apparatus and random number generation method |
| US11/105,376 US20050190913A1 (en) | 1999-08-10 | 2005-04-14 | Random number generation apparatus and randon number generation method |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US09/634,841 Continuation US7020283B1 (en) | 1999-08-10 | 2000-08-08 | Random number generation apparatus and random number generation method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20050190913A1 true US20050190913A1 (en) | 2005-09-01 |
Family
ID=16847007
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US09/634,841 Expired - Fee Related US7020283B1 (en) | 1999-08-10 | 2000-08-08 | Random number generation apparatus and random number generation method |
| US11/105,376 Abandoned US20050190913A1 (en) | 1999-08-10 | 2005-04-14 | Random number generation apparatus and randon number generation method |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US09/634,841 Expired - Fee Related US7020283B1 (en) | 1999-08-10 | 2000-08-08 | Random number generation apparatus and random number generation method |
Country Status (2)
| Country | Link |
|---|---|
| US (2) | US7020283B1 (en) |
| JP (1) | JP2001051831A (en) |
Cited By (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040229681A1 (en) * | 2003-05-12 | 2004-11-18 | Romano James P. | Apparatus and method for generating numbers |
| US20050249236A1 (en) * | 2004-05-07 | 2005-11-10 | Ltas Holdings, Llc | Communication systems and methods for transmitting data in parallel over multiple channels |
| US20070286490A1 (en) * | 2006-06-09 | 2007-12-13 | Samsung Electronics Co., Ltd. | Facial feature detection method and device |
| KR100806365B1 (en) | 2007-10-10 | 2008-02-27 | (주)케이씨엔테크 | System and method for generating encryption seed using structural information of fingerprint |
| US20090262928A1 (en) * | 2006-02-15 | 2009-10-22 | Jaycrypto Limited | Method and Apparatus For Seeding a Cryptographic Random Number Generator |
| US20130010952A1 (en) * | 2011-07-07 | 2013-01-10 | Joseph Gerard Muise | Method of providing a portable true random number generator based on the microstructure and noise found in digital images |
| US8750504B1 (en) * | 2011-07-07 | 2014-06-10 | Cape Light Institute Incorporated | Method of providing a portable true random number generator based on the microstructure and noise found in digital images |
| US20140219445A1 (en) * | 2012-08-06 | 2014-08-07 | Samsung Electronics Co., Ltd. | Processors Including Key Management Circuits and Methods of Operating Key Management Circuits |
| CN110546916A (en) * | 2017-07-11 | 2019-12-06 | 索尼半导体解决方案公司 | Solid-state imaging device and information processing device |
| CN111162897A (en) * | 2019-12-25 | 2020-05-15 | 杭州安司源科技有限公司 | Mobile terminal true random number rapid generation method based on camera |
| CN111830489A (en) * | 2020-07-22 | 2020-10-27 | 浙江光珀智能科技有限公司 | Anti-interference method and system for multiple TOF cameras |
| US20220028301A1 (en) * | 2019-01-30 | 2022-01-27 | Sony Group Corporation | Encryption device and encryption method |
| EP4390664A1 (en) * | 2022-12-19 | 2024-06-26 | ID Quantique S.A. | Random number generator |
| EP4390663A1 (en) * | 2022-12-19 | 2024-06-26 | ID Quantique S.A. | Random number generator |
| EP4390662A1 (en) * | 2022-12-19 | 2024-06-26 | ID Quantique S.A. | Random number generator |
| WO2024132697A1 (en) * | 2022-12-19 | 2024-06-27 | Id Quantique Sa | Random number generator |
| US20240348433A1 (en) * | 2023-04-17 | 2024-10-17 | Wells Fargo Bank, N.A. | Quantum prime number generation (qpng) |
Families Citing this family (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7233663B2 (en) * | 2001-10-29 | 2007-06-19 | Safenet, Inc. | Key generation performance improvement |
| JP4574144B2 (en) * | 2003-09-09 | 2010-11-04 | キヤノン株式会社 | DIGITAL CLAMP DEVICE, DIGITAL CLAMP METHOD, PROGRAM, AND STORAGE MEDIUM |
