Cryptographic algorithms | Random number generation | Computational complexity theory

Randomness extractor

A randomness extractor, often simply called an "extractor", is a function, which being applied to output from a weakly random entropy source, together with a short, uniformly random seed, generates a highly random output that appears independent from the source and uniformly distributed. Examples of weakly random sources include radioactive decay or thermal noise; the only restriction on possible sources is that there is no way they can be fully controlled, calculated or predicted, and that a lower bound on their entropy rate can be established. For a given source, a randomness extractor can even be considered to be a true random number generator (TRNG); but there is no single extractor that has been proven to produce truly random output from any type of weakly random source. Sometimes the term "bias" is used to denote a weakly random source's departure from uniformity, and in older literature, some extractors are called unbiasing algorithms, as they take the randomness from a so-called "biased" source and output a distribution that appears unbiased. The weakly random source will always be longer than the extractor's output, but an efficient extractor is one that lowers this ratio of lengths as much as possible, while simultaneously keeping the seed length low. Intuitively, this means that as much randomness as possible has been "extracted" from the source. Note that an extractor has some conceptual similarities with a pseudorandom generator (PRG), but the two concepts are not identical. Both are functions that take as input a small, uniformly random seed and produce a longer output that "looks" uniformly random. Some pseudorandom generators are, in fact, also extractors. (When a PRG is based on the existence of hard-core predicates, one can think of the weakly random source as a set of truth tables of such predicates and prove that the output is statistically close to uniform.) However, the general PRG definition does not specify that a weakly random source must be used, and while in the case of an extractor, the output should be statistically close to uniform, in a PRG it is only required to be computationally indistinguishable from uniform, a somewhat weaker concept. NIST Special Publication 800-90B (draft) recommends several extractors, including the SHA hash family and states that if the amount of entropy input is twice the number of bits output from them, that output can be considered essentially fully random. (Wikipedia).

Video thumbnail

Automatic Pattern Matching for 3D Geometry in Blender

To help refining the alignment of multiple 3D scans with each other, I have written a new tool for Blender which automatically finds the best fit for mesh objects.

From playlist Random Blender Tests

Video thumbnail

Randomness - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Random Oracle - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Blender test: Simple parallax mapping through composite and material nodes only

The original render output is flat. :) For similar technique see the node setups here: http://www.blendpolis.de/viewtopic.php?f=14&t=25226 http://www.kaikostack.com

From playlist Random Blender Tests

Video thumbnail

Statistics: Sampling Methods

This lesson introduces the different sample methods when conducting a poll or survey. Site: http://mathispower4u.com

From playlist Introduction to Statistics

Video thumbnail

Towards optimal Ramsey graphs and randomness extractors - Eshan Chattopadhyay

Short talks by postdoctoral members Topic: Towards optimal Ramsey graphs and randomness extractors Speaker: Eshan Chattopadhyay Affiliation: Member, School of Mathematics Date: September 26, 2017 For more videos, please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Pseudo Random Number Generator Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Recent Progress in Randomness Extraction - Eshan Chattopadhyay

Computer Science/Discrete Mathematics Seminar II Topic: Recent Progress in Randomness Extraction Speaker: Eshan Chattopadhyay Affiliation: Cornell University Date: March 07, 2023 Randomness is a vital resource in computation, with many applications in areas such as cryptography, data-str

From playlist Mathematics

Video thumbnail

PMSP - Computational pseudo-randomness and extractors I - Russell Impagliazzo

Russell Impagliazzo UC San Diego and Institute for Advanced Study June 14, 2010 For more videos, visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Nexus Trimester - Iftach Haitner (Tel Aviv University) - Leo Reyzin (Boston University) 2/3

Computational Analogues of Entropy 2/3 Iftach Haitner (Tel Aviv University) Leo Reyzin (Boston University) MArch 21, 2016 Abstract: If you see a cryptographic hash of my password, how can I quantify your uncertainty about the password? Entropy – a traditional measure of uncertainty – is

From playlist Nexus Trimester - 2016 - Secrecy and Privacy Theme

Video thumbnail

Near-Optimal Strong Dispersers - Dean Doron

Computer Science/Discrete Mathematics Seminar I Topic: Near-Optimal Strong Dispersers Speaker: Dean Doron Affiliation: The University of Texas at Austin Date: February 4, 2019 For more video please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Can you identify this substance?

via YouTube Capture

From playlist Random

Video thumbnail

Live CEOing Ep 532: Design Review of MoleculeFingerprint and Other Functions

In this episode of Live CEOing, Stephen Wolfram discusses upcoming improvements and features to the Wolfram Language. If you'd like to contribute to the discussion in future episodes, you can participate through this YouTube channel or through the official Twitch channel of Stephen Wolfram

From playlist Behind the Scenes in Real-Life Software Design

Video thumbnail

Live CEOing Ep 438: Machine Learning Design Review for Wolfram Language 12.3

In this episode of Live CEOing, Stephen Wolfram reviews the design of improvements made to machine learning and neural network functions for the Wolfram Language. If you'd like to contribute to the discussion in future episodes, you can participate through this YouTube channel or through t

From playlist Behind the Scenes in Real-Life Software Design

Video thumbnail

PMSP - Computational pseudo-randomness and extractors II - Russell Impagliazzo

Russell Impagliazzo Institute for Advanced Study June 14, 2010 For more videos, visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Zero Knowledge Proofs - Seminar 1 - Introduction

This seminar series is about the mathematical foundations of cryptography. In this series Eleanor McMurtry is explaining Zero Knowledge Proofs (ZKPs), a fascinating set of techniques that allow one participant to prove they know something *without revealing the thing*. You can join this s

From playlist Metauni

Video thumbnail

True Randomness: Its Origin and Expansion - Yaoyun Shi

True Randomness: Its Origin and Expansion Yaoyun Shi University of Michigan April 21, 2014 How can we produce randomness of almost perfect quality, in large quantities, and under minimal assumptions? This question is fundamental not only to modern day information processing but also to phy

From playlist Mathematics

Video thumbnail

Randomness Quiz - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Related pages

Hard-core predicate | Min-entropy | Exchangeable random variables | Independent and identically distributed random variables | Encryption | Key generation | Cryptographic hash function | Pseudorandom generator | Chaos machine | Fuzzy extractor | Cryptography | John von Neumann | Randomness merger | Concatenation | Entropy (computing) | Hardware random number generator | Correlation | Decorrelation | Probabilistic method | Computational complexity theory | Quantum cryptography | Radioactive decay | Negligible function | Disperser | Statistically close