Papers
Topics
Authors
Recent
Search
2000 character limit reached

Digital Coherent-State QRNG Using System-Jitter Entropy via Random Permutation

Published 11 Dec 2025 in quant-ph and cs.CR | (2512.11107v1)

Abstract: We present a fully digital framework that replicates the statistical behavior of coherent-state quantum random number generation (QRNG) by harnessing system timing jitter through random permutation processes. Our approach transforms computational timing variations from hardware and operating system sources into permutation dynamics that generate Poisson-distributed numbers, accurately reproducing the photon statistics of optical coherent states. The theoretical foundation is established by the Uniform Convergence Theorem, which provides exponential convergence to uniformity under modular projection with rigorous error bounds. Extensive experimental validation across multiple parameter regimes and sample sizes up to $108$ bytes demonstrates exceptional performance: Shannon entropy approaching 7.999998 bits/byte and min-entropy exceeding 7.99 bits/byte, outperforming theoretical bounds at scale. The architecture inherently resists side-channel attacks through compound timing distributions and adaptive permutation behavior, while operating without classical cryptographic post-processing. Our results establish that coherent-state QRNG functionality can be entirely realized through classical computational processes, delivering mathematically provable uniformity and practical cryptographic security without quantum photonic hardware.

Authors (1)

Summary

  • The paper presents a digital emulation framework for quantum random number generation by harnessing system timing jitter and random permutations.
  • It rigorously maps the Poisson statistics of coherent optical states to a modular projection method that produces uniform outputs with exponentially decaying error bounds.
  • Experimental validation in a Java implementation shows precise moment matching and high entropy outputs that meet NIST SP 800-90B benchmarks.

Digital Emulation of Coherent-State Quantum Random Number Generation via System Jitter Entropy and Random Permutation

Introduction and Motivation

This work presents a rigorous framework for fully digital emulation of coherent-state quantum random number generation (QRNG) through system timing jitter–driven random permutation processes (2512.11107). The methodology establishes that the statistical underpinnings of quantum coherent states—traditionally yielding irreducible randomness derived from the quantum granularity of light—can be mapped, controlled, and certified through physical entropy inherent in classical computation platforms. The approach is motivated by the operational and practical limitations of conventional QRNGs, including dependency on specialized photonic hardware and elaborate post-processing, which constrain their widespread cryptographic deployment.

Theoretical Framework: Statistical Equivalence of Quantum and Classical Domains

The central result elaborates the precise statistical equivalence between physical coherent-state photon counting and software-based emulation rooted in the structure of Poisson statistics. Coherent states α|\alpha\rangle, parameterized by complex amplitude α\alpha, yield Poisson-distributed photon numbers P(n)=eα2α2n/n!P(n)=e^{-|\alpha|^2}{|\alpha|^{2n}}/{n!}, characterized by mean and variance μ=α2\mu=|\alpha|^2. This discrete statistical structure constitutes the irreducible quantum resource in standard QRNGs.

The digital replication pipeline replaces physical quantization with a Random Permutation Sorting System (RPSS) driven by system-level timing jitter. Counts npn_p are generated pseudo-randomly but are rendered non-deterministic via feedback from permutation execution times T^\hat{T}, which encode entropy from microarchitectural and OS-level nondeterminism. This creates a direct analogy: the count observable in quantum optics finds its counterpart in permutation count, and the unobservable phase/timing uncertainty is mirrored by execution time fluctuations. Figure 1

Figure 1: RPSS architecture for digital replication of Poisson statistics with recursive entropy injection via permutation timing feedback.

Crucially, the mapping from Poisson statistics to cryptographically uniform output is controlled by modular projection: R=npmodMR = n_p \bmod M. The paper rigorously proves the Poisson Modular Convergence Theorem, which delineates the exponential convergence of residue classes to uniformity as a function of μ\mu and modulus MM, with error bounds that decay as exp(2μsin2(π/M))\exp\left(-2\mu \sin^2(\pi/M)\right). This provides a mathematically strict certificate for the transformation from quantum-inspired Poisson input to uniform digital randomness.