| US7272245B1 (en) * | 2004-05-13 | 2007-09-18 | The United States Of America As Represented By The National Security Agency | Method of biometric authentication |
| JP4547624B2 (en) * | 2005-04-27 | 2010-09-22 | ソニー株式会社 | Pseudorandom number generation device, pseudorandom number generation method, and program |
| JP4792876B2 (en) * | 2005-08-30 | 2011-10-12 | 株式会社日立製作所 | Information processing apparatus and information processing method |
| FR2895541B3 (en) * | 2005-12-23 | 2008-04-18 | Signoptic Technologies Sarl | METHOD FOR EXTRACTING A RANDOM SIGNATURE FROM A MATERIAL ELEMENT |
| WO2008132382A1 (en) * | 2007-03-20 | 2008-11-06 | France Telecom | Method for generating a variable from a biometric datum |
| JP2009176009A (en) * | 2008-01-24 | 2009-08-06 | National Institute Of Information & Communication Technology | Display device, display method, and program |
| US20110191129A1 (en) * | 2010-02-04 | 2011-08-04 | Netzer Moriya | Random Number Generator Generating Random Numbers According to an Arbitrary Probability Density Function |
| EP2791784A1 (en) * | 2011-12-15 | 2014-10-22 | Inside Secure | Method for generating prime numbers proven suitable for chip cards |
| JP6980407B2 (en) * | 2016-05-30 | 2021-12-15 | ローム株式会社 | Random number generation method |
| KR102064286B1 (en) * | 2018-08-13 | 2020-01-09 | 현대오트론 주식회사 | Controller for vehicle, data communication method and random number generating method thereof |
| CN110928523B (en) * | 2019-12-04 | 2021-11-19 | 中体彩科技发展有限公司 | Random number acquisition method and system for lottery industry |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4225850A (en) * | 1978-11-15 | 1980-09-30 | Rockwell International Corporation | Non-fingerprint region indicator |
| US5187748A (en) * | 1990-07-21 | 1993-02-16 | Goldstar, Inc. | Optical apparatus for fingerprint identification system |
| US5541994A (en) * | 1994-09-07 | 1996-07-30 | Mytec Technologies Inc. | Fingerprint controlled public key cryptographic system |
| US5550647A (en) * | 1991-09-20 | 1996-08-27 | Ricoh Company, Ltd. | Image processing apparatus for converting a multilevel image signal into a bi-level image signal |
| US5577136A (en) * | 1989-09-27 | 1996-11-19 | Canon Kabushiki Kaisha | Image processing apparatus |
| US5774549A (en) * | 1995-12-04 | 1998-06-30 | Sun Microsystems, Inc. | Method and apparatus that processes a video signal to generate a random number generator seed |
| US6028677A (en) * | 1997-09-16 | 2000-02-22 | Hewlett-Packard Co. | Method and apparatus for converting a gray level pixel image to a binary level pixel image |
| US6215874B1 (en) * | 1996-10-09 | 2001-04-10 | Dew Engineering And Development Limited | Random number generator and method for same |
| US20020124176A1 (en) * | 1998-12-14 | 2002-09-05 | Michael Epstein | Biometric identification mechanism that preserves the integrity of the biometric information |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2260094C (en) * | 1999-01-19 | 2002-10-01 | Nec Corporation | A method for inserting and detecting electronic watermark data into a digital image and a device for the same |
-
1999
- 1999-08-10 JP JP11226555A patent/JP2001051831A/en active Pending
-
2000
- 2000-08-08 US US09/634,841 patent/US7020283B1/en not_active Expired - Fee Related
-
2005
- 2005-04-14 US US11/105,376 patent/US20050190913A1/en not_active Abandoned
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4225850A (en) * | 1978-11-15 | 1980-09-30 | Rockwell International Corporation | Non-fingerprint region indicator |
| US5577136A (en) * | 1989-09-27 | 1996-11-19 | Canon Kabushiki Kaisha | Image processing apparatus |
| US5187748A (en) * | 1990-07-21 | 1993-02-16 | Goldstar, Inc. | Optical apparatus for fingerprint identification system |
| US5550647A (en) * | 1991-09-20 | 1996-08-27 | Ricoh Company, Ltd. | Image processing apparatus for converting a multilevel image signal into a bi-level image signal |
