SlideShare une entreprise Scribd logo
1  sur  30
Random Numbers Certified by Bell's Theoremby Pironio and 10 other authorsfrom 6 different universities and institutions. A brief introduction by David Kemp Licensed under a Creative Commons Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
Why? Pseudo random numbers may have patterns known to attackers. There is need for a source of randomness that can be verified to be genuinely random.  
Bell’s Inequality ,[object Object]
Proved “reality not separable from observation”.
Einstein died in 1955 believing reality must be separable from observation (see EPR paradox).,[object Object]
Only one blue-eyed female.
How many (max) blue-eyed right-handers?
At most one of them can be male.
At most one of them can be female.
Hence a maximum of 2.,[object Object]
In Probabilistic Terms Pr(blue-eyed right-hander) ≤ Pr(blue-eyed female) + Pr(right-handed male)
What if your data is incomplete? ,[object Object]
Are you a blue-eyed right-hander?
Are you a blue-eyed female?
Are you a right-handed male?,[object Object]
Are you a blue-eyed right-hander?
Are you a blue-eyed female?
Are you a right-handed male?Pr(blue-eyed right-hander) ≤ Pr(blue-eyed female) + Pr(right-handed male)  ONLY IF THEY DO NOT LIE!
Identical Twins ,[object Object]
No communication between the rooms.
Ask every person only one of these questions:
Are you blue-eyed?
Are you left-handed?
Are you female?
Sometimes ask both twins the same question.
Only way to avoid lie detection is prior agreement.,[object Object]
A', B' and C' are properties of twin,
 Pr(x & not(x')) = 0.THEN Pr(A & not(B')) + Pr(B & not(C')) ≥ Pr(A & not(C'))
A B C A B C Pairs of Magic Boxes Three buttons and two lights on each box
A B C A B C Magic Box Pairs Can only press one button on each box.

Contenu connexe

En vedette

Key Management System Presentation: Jaguar
Key Management System Presentation: JaguarKey Management System Presentation: Jaguar
Key Management System Presentation: Jaguar
m_phull
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
mdhar123
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 

En vedette (18)

Key Management System Presentation: Jaguar
Key Management System Presentation: JaguarKey Management System Presentation: Jaguar
Key Management System Presentation: Jaguar
 
Google drive on linux
Google drive on linuxGoogle drive on linux
Google drive on linux
 
Algorithms for Computer Games - lecture slides 2009
Algorithms for Computer Games - lecture slides 2009Algorithms for Computer Games - lecture slides 2009
Algorithms for Computer Games - lecture slides 2009
 
Random Number Generators
Random Number GeneratorsRandom Number Generators
Random Number Generators
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
Random number generation (in C++) – past, present and potential future
Random number generation (in C++) – past, present and potential future Random number generation (in C++) – past, present and potential future
Random number generation (in C++) – past, present and potential future
 
Pseudo Random Number Generators
Pseudo Random Number GeneratorsPseudo Random Number Generators
Pseudo Random Number Generators
 
What is pseudo random number
What is pseudo random numberWhat is pseudo random number
What is pseudo random number
 
Technology Trends in 2013-2014
Technology Trends in 2013-2014Technology Trends in 2013-2014
Technology Trends in 2013-2014
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Web前端性能优化 2014
Web前端性能优化 2014Web前端性能优化 2014
Web前端性能优化 2014
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta
 
Distribution of random numbers
Distribution of random numbersDistribution of random numbers
Distribution of random numbers
 
AWS Solutions Architect 準備心得
AWS Solutions Architect 準備心得AWS Solutions Architect 準備心得
AWS Solutions Architect 準備心得
 
Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014
 
HITCON GIRLS 成大講座 基礎知識(蜘子珣)
HITCON GIRLS 成大講座 基礎知識(蜘子珣)HITCON GIRLS 成大講座 基礎知識(蜘子珣)
HITCON GIRLS 成大講座 基礎知識(蜘子珣)
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 

