Download Publication

Quantum Random Number Generators
Release Date: 06/09/2016
Working Group: Quantum-safe Security
A random number is generated by a process whose outcome is unpredictable, and which cannot be reliably reproduced. Randomness, quantitatively measured by entropy, is the measure of uncertainty or disorder within a set of data. The higher the level of unpredictability, the more random the data is and the more valuable it becomes, particularly for cryptographic operations. In this report from CSA's Quantum-Safe Security Working Group, Quantum Random Number Generators will go over the impacts of randomness on security. For security or other applications where high quality randomness is needed, physical approaches are taken to generate random bits. Generators based on quantum physical processes deliver the highest quality random data. Contrary to classical physics, quantum physics is fundamentally random.
Given the incomparable quality of the entropy delivered by such solutions, and their commercial viability, the challenges of selecting random number generators that will not expose your data to breaches has suddenly become much simpler. In fact, the question “What source of random should I use” has a simple, safe and commercially viable answer: Use Quantum!
Given the incomparable quality of the entropy delivered by such solutions, and their commercial viability, the challenges of selecting random number generators that will not expose your data to breaches has suddenly become much simpler. In fact, the question “What source of random should I use” has a simple, safe and commercially viable answer: Use Quantum!
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Acknowledgements

Frank Guanco
Operations Director, CSA
Frank Guanco
Operations Director, CSA

Bruno Huttner
Bruno Huttner
Bruno has co-chaired CSA’s Quantum-Safe Security working group, which was formed to address key generation and transmission methods and help the industry understand quantum‐safe methods for protecting their networks and their data, for approximately six years. As such, he has participated in writing most of the group’s research papers and has given several presentations about the group’s work. Bruno joined ID Quantique in 2014, where he’s r...

Jane Melia
Jane Melia

Nino Walenta
Nino Walenta

Richard Moulds
Richard Moulds
.jpg)
Anthony Fuller
Security Cloud Solution Architect
Anthony Fuller
Security Cloud Solution Architect
Are you a research volunteer? Request to have your profile displayed on the website here.
Interested in helping develop research with CSA?
Related Certificates & Training

Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more