Experimental Realization and Statistical Validation

The digital RPSS architecture is instantiated in Java, leveraging high-resolution timing sources (System.nanoTime, ~100ns granularity) for entropy injection. In each generation cycle, a Poisson(μ\mu) random count is sampled, triggering Fisher-Yates permutations of small arrays. Execution times of these operations are used to advance the PRNG state, ensuring unpredictability and non-reproducibility—even with identical seeds.

Comprehensive experimental validation is presented for small (μ=7\mu=7) and large (μ=100\mu=100) Poisson means. Replicated statistics exhibit close agreement with theory across all four moments, affirming the property n=(Δn)2\langle n \rangle = \langle (\Delta n)^2 \rangle. Figure 2

Figure 2: Digital replication of coherent-state Poisson(μ=100\mu=100): Empirical and theoretical PMFs are nearly indistinguishable, verifying precise moment matching and distributional fidelity.

(RPSS moment validation details omitted here for brevity but match the paper: means, variances, skewness, kurtosis are within 0.01%\sim 0.01\% of theory for both regimes.)

Elapsed timing data further demonstrate non-ideal, composite characteristics, reflecting the convolution of microarchitectural entropy sources. This ensures high min-entropy injection at every cycle while simultaneously preserving output Poisson statistics. Figure 3

Figure 3

Figure 3: Compound elapsed time distribution for Poisson(μ=100\mu=100): Execution time statistics reveal layered entropy injection through system jitter.

Uniformity, Entropy Analysis, and Security

Application of modular projection to digitally replicated Poisson counts yields output bytes with Shannon entropy and min-entropy tightly converged to theoretical maxima (e.g., 7.999998 bits/byte at 10810^8-byte scale, min-entropy exceeding 7.99 bits/byte). Empirical results exceed NIST SP 800-90B benchmarks and theoretical lower bounds for practical moduli, with χ2\chi^2 statistics indistinguishable from the ideal uniform distribution across all experiments.

The security treatment is twofold. Information-theoretic security is guaranteed by analytic lower bounds on conditional min-entropy, parameterized by adversarial side information AA, and remains robust against computationally unbounded adversaries. Computational security is enhanced by active timing obfuscation, microarchitectural entropy amplification (engaging caches, speculative execution, etc.), and inherent forward secrecy stemming from continual entropy refresh through non-observable timing channels.

Notably, both statistical and security properties are rigorously validated without recourse to post-processing via cryptographic primitives, a common requirement in physical QRNG devices.

Implications, Extensions, and Future Directions

The digital coherent-state QRNG architecture reframes the quantum-classical boundary in randomness generation. It demonstrates that the core statistical signature enabling quantum-certified randomness—irreducible Poissonian noise—can be realized, monitored, and certified via classical computational means, provided sufficient access to physically rooted system entropy. This finding has several direct implications:

  • Practical deployments: High-quality quantum-grade randomness can be delivered at scale on commodity digital hardware, removing the reliance on specialized optical components and complex calibration pipelines.
  • Security and cryptography: Mathematical guarantees for uniformity and unpredictability, robust to both information-theoretic and practical adversaries, enable immediate applicability in key generation and protocol design.
  • Hybrid and dynamic adaptation: The framework supports seamless switching or mixing between hardware (photonic) and digital randomness sources, guided by application constraints or entropy monitoring.
  • Generalizability: The architecture is shown to naturally extend to other quantum-inspired statistical regimes (e.g., Binomial, Negative Binomial), facilitating software-based emulation of a broader class of quantum random processes.

Potential avenues for further development include formal cryptographic proofs for composite pipeline security, leveraging real-time entropy monitors and ML-based adaptation of system parameters, and porting the RPSS core to hardware accelerators or secure enclaves.

Conclusion

This work establishes, both theoretically and experimentally, that a fully digital architecture composed of system-jitter driven random permutations, mathematically certified modular projection, and analytic entropy analysis can replicate the essential statistical properties of coherent-state QRNGs. The central result is the removal of a strict physical quantum-classical dichotomy: high-quality uniform randomness, conventionally bound to optical quantum phenomena, becomes a function of stochastic computation and physically coupled entropy processes. The RPSS-based architecture offers verifiable, high-throughput, and secure random number generation, suitable for deployment in cryptographic and scientific computation environments. The general methodological approach positions digital, quantum-inspired RNG as a practical and theoretically robust alternative to physical QRNG implementations.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We found no open problems mentioned in this paper.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 4 likes about this paper.