Abstract
The development of random number generators (RNGs) using speckle patterns is pivotal for secure encryption key generation, drawing from the recent statistical properties identified in speckle-based imaging. Speckle-based RNG systems generate a sequence of random numbers through the unpredictable and reproducible nature of speckle patterns, ensuring a source of randomness that is independent of algorithms. However, to guarantee their effectiveness and reliability, these systems demand a meticulous and rigorous approach. In this study, we present a blood-inspired RNG system with a microfluidics device, designed to generate random numbers at a rate of 5.5 MHz and a high-speed of 1250 fps. This process is achieved by directing a laser beam through a volumetric scattering medium to procure speckle patterns. Additionally, designed microfluidic device requires only a minimal blood sample of 5 µl to capture these speckle patterns effectively. After implementing the two-pass tuple-output von Neumann debiasing algorithm to counteract statistical biases, we utilized the randomness statistical test suite from the National Institute of Standards and Technology for validation. The generated numbers successfully passed these tests, ensuring their randomness and unpredictability. Our blood-inspired RNG, utilizing whole blood, offers a pathway for affordable, high-output applications in fields like encryption, computer security, and data protection.
Similar content being viewed by others
Introduction
The evolution and continued development of Random Number Generator (RNG) systems remain a critical cornerstone for the future of cryptographic fields1. These RNG systems form the backbone of all cryptographic systems due to their role in generating keys that are not only difficult but nearly impossible to predict. This unpredictability ensures a high level of security, a necessary feature in today's digital world2,3. There are primarily two types of random number generators: algorithmic and physical. Algorithmic generators, also known as pseudorandom number generators (PRNGs)4,5,6, generate sequences of numbers using complex mathematical formulas. While they are convenient and efficient, PRNGs have a drawback as the generated pseudorandom numbers, even if they pass randomness tests, can be reverse-engineered and predicted. Physical (or true) random number generators, on the other hand, derive randomness from stochastic physical processes7,8. Although these processes are theoretically predictable with complete information, they are practically unpredictable due to limitations in time and computational resources9,10. RNGs of this nature play a vital role in various cybersecurity tasks, including key generation, digital signature creation, initialization vectors for cryptography, and generating salt values for secure storage, addressing the cybersecurity needs of interconnected systems beyond the IoT domain11.
One emerging area of interest is the use of optical physical unclonable functions for enhanced security. Research by Di Falco et al. has shown that chaotic systems12, facilitated by silicon chips, can be utilized for achieving a cryptography system with perfect secrecy13,14,15. However, it's essential to note that physically-based RNGs come with their own sets of challenges. For instance, while capturing random patterns is an innovative method, it suffers from limited bandwidth16. Another method, employing a light-emitting diode and a mobile phone camera, captures randomness from quantum fluctuations in light but is prohibitively complex to set up17,18. Hence, the landscape of RNG systems has been marked by a shift in recent years. In addition, conventional RNGs, which are artificially generated, have increasingly been found to contain inherent security vulnerabilities. These vulnerabilities have sparked a move towards more unpredictable, and inherently random, bio-inspired RNG systems. This shift acknowledges the fact that biological systems often contain levels of complexity and randomness that are difficult, if not impossible, to artificially replicate. Hence, recent RNG techniques have attempted to focus on the generation of RNGs using speckle patterns. The primary aim of these techniques is to achieve a balance of affordability and portability, both of which are vital factors for the widespread adoption and application of these systems19,20.
In the realm of speckle pattern generation, advancements in RNG and photonic physical unclonable functions often rely on intrinsic randomness in materials, such as the natural texture of paper21, as have speckle patterns created under coherent light. For instance, optical waveguides have demonstrated their ability to produce random numbers at Mbit/s rates with verified randomness22. Moreover, Fratalocchi et al. developed an all-optical physical unclonable function based on speckle patterns from aerogels, achieving secure key generation12. However, these techniques involve capturing static speckle patterns by passing a laser beam through a volumetric scattering medium. This approach, while innovative, poses challenges for cost-effectiveness and high-speed random number generation. Moreover, despite the enhanced security features offered by these RNGs, their application within the industrial field has been limited. The major hurdle lies in the high costs associated with sample fabrication and acquisition speed. As costs rise, the speed of acquisition generally improves; conversely, lower costs often result in decreased speeds, presenting a trade-off that complicates optimization. This issue creates a need for RNG systems that provide superior performance while also significantly reducing the costs of fabrication.
