Random numbers are essential for cryptography. In most real-world systems, these values come from a cryptographic pseudorandom number generator (PRNG), which in turn is seeded by an entropy source. The security of the entire cryptographic system then relies on the accuracy of the claimed amount of entropy provided by the source. If the entropy source provides less unpredictability than is expected, the security of the cryptographic mechanisms is undermined, as in [5, 7, 10]. For this reason, correctly estimating the amount of entropy available from a source is critical. In this paper, we develop a set of tools for estimating entropy, based on mechanisms that attempt to predict the next sample in a sequence based on all previous samples. These mechanisms are called predictors. We develop a framework for using predictors to estimate entropy, and test them experimentally against both simulated and real noise sources. For comparison, we subject the entropy estimates defined in the August 2012 draft of NIST Special Publication 800-90B  to the same tests, and compare their performance.
Cryptographic Hardware and Embedded Systems -- CHES 2015
September 13-16, 2015
17th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015)
, McKay, K.
and Sonmez Turan, M.
Predictive Models for Min-Entropy Estimation, Cryptographic Hardware and Embedded Systems -- CHES 2015, Saint-Malo, FR, [online], https://doi.org/10.1007/978-3-662-48324-4_19, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=918415
(Accessed October 1, 2022)