Similaire à Random Numbers Certified By Bells Theorem

Chi square[1]
Chi square[1]Chi square[1]
Chi square[1]
sbarkanic
 
Chi Square
Chi SquareChi Square
Chi Square
Jolie Yu
 
Introduction to Probability
Introduction to ProbabilityIntroduction to Probability
Introduction to Probability
mscartersmaths
 
Week 3 Homework (HW3) LANE C5 AND ILLOWSKY C3 AND C4OVERVIEW O.docx
Week 3 Homework  (HW3)  LANE C5 AND ILLOWSKY C3 AND C4OVERVIEW O.docxWeek 3 Homework  (HW3)  LANE C5 AND ILLOWSKY C3 AND C4OVERVIEW O.docx
Week 3 Homework (HW3) LANE C5 AND ILLOWSKY C3 AND C4OVERVIEW O.docx
cockekeshia
 
PAGE UMUC Asia DE lab – Evolution© UMUC – all rights reserv.docx
PAGE  UMUC Asia DE lab – Evolution© UMUC – all rights reserv.docxPAGE  UMUC Asia DE lab – Evolution© UMUC – all rights reserv.docx
PAGE UMUC Asia DE lab – Evolution© UMUC – all rights reserv.docx
alfred4lewis58146
 

Similaire à Random Numbers Certified By Bells Theorem (17)

Pre-Cal 40S June 1, 2009
Pre-Cal 40S June 1, 2009Pre-Cal 40S June 1, 2009
Pre-Cal 40S June 1, 2009
 
What are the chances? - Probability
What are the chances? - ProbabilityWhat are the chances? - Probability
What are the chances? - Probability
 
Unit 11.2 theoretical probability
Unit 11.2 theoretical probabilityUnit 11.2 theoretical probability
Unit 11.2 theoretical probability
 
Probability basics and bayes' theorem
Probability basics and bayes' theoremProbability basics and bayes' theorem
Probability basics and bayes' theorem
 
Statistics 1 (FPN) QP
Statistics 1 (FPN) QPStatistics 1 (FPN) QP
Statistics 1 (FPN) QP
 
Algebra unit 9.6.2
Algebra unit 9.6.2Algebra unit 9.6.2
Algebra unit 9.6.2
 
Algebra unit 9.6.2
Algebra unit 9.6.2Algebra unit 9.6.2
Algebra unit 9.6.2
 
Chi Square
Chi SquareChi Square
Chi Square
 
Chi square[1]
Chi square[1]Chi square[1]
Chi square[1]
 
Basic concept of probability
Basic concept of probabilityBasic concept of probability
Basic concept of probability
 
Chi Square
Chi SquareChi Square
Chi Square
 
5. probability qt 1st tri semester
5. probability qt 1st tri semester 5. probability qt 1st tri semester
5. probability qt 1st tri semester
 
Introduction to Probability
Introduction to ProbabilityIntroduction to Probability
Introduction to Probability
 
What are the chance? - Probability
What are the chance? - ProbabilityWhat are the chance? - Probability
What are the chance? - Probability
 
probability
probabilityprobability
probability
 
Week 3 Homework (HW3) LANE C5 AND ILLOWSKY C3 AND C4OVERVIEW O.docx
Week 3 Homework  (HW3)  LANE C5 AND ILLOWSKY C3 AND C4OVERVIEW O.docxWeek 3 Homework  (HW3)  LANE C5 AND ILLOWSKY C3 AND C4OVERVIEW O.docx
Week 3 Homework (HW3) LANE C5 AND ILLOWSKY C3 AND C4OVERVIEW O.docx
 
PAGE UMUC Asia DE lab – Evolution© UMUC – all rights reserv.docx
PAGE  UMUC Asia DE lab – Evolution© UMUC – all rights reserv.docxPAGE  UMUC Asia DE lab – Evolution© UMUC – all rights reserv.docx
PAGE UMUC Asia DE lab – Evolution© UMUC – all rights reserv.docx
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Random Numbers Certified By Bells Theorem