To address these challenges, we present an innovative RNG system that utilizes blood flow to generate speckle patterns via a microfluidic device. The distinct rheological properties of blood, enriched with a variety of cellular components, naturally enhance the complexity and entropy of the resulting speckle patterns, boosting the randomness of the generated numbers23. One of the standout features of our system is its modest sample requirement only 5 μl of blood is needed to capture speckle patterns at a speed of 1250 fps. This minimizes both costs and acquisition time, thereby increasing the system's accessibility. Our RNG system is the two-pass tuple-output von Neumann (2P-TO-VN) debiasing method, designed to ensure that the generated random bits are unbiased. This contributes to the overall unpredictability and robust security of the RNG while also increasing the number of generated bits. Furthermore, we confirmed a versatile key generation strategy, rigorously tested to meet the National Institute of Standards and Technology (NIST) standards for cryptographic applications24. This guarantees the generation of keys that are not only truly random but also entirely uncorrelated with one another, adding an additional layer of reliability.
Results
Speckle decorrelation time difference of random bits
Figure 1 illustrates the method for capturing speckle images of blood flow, a technique that leverages the scattering properties of laser light to emulate the randomness found in blood circulation. Building on this concept, we designed a system to generate random numbers as depicted in Fig. 2, where decorrelation time is a key measure of estimated randomness. Figure 3a,b shows the autocorrelation curve across 56 original speckle images compared with true and scrambled random bits. A noticeable difference in decorrelation times emerged when comparing the original images to the derived random bits. The original speckle images had a mean decorrelation time of 3.05 s with a standard deviation of ± 0.43, while the series of post-processed random bits of the classic von Neumann (CVN) image, CVN with scrambling, 2P-TO-VN, and 2P-TO-VN with scrambling image demonstrated remarkably consistent means and standard deviations: 1.542 ± 0.019, 1.538 ± 0.018, 1.551 ± 0.017, and 1.529 ± 0.013, respectively in Fig. 3c,d. These closely clustered values indicate a low to non-existent correlation between the 56 varied images, underscoring the effective randomness introduced by our processing technique.
Comparison of bit uniformity and correlation difference
To address potential biases in our data, we employed the von Neumann debiasing algorithm and examined the bit uniformity of original speckle images, which averaged 0.626, reflecting a skew. Post-application of the 2P-TO-VN debiasing algorithm, we observed an exemplary bit uniformity of 0.500 for both sets of data processed with 2P-TO-VN alone and combined with SCI, as shown in Fig. 4a, indicating an ideal balance of '1' and '0' bits. Further scrutiny using correlation analysis on 56 original and processed speckle images, as shown in Fig. 4b-d, revealed that the processed datasets achieved correlation values significantly lower than those of the original images by approximately 2,270 times. Moreover, when comparing the two processed datasets, the 2P-TO-VN with SCI variant demonstrated an 18.34% reduction in correlation value compared to the 2P-TO-VN images alone, suggesting that SCI processing further attenuates correlation. Specific correlation metrics for the original speckle images recorded an average of 0.01896 with a standard deviation of 0.016264. The processed data showed marked improvement, with 2P-TO-VN images having correlation values of 0.000453 and 0.000343, and 2P-TO-VN with SCI producing even lower correlations of 0.000383 and 0.000296. These findings robustly underscore the effectiveness of the 2P-TO-VN algorithm in achieving bit uniformity and minimizing correlation, thereby validating the statistical reliability of our random number generator based on blood flow speckle dynamics.
