A Reinforcement Learning System for Generating Instantaneous Quality Random Sequences

Random numbers are essential to most computer applications. Still, producing high-quality random sequences is a big challenge. Inspired by the success of artificial neural networks and reinforcement learning, we propose a novel and effective end-to-end learning system to generate pseudorandom sequences that operates under the upside-down reinforcement learning framework. It is based on manipulating the generalized information entropy metric to derive commands that instantaneously guide the agent toward the optimal random behavior. Using a wide range of evaluation tests, the proposed approach is compared against three state-of-the-art accredited pseudorandom number generators (PRNGs). The experimental results agree with our theoretical study and show that the proposed framework is a promising candidate for a wide range of applications.

[1]  Maurizio Parton,et al.  Pseudo Random Number Generation: a Reinforcement Learning approach , 2019, ANT/EDI40.

[2]  Filipe Wall Mutz,et al.  Training Agents using Upside-Down Reinforcement Learning , 2019, ArXiv.

[3]  Juergen Schmidhuber,et al.  Reinforcement Learning Upside Down: Don't Predict Rewards - Just Map Them to Actions , 2019, ArXiv.

[4]  Petar Alexandrov Nikolov,et al.  Analysis and Design of a Stream Cipher , 2019 .

[5]  Sukanta Das,et al.  A Search for Good Pseudo-random Number Generators : Survey and Empirical Studies , 2018, Comput. Sci. Rev..

[6]  Sarab M. Hameed,et al.  Utilizing Hopfield Neural Network for Pseudo-Random Number Generator , 2018, 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA).

[7]  Pasquale Malacaria,et al.  Pseudo-Random Number Generation using Generative Adversarial Networks , 2018, Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML.

[8]  Alex Sherstinsky,et al.  Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) Network , 2018, Physica D: Nonlinear Phenomena.

[9]  Ingrid Verbauwhede,et al.  On-chip jitter measurement for true random number generators , 2017, 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).

[10]  Adam Langley,et al.  ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS) , 2016, RFC.

[11]  Shai Ben-David,et al.  Understanding Machine Learning: From Theory to Algorithms , 2014 .

[12]  Apdullah Yayik,et al.  NEURAL NETWORK BASED CRYPTOGRAPHY , 2014 .

[13]  Safwan El Assad,et al.  Dynamic Adjustment of the Chaos-Based Security in Real-Time Energy Harvesting Sensors , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[14]  Wanlei Zhou,et al.  Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.

[15]  Elaine B. Barker,et al.  Transitioning the use of cryptographic algorithms and key lengths , 2011 .

[16]  Yoshua Bengio,et al.  Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.

[17]  Hongjun Wu,et al.  The Stream Cipher HC-128 , 2008, The eSTREAM Finalists.

[18]  Daniel J. Bernstein,et al.  The Salsa20 Family of Stream Ciphers , 2008, The eSTREAM Finalists.

[19]  Gordon Pipa,et al.  2007 Special Issue: Fading memory and time series prediction in recurrent networks with different forms of plasticity , 2007 .

[20]  C. Willmott,et al.  Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance , 2005 .

[21]  Heaton T. Jeff,et al.  Introduction to Neural Networks with Java , 2005 .

[22]  André Seznec,et al.  HAVEGE: A user-level software heuristic for generating empirically strong random numbers , 2003, TOMC.

[23]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[24]  D. A. Karras,et al.  Overfitting in multilayer perceptrons as a mechanism for (pseudo)random number generation in the design of secure electronic commerce systems , 2000, IEEE/AFCEA EUROCOMM 2000. Information Systems for Enhanced Public Safety and Security (Cat. No.00EX405).

[25]  S. Hochreiter,et al.  Long Short-Term Memory , 1997, Neural Computation.

[26]  Babak Sadeghiyan,et al.  A new universal test for bit strings , 1996, ACISP.

[27]  Patrick van der Smagt,et al.  Introduction to neural networks , 1995, The Lancet.

[28]  Pierre L'Ecuyer,et al.  Testing random number generators , 1992, WSC '92.

[29]  G. Marsaglia,et al.  A New Class of Random Number Generators , 1991 .

[30]  Leonid A. Levin,et al.  A hard-core predicate for all one-way functions , 1989, STOC '89.

[31]  Andrew Chi-Chih Yao,et al.  Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[32]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[33]  J J Hopfield,et al.  Neural networks and physical systems with emergent collective computational abilities. , 1982, Proceedings of the National Academy of Sciences of the United States of America.

[34]  Ho-Jin Choi,et al.  Pseudo Random Number Generation Using LSTMs and Irrational Numbers , 2018, 2018 IEEE International Conference on Big Data and Smart Computing (BigComp).

[35]  Omar Salhab,et al.  SURVEY PAPER : PSEUDO RANDOM NUMBER GENERATORS AND SECURITY TESTS , 2018 .

[36]  Ilya V. Chugunkov,et al.  Classification of pseudo-random number generators applied to information security , 2017, 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[37]  Salih Ergün,et al.  Security analysis of a chaos-based random number generator for applications in cryptography , 2015, 2015 15th International Symposium on Communications and Information Technologies (ISCIT).

[38]  Shashwat Raizada,et al.  Some results on analysis and implementation of HC-128 stream cipher , 2015 .

[39]  D. Rao,et al.  Using Layer Recurrent Neural Network to Generate Pseudo Random Number Sequences , 2012 .

[40]  Functionality Classes and Evaluation Methodology for Deterministic Random Number Generators , 2011 .

[41]  Taraneh Eghlidos,et al.  Practical Next Bit Test for Evaluating Pseudorandom Sequences , 2009 .

[42]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[43]  Takuji Nishimura,et al.  Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.