Random number generators underpin much of modern digital security, yet a critical vulnerability exists in how these devices are currently validated, according to new research. Yifan Chen, Dong Wang, Yibo Zhao, and colleagues from the Institute of Software, Chinese Academy of Sciences, and other institutions, demonstrate that standard post-processing techniques, designed to improve randomness, can effectively conceal physical attacks on the generator itself. The team shows that even severely compromised raw data, failing fundamental randomness tests, can be transformed into a certified random sequence after undergoing a common extraction process, creating a false sense of security. This discovery reveals a profound flaw in current validation methods, which focus solely on the final output and overlook the potential for attacks on the underlying entropy source, demanding a shift towards more comprehensive security assessments.
Statistical Detectability of Attacks After Extraction
Current designs of Quantum Random Number Generators (QRNGs) typically use randomness extraction to lessen the impact of imperfections in the quantum source. This work investigates the statistical detectability of physical attacks on QRNGs following randomness extraction, challenging the idea that extraction guarantees statistical invisibility. The motivation stems from the increasing use of QRNGs in critical applications, where the integrity of random numbers is paramount. While randomness extraction is a widely adopted security measure, a comprehensive understanding of its limitations is crucial.
This study addresses whether an attacker, with partial knowledge of the QRNG’s internal state, can still detect the attack through statistical analysis of the extracted random numbers. The potential for subtle biases to accumulate and become detectable, even after extraction, poses a significant threat to the security of QRNG-based systems. The primary objective is to determine the minimum detectable bias, or the threshold beyond which an attacker can reliably identify the attack. This involves developing a statistical framework for quantifying the detectability of biases and applying it to analyze the performance of different extraction algorithms. Ultimately, this work aims to provide a more nuanced understanding of the security implications of randomness extraction in QRNGs and to inform the design of more robust and secure random number generation systems.
Extraction Conceals Quantum Source Imperfections
Designs of Quantum Random Number Generators (QRNGs) typically employ post-processing techniques to refine raw random data, followed by statistical verification. This paper demonstrates a critical flaw in this widely adopted practice: the powerful extraction process can create a false sense of security by perfectly concealing physical-layer biases. Researchers investigated the impact of these extraction techniques on the ability to detect subtle imperfections in the underlying quantum source. The methodology involves a detailed analysis of the statistical properties of both the raw and extracted random number sequences, using theoretical modelling and numerical simulations.
Specifically, the team examined how different extraction algorithms affect the ability to identify correlations and non-random behaviour in the generated numbers. The study reveals that even if a QRNG exhibits significant physical-layer biases, the extraction process can effectively mask these imperfections, leading to the false conclusion that the generated numbers are truly random. This poses a serious security risk, as an attacker could exploit these hidden biases to predict or manipulate the generated random numbers.
Physical Manipulation Compromises Quantum Randomness
This research paper details a significant security vulnerability in Quantum Random Number Generators (QRNGs), specifically highlighting a physical-layer attack that can compromise their randomness. The core problem is that QRNGs are not inherently secure; the implementation of these generators is susceptible to manipulation. Physical components used to detect quantum events can be subtly influenced, leading to predictable outputs. The researchers successfully demonstrated an attack that manipulates the detection process within a QRNG, biasing the measurement of the quantum process and creating a correlation between the generated numbers and the attacker’s control.
This vulnerability is particularly dangerous because it’s difficult to detect through standard statistical randomness tests; the generated numbers appear random while being subtly controlled. The attack focuses on the photodetector used to register single photons, a common component in many QRNGs. The researchers subtly manipulate the bias voltage of the photodetector, shifting the detection threshold and altering the probability of detecting a photon, introducing a correlation between the generated bits and the applied bias. This manipulation is designed to be small enough to avoid triggering obvious anomalies, allowing the attack to remain undetected by standard randomness tests.
The implications of this attack are significant, compromising the security of applications relying on QRNGs for cryptographic keys, simulations, or other sensitive tasks. Enhanced security measures are needed, including real-time monitoring of the physical entropy source, physical security measures to protect the QRNG hardware, advanced detection techniques to identify subtle biases, and a broader recognition of the importance of considering physical-layer attacks on all security-critical systems. Key takeaways include that QRNGs are not a silver bullet for randomness, implementation details matter, statistical tests alone are insufficient to guarantee QRNG security, physical-layer security is crucial, and continuous monitoring of the physical entropy source is essential. This research serves as a wake-up call for the QRNG community, emphasizing the need for a holistic approach to security that considers both the quantum process and the physical implementation.
Post-processing Conceals QRNG Physical Attacks
This research demonstrates a critical flaw in the standard security validation of quantum random number generators (QRNGs). The study reveals that powerful post-processing techniques can inadvertently conceal physical-layer attacks on the entropy source, potentially leading to false certification of a compromised device. The team experimentally demonstrated this vulnerability by compromising an amplified spontaneous emission (ASE)-based QRNG with a power supply ripple attack. While the initial raw data failed standard security tests, the application of a common randomness extraction algorithm allowed it to pass all statistical validations. This outcome highlights that a QRNG can meet certification criteria even when its underlying quantum process is under external control, posing a significant risk to applications like cryptography.
👉 More information
🗞 Statistical Invisibility of a Physical Attack on QRNGs After Randomness Extraction
🧠 ArXiv: https://arxiv.org/abs/2508.21498