Comparison of random bit generation rate
The ability to extract a large number of bits is crucial, reflecting the potential to generate high-quality random sequences for applications across technology and science25,26. Notably, the initial analysis of speckle images consistently generated an output of 8.19 million bits on Fig. S1. Figure 5 clarifies this by illustrating the relationship between the bit generation rate and the volume of bits successfully retrieved. When processed via the CVN algorithm, the bits derived from both CVN images and those with SCI display average generation rates of 16.65 ± 2.27% and 23.37 ± 0.48%, respectively. By contrast, employing the 2P-TO-VN algorithm, which includes processing of the 2P-TO-VN image and 2P-TO-VN with SCI, yields higher average generation rates of 52.35 ± 3.34% and a more impressive 67.70 ± 2.43% for the 2P-TO-VN with SCI. These statistics underscore the benefit of the scrambling technique in enhancing the extractable bit quantity and validate the 2P-TO-VN algorithm's superiority over CVN in boosting bit generation efficiency27,28.
The result of NIST statistical test
The purpose of the NIST tests is to validate the security and unpredictability of digital encryption methods25,29. Table 1 shows chi-square (X2) test data, reflecting p values and acceptance ratios for analyzing random bit patterns. We segmented 56 unique bit patterns into 60 sequences for detailed statistical review. According to the table, all the bit patterns except those from the original speckle images have passed the stringent criteria of the seven NIST randomness assessments. For more specific information about the testing parameters and the rigorous standards of the NIST suite, refer to the supplementary Table S1. The original speckle image failed the NIST Statistical Randomness Tests for Binary Sequences (Table S2). However, the result of the CVN image by NIST Statistical Randomness Tests for Binary Sequences (Table S3), and the result of CVN with SCI by NIST Statistical Randomness Tests for Binary Sequences (Table S4), 56 2P-TO-VN image and 2P-TO-VN with SCI, successfully passed (Table 1a,b). These results confirm the statistical randomness of the processed bit sequences, proving their efficacy as secure, non-deterministic encryption keys for cryptographic applications.
Discussions
We have demonstrated a means to extract large-scale encryption keys inspired by biological processes. Using a small amount of blood through a microfluidic chip, we can obtain non-reproducible speckle images. The system described above utilizes blood flow, making it impossible to retrieve the same encryption key even when produced and experimented under identical conditions. This underscores the unpredictable bio-inspired RNG system as a complement to the security vulnerabilities of existing artificially generated RNGs. We captured the region of interest (ROI) using a small amount of blood (5 µl) and recorded it at a speed of 1250 fps using an sCMOS camera. To emphasize its non-periodic nature, we demonstrated that it is a high-speed RNG system based on the results of speckle decorrelation time and correlation average. Furthermore, this point indicates that as the frame rate increases, the amount of data also increases, which can be influenced by the camera’s performance. We transformed speckle images into random bits that can be used as large-scale encryption keys using the von Neumann extractor. Through the 2P-TO-VN debiasing algorithm, which is better than CVN, we can generate encryption keys with low compression rates and remove bias while maintaining practical data sizes. This was validated through bit uniformity and data volume, and it was demonstrated that the statistical properties were improved through the NIST statistical test.
The demand for highly secure methods to safeguard data, infrastructure, medical, and of financial transactions is paramount as society becomes more interconnected, particularly in the rapidly expanding Internet of Things (IoT) market30. In practical terms, the blood-inspired RNG system we've developed offers a promising avenue for real-world applications, particularly in areas requiring high security and data integrity. For instance, in the financial sector, this system could revolutionize the way sensitive transactions are encrypted, providing an additional layer of security against cyber threats. In healthcare, patient data could be protected with encryption keys generated through this system, ensuring confidentiality and privacy. Additionally, in the realm of cybersecurity, the unique and unpredictable nature of the keys generated by our system could significantly bolster defenses against hacking and unauthorized data access. The potential of this technology extends even further, including secure communications in defense and intelligence operations, where the integrity and confidentiality of information are paramount. By offering a high-speed, cost-effective, and highly secure RNG solution, our blood-inspired system is poised to redefine security protocols across these critical sectors.
In conclusion, we have showcased a new approach to RNG systems inspired by biological processes. This development suggests new possibilities for RNG applications, with the presented blood-inspired RNG technology affirmatively demonstrating the generation of true random number. The use of blood in creating RNG systems offers unique advantages, showcasing its role in enhancing randomness and security in various applications. Our innovative RNG system offers a two-fold advantage. First, it reduces the costs associated with RNG generation, making it a cost-effective solution. Second, it boosts output, enhancing the performance of the system. The potential applications of our blood flow-inspired RNG are extensive. It is poised to make a significant impact across various fields, including cryptography, computer security, and data encryption. Our study heralds a new frontier in RNG systems. By marrying affordability with high output, it opens up new possibilities and sets the stage for future advancements in the field of RNG systems.
Methods
Bio-inspired random number generation system
In our setup, a 50-mW green laser with a wavelength of 532 nm (PSU-III-LCD, Changchun New Industries Optoelectronics Tech Co., Ltd., China) directs its beam through a microfluidic chip. Blood flow within the microchannel is brought into focus under a 4X objective lens (Plan N 4X, NA 0.1, Olympus), and a speckle image is then recorded using a CMOS camera (Neo 5.5 sCMOS, Andor Technology Ltd., Belfast, UK. This CMOS camera operates with an exposure time of 0.8 ms and a high frame rate of 1250 frames per second, seamlessly capturing speckle images at a resolution of 128 × 512 pixels for subsequent data generation. To ensure a consistent starting point, data was extracted from 1000 frames, forming a total of 7 sets of experimental data. To preprocess the experimental data, we divided it into 8 partitions, each consisting of 32 × 256pixels, resulting in a total of 56 sets. Through this process, our RNG system, utilizing blood, has been confirmed to generate true random numbers at a rapid speed of 5.5 MHz. To enhance the image contrast, a linear polarizer positioned at a 90-degree angle, an aperture with a 5 mm diameter, and a tube lens with a 180 mm focal length are positioned in front of the camera. The schematic of the entire system is presented in Fig. 2.
Blood sample preparation
Study has approved by the Laboratory Animal Resource Center of the Gwangju Institute of Science and Technology (LARC GIST), as detailed on their website [https://larc.gist.ac.kr/]. These procedures were rigorously followed and formally approved under protocol GIST-2019–015 and all methods are reported in accordance with ARRIVE guidelines for reporting experiments. We collected blood samples from male Sprague Dawley rats aged 12–13 weeks, weighing between 250 and 280 g, by tail vein phlebotomy. For this, we administered 1 ml of blood through a 23G needle while the animals were anesthetized with isoflurane. We conducted these blood collections on a group of 11 rats, ensuring a rest period of at least two weeks between each procedure. The samples were immediately stored in citrate tubes (catalog #363083, 9NC 0.109 M Buffered Trisodium Citrate, BD Vacutainer, USA) for subsequent experiments.
Fabrication of microfluidic device and system operation
To construct the microfluidics channel as shown in Fig. S2, we applied soft photolithography to create channels with precise dimensions: 45 mm in length, 45 µm in height, and 1 mm in width. We made a PDMS slab by a standard process of mixing, degassing, and curing. This slab, composed of PDMS Sylgard 184 A/B (Dow Corning, South Korea), was then bonded to a cover glass via oxygen plasma treatment.
Our microfluidic system, detailed in Fig. 2b, comprised a vacuum generator incorporating a syringe pump in withdrawal mode, a solenoid valve, a 3-way valve, and a 50 ml syringe to account for dead volume. A syringe pump controlled the sample draw at a constant volume of 200 µL in fluctuation withdrawal mode, with a solenoid valve regulating the flow. During the experiment, we intentionally designed it with a large dead volume to stabilize pressure fluctuations. At the microchannel's outlet, we positioned a 1 mm diameter reservoir and observed it with an sCMOS camera. Before beginning our experiments, we allowed the laser a 5-min warm-up period to ensure stability. The monitoring process started when the blood sample was introduced at the inlet and flowed into the microchannel, reaching the designated ROI measuring 0.8 mm by 3.3 mm. Once in position, the solenoid valve was opened, and the camera began capturing images for analysis as the blood entered the ROI.