| US5541994A (en) * | 1994-09-07 | 1996-07-30 | Mytec Technologies Inc. | Fingerprint controlled public key cryptographic system |
| US5774549A (en) * | 1995-12-04 | 1998-06-30 | Sun Microsystems, Inc. | Method and apparatus that processes a video signal to generate a random number generator seed |
| US6215874B1 (en) * | 1996-10-09 | 2001-04-10 | Dew Engineering And Development Limited | Random number generator and method for same |
| US6028677A (en) * | 1997-09-16 | 2000-02-22 | Hewlett-Packard Co. | Method and apparatus for converting a gray level pixel image to a binary level pixel image |
| US20020124176A1 (en) * | 1998-12-14 | 2002-09-05 | Michael Epstein | Biometric identification mechanism that preserves the integrity of the biometric information |
Cited By (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040229681A1 (en) * | 2003-05-12 | 2004-11-18 | Romano James P. | Apparatus and method for generating numbers |
| US20050249236A1 (en) * | 2004-05-07 | 2005-11-10 | Ltas Holdings, Llc | Communication systems and methods for transmitting data in parallel over multiple channels |
| US7424040B2 (en) * | 2004-05-07 | 2008-09-09 | Ltas Holdings, Llc | Communication systems and methods for transmitting data in parallel over multiple channels |
| US20090262928A1 (en) * | 2006-02-15 | 2009-10-22 | Jaycrypto Limited | Method and Apparatus For Seeding a Cryptographic Random Number Generator |
| US20070286490A1 (en) * | 2006-06-09 | 2007-12-13 | Samsung Electronics Co., Ltd. | Facial feature detection method and device |
| US7860280B2 (en) * | 2006-06-09 | 2010-12-28 | Samsung Electronics Co., Ltd. | Facial feature detection method and device |
| KR100806365B1 (en) | 2007-10-10 | 2008-02-27 | (주)케이씨엔테크 | System and method for generating encryption seed using structural information of fingerprint |
| AU2012278880B2 (en) * | 2011-07-07 | 2017-07-27 | Marie Lise Lavoie | Method of providing a portable true random number generator based on the microstructure and noise found in digital images |
| CN107193531A (en) * | 2011-07-07 | 2017-09-22 | 约瑟夫·杰勒德·缪斯 | Method for providing a portable true random number generator based on microstructure and noise in digital images |
| CN103635874A (en) * | 2011-07-07 | 2014-03-12 | 约瑟夫·杰勒德·缪斯 | Method for providing a portable true random number generator based on microstructure and noise in digital images |
| US8750504B1 (en) * | 2011-07-07 | 2014-06-10 | Cape Light Institute Incorporated | Method of providing a portable true random number generator based on the microstructure and noise found in digital images |
| US8379848B2 (en) * | 2011-07-07 | 2013-02-19 | Cape Light Institute, Inc. | Method of providing a portable true random number generator based on the microstructure and noise found in digital images |
| JP2014521132A (en) * | 2011-07-07 | 2014-08-25 | ムイセ,ジョセフ,ジェラード | Providing a true random number generator based on fine structure and noise found in digital images |
| EP2729869A4 (en) * | 2011-07-07 | 2015-03-04 | Joseph Gerard Muise | Method of providing a portable true random number generator based on the microstructure and noise found in digital images |
| US20130010952A1 (en) * | 2011-07-07 | 2013-01-10 | Joseph Gerard Muise | Method of providing a portable true random number generator based on the microstructure and noise found in digital images |
| US20140219445A1 (en) * | 2012-08-06 | 2014-08-07 | Samsung Electronics Co., Ltd. | Processors Including Key Management Circuits and Methods of Operating Key Management Circuits |
| US9935768B2 (en) * | 2012-08-06 | 2018-04-03 | Samsung Electronics Co., Ltd. | Processors including key management circuits and methods of operating key management circuits |
| CN110546916A (en) * | 2017-07-11 | 2019-12-06 | 索尼半导体解决方案公司 | Solid-state imaging device and information processing device |
| US11032503B2 (en) | 2017-07-11 | 2021-06-08 | Sony Semiconductor Solutions Corporation | Solid-state imaging device and information processing device |
