Affiliation:
1. MEHMET AKİF ERSOY ÜNİVERSİTESİ, FEN BİLİMLERİ ENSTİTÜSÜ
2. MEHMET AKIF ERSOY UNIVERSITY
Abstract
The use of random numbers to represent uncertainty and unpredictability is essential in many industries. This is crucial in disciplines such as computer science, cryptography and statistics, where the use of randomness helps to guarantee the security and reliability of systems and procedures. In computer science, random number generation is used to generate passwords, keys and other security tokens, as well as to add randomness to algorithms and simulations. According to recent research, the hardware random number generators used in billions of IoT devices do not generate enough entropy. This paper describes how raw data collected by IoT system sensors can be used to generate random numbers for cryptography systems and also examines the consequences of these random numbers. Colour, light and camera are used as sensors. Monobit and poker test results are analysed to measure the quality of randomness. Sequences were obtained with the method that gave quality values as a result of the analysis and these sequences were entered into the NIST and FIPS 140-1 randomness test packages. When the results of these two tests were analysed, it was observed that the sequences passed all tests successfully.
Funder
Burdur Mehmet Akif Ersoy University Scientific Research Project Unit
Publisher
Mehmet Akif Ersoy Universitesi Fen Bilimleri Enstitusu Dergisi
Subject
Materials Science (miscellaneous)
Reference23 articles.
1. Abood, O.G., Guirguis S, Guirguis, S.K. (2018). A survey on cryptography algorithms. International Journal of Sci-entific and Research Publications, 8(7): 495-516.
2. Ansari, U., Chaudhary, A.K., Verma S. (2022). True random number generator (TRNG) using sensors for low cost IoT applications. In 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), March 10-11, 2022, Chennai, India, 1-6.
3. Atar, E., Ersoy, O.K., Özyılmaz, L. (2017). Hybrid data compression and optical cryptography with steep matching search method. Journal of the Faculty of En-gineering and Architecture of Gazi University, 32(1): 139–147.
4. Chen, I-Te. (2013) Random numbers generated from audio and video sources. Mathematical problems in engineering; DOI:10.1155/2013/285373.
5. Conti, M., Dehghantanha, A., Franke K., Watson, S. (2018). Internet of things security and forensics: Challenges and opportunities. Future Generation Computer Sys-tems, 78: 544–546.