Image processing to generate binary keys with a von Neumann extractor
We have devised an algorithm for processing speckle pattern images obtained from blood flow to generate encryption keys. The algorithm converts the original speckle images into binary sequences through a binarization process, which thresholds pixel values against the mean, categorizing them as '0' or '1'. Prior to applying our Two-Pass Tuple-Output von Neumann (2P-TO-VN) algorithm, we enhance the rate of bit generation by scrambling the image. This methodology was assessed both with and without image scrambling in Fig. 6a and 6b to determine its efficacy. To mitigate biases and correlations inherent in laser-produced speckle patterns and varying lighting conditions, we employ the following steps in our 2P-TO-VN debiasing algorithm generation:
-
1.
Outputs of ‘00’ or ‘11’ are deleted.
-
2.
If the output is ‘01’ or ‘10’ only the first bit, such as ‘0’ of ‘01’ or ‘1’ of ‘10,’ is retained.
-
3.
In the second pass, bits discarded in the first pass are regrouped into quads, and the front and rear halves of each quad are compared.
-
4.
Discarded bits with different front and rear halves, such as ‘0011’ or ‘1100,’ are preserved
While the CVN debiasing method, known as 1 Pass tuple output von Neumann (1P-TO-VN), greatly reduces bit count due to its stringent compression, it has been noted that 2P-TO-VN offers a balance between bit retention and debiasing. By re-evaluating initially discarded bits, the 2P-TO-VN algorithm generates a more feasible volume of data for practical applications, as demonstrated in Fig. S3, making it a superior alternative to CVN for generating robust and usable encryption keys.
NIST statistical randomness tests for random bits generated from speckle images
To determine the quality of randomness of our random bits, we conducted a series of statistical tests using the National Institute of Standards and Technology Statistical Test Suite31. The NIST test suite is designed to quantitatively evaluate the randomness of binary sequences. The NIST test suite comprises 15 distinct tests, each designed to quantitatively measure different aspects of randomness in binary sequences. The tests include assessing frequency, block frequency, runs, longest runs of ones (LRO), serial, approximate entropy, cumulative sums (Cusums). Our evaluation involved aggregating binary sequences from 56 different random bits, ensuring an adequate stream length for seven of the statistical tests.
Speckle decorrelation time measurement
Laser speckle is interference of light after multiple scattering from an optically turbid medium such as whole blood32,33. This laser speckle pattern changes over time as the sample conditions are changed. The speckle pattern data can be collected for time t with the interval of τ. To calculate the electrical field autocorrelation, we used the electrical field autocorrelation function \({g}_{1}\left(\tau \right)\). The \({g}_{1}\left(\tau \right)\) is defined as,
where P(s) is the path length distribution in the sample, s is the path length, τ is the delay time, l* is the transport mean-free path, and τo is the characteristic decay time of the medium. At zero, the autocorrelation is expected to be in a value of 1, which means there are no variation during at this time34. However, as the time lags increases, those values should drop to close to zero, in which time the signal is no longer correlated as compared first time images. For confirmation of the bio-inspired true random bit generation, we measured decorrelation time between the two consecutive images from the time series of speckle pattern images at the point of 50%, as the blood moves through the microchannel.
Data analysis (bit uniformity, average correlation)
To evaluate the performance of random bits, we examine the digitized keys. Bit uniformity assesses how balanced the distribution of ‘0’ and ‘1’ bits is within the random bits. Specifically, it estimates how uniform the ratio of ‘0’s to ‘1’s is.
The uniformity of random bit sequences is often assessed by determining the Hamming weight, which is the count of '1' bits in a binary string of length 's'. For a set of random bits, the desired uniformity is achieved when the Hamming weight approaches 0.5, reflecting an equal distribution of '0' and '1' bits, as illustrated in Figs. 4a and S4a. Furthermore, we investigate the correlation between images using a correlation matrix. To ensure a fair comparison, random bits obtained through the von Neumann debiasing algorithm were quantified and matched to create uniform bit matrices. (e.g., original speckle image: 7.8 M bits, CVN image: 1.02 M bits, CVN with SCI: 1.8 M bits, 2P-TO-VN image: 3.3 M bits, 2P-TO-VN with SCI: 4.8 M bits).
We employ the Pearson correlation coefficient formula to quantify the correlation35. In the formula, x̅ and y̅ represent the means of the x and y values. A Pearson correlation coefficient, denoted as r, close to 0 indicates that there is no significant correlation between the two sets of random bits35 in Fig. 4b,d, S4b, and S5.
Data availability
Correspondence and requests for materials should be addressed to H.J.
References
Aumasson, J.-P. Serious Cryptography: A Practical Introduction to Modern Encryption (No Starch Press, 2017).
Chowdhury, S. et al. Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions. Preprint at https://arxiv.org/abs/2005.04344 (2005)
Buchanan, W. & Woodward, A. Will quantum computers be the end of public key encryption?. J. Cyber Secur. Technol. 1, 1–22 (2017).
Rezk, A. A., Madian, A. H., Radwan, A. G. & Soliman, A. M. Reconfigurable chaotic pseudo random number generator based on FPGA. AEU Int. J. Electron. Commun. 98, 174–180 (2019).
Tuna, M. A novel secure chaos-based pseudo random number generator based on ANN-based chaotic and ring oscillator: Design and its FPGA implementation. Analog Integr. Circ. Sig. Process 105, 167–181 (2020).
Etem, T. & Kaya, T. A novel true random bit generator design for image encryption. Physica A 540, 122750 (2020).
7Tehranipoor, F. Design and architecture of hardware-based random function security primitives. https://digitalcommons.lib.uconn.edu/dissertations/1512/ (2017).
Oishi, S. I. & Inoue, H. Pseudo-random number generators and chaos. IEICE Trans. 1976–1990(65), 534–541 (1982).
9Stipčević, M. & Koç, Ç. K. True random number generators. In Open Problems in Mathematics and Computational Science 275–315 (2014).
Bilan, S. Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generators: Emerging Research and Opportunities: Emerging Research and Opportunities (ed. Bilan, S) (2017).
11Degada, A. & Thapliyal, H. Harnessing uncertainty in photoresistor sensor for true random number generation in IoT devices. In 2020 IEEE International Conference on Consumer Electronics (ICCE) 1–5 (2020).
Fratalocchi, A., Fleming, A., Conti, C. & Di Falco, A. NIST-certified secure key generation via deep learning of physical unclonable functions in silica aerogels. Nanophotonics 10, 457–464 (2020).
Leem, J. W. et al. Edible unclonable functions. Nat. Commun. 11, 328 (2020).
Park, J. et al. Disordered heteronanostructures of MoS2 and TiO2 for unclonable cryptographic primitives. ACS Appl. Nano Mater. 4, 2076–2085 (2021).
Kim, M. S. et al. Revisiting silk: A lens-free optical physical unclonable function. Nat. Commun. 13, 247 (2022).
Voris, J., Saxena, N. & Halevi, T. Accelerometers and randomness: Perfect together. In Proceedings of the fourth ACM conference on Wireless network security 115–126 (2011).
Herrero-Collantes, M. & Garcia-Escartin, J. C. Quantum random number generators. Rev. Mod. Phys. 89, 015004 (2017).
Gras, G., Martin, A., Choi, J. W. & Bussières, F. Quantum entropy model of an integrated quantum-random-number-generator chip. Phys. Rev. Appl. 15, 054048 (2021).
Dias, L. M. S., Silvério, T. F. S., Sa Ferreira, R. A. & de Brito André, P. S. Random bit sequence generation from speckle patterns produced with multimode waveguides. IET Optoelectron. 16, 174–178 (2022).