| US20220028301A1 (en) * | 2019-01-30 | 2022-01-27 | Sony Group Corporation | Encryption device and encryption method |
| US12142164B2 (en) * | 2019-01-30 | 2024-11-12 | Sony Group Corporation | Encryption device and encryption method |
| CN111162897A (en) * | 2019-12-25 | 2020-05-15 | 杭州安司源科技有限公司 | Mobile terminal true random number rapid generation method based on camera |
| CN111830489A (en) * | 2020-07-22 | 2020-10-27 | 浙江光珀智能科技有限公司 | Anti-interference method and system for multiple TOF cameras |
| EP4390664A1 (en) * | 2022-12-19 | 2024-06-26 | ID Quantique S.A. | Random number generator |
| EP4390663A1 (en) * | 2022-12-19 | 2024-06-26 | ID Quantique S.A. | Random number generator |
| EP4390662A1 (en) * | 2022-12-19 | 2024-06-26 | ID Quantique S.A. | Random number generator |
| WO2024132697A1 (en) * | 2022-12-19 | 2024-06-27 | Id Quantique Sa | Random number generator |
| US20240348433A1 (en) * | 2023-04-17 | 2024-10-17 | Wells Fargo Bank, N.A. | Quantum prime number generation (qpng) |
Also Published As
| Publication number | Publication date |
|---|---|
| US7020283B1 (en) | 2006-03-28 |
| JP2001051831A (en) | 2001-02-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7020283B1 (en) | Random number generation apparatus and random number generation method | |
| US20230360165A1 (en) | Method and apparatus for protecting digital photos from alteration | |
| Naveh et al. | Photoproof: Cryptographic image authentication for any set of permissible transformations | |
| US6266429B1 (en) | Method for confirming the integrity of an image transmitted with a loss | |
| Lin et al. | A robust image authentication method distinguishing JPEG compression from malicious manipulation | |
| US12177342B2 (en) | Cipher key generation apparatus and cipher key generation method | |
| US8315383B2 (en) | Method and apparatus for random bit-string generation utilizing environment sensors | |
| US6823076B2 (en) | Method for embedding digital information in a three dimensional image from a scannerless range imaging system | |
| JP2004094353A (en) | Identity discrimination system based on reading of pda/portable telephone picture multiple one-dimensional bar code | |
| CN1184294A (en) | System for embedding authentication information into image and image change detection system | |
| CN114785483B (en) | Secure transmission method of medical images based on semi-tensor product compressed sensing and hybrid cloud | |
| US7296161B1 (en) | Image processing apparatus and image processing method | |
| RU2316120C2 (en) | Biometric authentication system | |
| Sanguinetti et al. | Perfectly secure steganography: hiding information in the quantum noise of a photograph | |
| CN114564171B (en) | True random number generation method, device, electronic equipment, storage medium and system | |
| Lan et al. | A Novel Multi-Image Encryption Scheme Using Generalized Rectangular Transform and Advanced 5-D Hyperchaotic Map | |
| CN111093011A (en) | Optical sensor with encryption function and image data encryption method | |
| JP4804556B2 (en) | Tamper detection digital watermark embedding method and apparatus, program, falsification detection method and apparatus using digital watermark, and program | |
| TWI826638B (en) | Sensor device, encryption method | |
| Ranjani et al. | Medical image reliability verification using hash signatures and sequential square encoding | |
| Cahyono et al. | Dual Protection on Message Transmission based on Chinese Remainder Theorem and Rivest Cipher 4 | |
| Fadhil et al. | Secure reversible data hiding in the medical image using histogram shifting and RC4 encryption | |
| CN115378591A (en) | Anonymous biological characteristic key transmission method based on fusion | |
| Powell | Securing LSB embedding against structural steganalysis | |
| CN114647835A (en) | Data protection method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |