skip to main content
research-article

Games for extracting randomness

Published:01 December 2010Publication History
Skip Abstract Section

Abstract

Two computer scientists have created a video game about mice and elephants that can make computer encryption properly secure---as long as you play it randomly.

References

  1. Barak, B. and Halevi, S. 2005. A model and architecture for pseudo-random generation and applications to /dev/random. ACM Conf. Computer and Comm. Security, 203"U--212. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Barraclough, D., Conroy, M., and Lee, D. 2004. Prefrontal cortex and decision making in a mixed-strategy game. Nature Neuroscience 7, 4, 404--410.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bernstein, G. and Lieberman, M. 1990. Secure random number generation using chaotic circuits. Circuits and Systems, IEEE Transactions on 37, 9, 1157--1164.Google ScholarGoogle Scholar
  4. Burns, B. and Corpus, B. 2004. Randomness and induction from streaks: "gambler's fallacy" versus "hot hand". Psychonomic Bulletin and Review 11, 179--184.Google ScholarGoogle ScholarCross RefCross Ref
  5. Eliaz, K. and Rubinstein, A. 2008. Edgar Allen Poe's Riddle: Do Guessers Outperform Misleaders in a Repeated Matching Pennies Game? http://arielrubinstein.tau.ac.il/papers/poe.pdf.Google ScholarGoogle Scholar
  6. Falk, R. and Konold, C. 1997. Making sense of randomness: Implicit encoding as a basis for judgment. Psychological Review 104, 2 {April}, 301--318.Google ScholarGoogle ScholarCross RefCross Ref
  7. Figurska, M., Stanczyk, M., and Kulesza, K. 2008. Humans cannot consciously generate random numbers sequences: Polemic study. Medical Hypotheses 70, 1, 182--185.Google ScholarGoogle ScholarCross RefCross Ref
  8. Flood, M., Lendenmann, K., and Rapoport, A. 1983. 2x2 Games played by rats: different delays of reinforcement as payoffs. Behav Sci 28, 65--78.Google ScholarGoogle ScholarCross RefCross Ref
  9. Glimcher, P., Dorris, M., and Bayer, H. 2005. Physiological utility theory and the neuroeconomics of choice. Games and Economic Behavior 52, 2, 213--256.Google ScholarGoogle ScholarCross RefCross Ref
  10. Goldberg, I. and Wagner, D. 1996. Randomness and the netscape browser. Dr. Dobb's Journal, 66--70.Google ScholarGoogle Scholar
  11. Haahr, M. Random.org: true random number service. http://www.random.org.Google ScholarGoogle Scholar
  12. Halprin, R. and Naor, M. 2009. Games for extracting randomness. In Proceedings of the 5th Symposium on Usable Privacy and Security, article 12, California. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Katz, J. and Lindell, Y. 2008. Introduction to modern cryptography. Chapman & Hall/CRC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Noll, L., Mende, R., Sisodiya, S., et al. 1998. Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic system. US Patent 5,732,138.Google ScholarGoogle Scholar
  15. Rapoport, A. and Budescu, D. 1992. Generation of random series in two-person strictl competitive games. Journal of Experimental Psychology: General 121, 3, 352--363.Google ScholarGoogle ScholarCross RefCross Ref
  16. Rapoport, A. and Budescu, D. 1997. Randomization in individual choice behavior. Psychological Review 104, 1, 603--617.Google ScholarGoogle ScholarCross RefCross Ref
  17. Shaltiel, R. 2004. Recent developments in explicit constructions of extractors. Current Trends in Theoretical Computer Science: The Challenge of the New Century. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Tversky, A. and Gilovich, T. 2004. The "Hot Hand": Statistical Reality or Cognitive Illusion? Preference, Belief, and Similarity: Selected Writings.Google ScholarGoogle Scholar
  19. von Neumann, J. 1951. Various techniques used in connection with random digits. Applied Math Series 12, 36--38.Google ScholarGoogle Scholar
  20. Weimer, F. New openssl packages fix predictable random number generator. http://lists.debian.org/debian-securityannounce/2008/msg00152.html.Google ScholarGoogle Scholar

Index Terms

  1. Games for extracting randomness

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image XRDS: Crossroads, The ACM Magazine for Students
            XRDS: Crossroads, The ACM Magazine for Students  Volume 17, Issue 2
            Comp-YOU-Ter
            Winter 2010
            53 pages
            ISSN:1528-4972
            EISSN:1528-4980
            DOI:10.1145/1869086
            Issue’s Table of Contents

            Copyright © 2010 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 December 2010

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Popular
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format