Chen, K., Wang, P., Huang, F., Leng, X. & Yao, Y. Analysis of entropy source for random number generation based on optical PUFs. J. Appl. Phys. 133, 174502 (2023).
Arppe, R. & Sørensen, T. J. Physical unclonable functions generated through chemical methods for anti-counterfeiting. Nat. Rev. Chem. 1, 0031 (2017).
Ghulinyan, M. & Pavesi, L. Light Localisation and Lasing: Random and Pseudo-random Photonic Structures (ed. Ghulinyan, M., & Pavesi, L.) (Cambridge University Press, 2014).
Zeng, H. & Zhao, Y. Rheological analysis of non-Newtonian blood flow using a microfluidic device. Sens. Actuat. A Phys. 166, 207–213 (2011).
Alagic, G., et al. Status report on the first round of the NIST post-quantum cryptography standardization process. Preprint at https://doi.org/10.6028/NIST.IR.8240 (2019).
Rukhin, A., et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications. 22 Preprint at https://repository.root-me.org/Cryptographie/EN%20-%20NIST%20statistical%20test%20suite%20for%20random%20and%20pseudorandom%20number%20generators.pdf (2001).
Sangeetha, Y. et al. Authentication of symmetric cryptosystem using anti-aging controller-based true random number generator. Appl. Nanosci. 13, 1055–1064 (2023).
Maes, R., Van Der Leest, V., Van Der Sluis, E. & Willems, F. Cryptographic Hardware and Embedded Systems—CHES 2015: 17th International Workshop, Saint-Malo, France, Vol. 17 517–534 (2015).
Aysu, A., Wang, Y., Schaumont, P. & Orshansky, M. IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 134–139 (2017).
Bassham III, L. E., et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Sp 800–22 rev. 1a. (2010).
Ji, Z., Brown, J. & Zhang, J. True random number generator (TRNG) for secure communications in the era of IoT. In 2020 China Semiconductor Technology International Conference (CSTIC) 1–5 (2020).
Soto, J. Statistical testing of random number generators. In Proceedings of the 22nd National Information Systems Security Conference, Vol. 10, 99 (1999).
Vaz, P. G., Humeau-Heurtier, A., Figueiras, E., Correia, C. & Cardoso, J. Laser speckle imaging to monitor microvascular blood flow: A review. IEEE Rev. Biomed. Eng. 9, 106–120 (2016).
Jeon, H.-J. et al. Laser speckle decorrelation time-based platelet function testing in microfluidic system. Sci. Rep. 9, 16514 (2019).
Jeon, H.-J., Qureshi, M. M., Lee, S. Y. & Chung, E. Optofluidic laser speckle image decorrelation analysis for the assessment of red blood cell storage. Plos One 14, e0224036 (2019).
Erbay, C. & Ergün, S. NEWCAS. In 2019 17th IEEE International New Circuits and Systems Conference 1–4 (2019).
Acknowledgements
This research was jointly supported the "Innovative Human Resource Development for Local Intellectualization" support program (IITP-2023-RS-2023-00260267) supervised by the IITP and funded by the Ministry of Science and ICT (MSIT), Korea, the National Research Foundation of Korea (NRF) grant under the auspices of the Korea government (MEST) (RS-2023-00213379), and Korea and Regional Innovation Strategy (RIS)" through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (MOE)(2022RIS-005).
Author information
Authors and Affiliations
Contributions
I.K.Y. and H.J.J. conceived the idea and developed the experimental design. All authors worked on the algorithm design and physical measurements. J.H.H., B.Y.K., I.K.Y., and H.J.J conducted experiment. I.K.Y. and H.J.J mainly wrote the paper. H.J.J. directed the overall research. All of the authors discussed the results and the content.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary Information
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Yoon, I., Han, J.H., Park, B.U. et al. Blood-inspired random bit generation using microfluidics system. Sci Rep 14, 7474 (2024). https://doi.org/10.1038/s41598-024-58088-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-024-58088-6
Keywords
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.