Features
Vital Role of True Randomness in Modern Computing
The critical need for true randomness in cryptography, simulations, and more
True randomness is essential for encryption, statistical sampling, simulations, and more computing applications to work effectively. We explore why.
The concept of randomness often evokes thoughts of unpredictability and chance occurrences. However in the world of computing, having access to true randomness is vital for many critical applications to function properly. Without the ability to generate random values and data, key aspects of modern technology simply would not work reliably.
In this article, we will explore what constitutes true randomness from a computational perspective, why it is crucially important, and some of the ways that software and hardware attempt to produce randomness reliably. Gaining insight into this topic highlights the dependence much of digital functionality has on the availability of non-deterministic, uniformly distributed random data.
What Makes Randomness “True”?
For data to be considered truly random from an information theory perspective, values must satisfy key mathematical and statistical qualities, for example at Lucky Seven Casino. True randomness implies meeting three core criteria:
- Uniform distribution — All potential values have an equal probability of occurring so that no bias exists towards certain numbers.
- Independence — The value at any position does not relate to or depends on values at other positions. Previous numbers do not influence future ones.
- Unpredictability — Knowing some values provides no useful information to predict other values. Guessing upcoming numbers is mathematically impossible.
Hence, true randomness requires generated data featuring high entropy (information density) with no observable patterns or correlations over any length or time period analyzed. Values must pass various statisticatests of randomness to qualify. True randomness exists only in specific natural phenomena scientists believe exhibit fundamental uncertainty such as radioactive decay. Computational methods can attempt to produce randomness but technically generate only an approximation usually called pseudo-randomness. However for many practical purposes, computationally generated randomness proves sufficient if it passes robust statistical testing.
Why True Randomness Matters Cryptography
Arguably, the area with the most crucial dependence on true randomness is cryptography. All modern encryption technologies require random number generation to ensure security. Encryption systems work by utilizing random numbers for:
- Key generation
- Initialization vectors
- Salts
- Nonces
- Padding
Any bias, predictability or correlation within random values used for the above purposes significantly compromises encryption protocols and introduces vulnerabilities. With trillions of dollars transferred online daily and vast amounts of sensitive data stored digitally, safeguarding cryptography requires high-quality random number generation rooted in solid entropy sources.
Simulations & Modeling
Outside of security, many more computing applications need randomness to operate correctly per their design intent. Monte Carlo simulations extensively utilize randomness to model complex real-world behaviors by running many iterations with differing random inputs. Financial analysis, climate modeling, nuclear reactions and molecular behavior represent common Monte Carlo simulation applications.
Games, Artificial Intelligence & Machine Learning
Gaming, AI and ML commonly incorporate randomness to increase variation, introduce unpredictability, and improve realism. For example, non-player characters in video games use randomness for movement, dialog and behavior to feel more lifelike and less robotic. AI/ML leverage randomness to train networks more thoroughly against a wider possibility space and build more resilient models less prone to biases.
Generating True Randomness via Hardware
Given the pervasive need for genuine randomness across computing, how do software and hardware reliably produce it? Most systems today use either specialized hardware random number generators or hybrid combinations of hardware and software.
Hardware options utilize the inherent randomness within low-level physical phenomena to produce entropy. Different techniques for generating randomness exist but most hardware implementations focus on three main sources:
- Thermal Noise
- Semiconductor Quantum Physics
- Chaotic Oscillator Outputs
| Generator Type | Description |
| Thermal Noise | Amplifies and extracts random electrical noise from resistor thermal vibrations |
| Quantum Physics | Leverages quantum mechanical properties like photon emission timing from LEDs/lasers |
| Chaotic Circuits | Uses unpredictable oscillator circuit outputs from chaos theory |
Semiconductor-based solutions can generate high bitrates up to 5Gbps using compact modern chip fabrication allowing extensive harvestingof entropy. However these sources derive from complex, random physical processes proving impossible to predict or fully model mathematically. This unpredictability provides excellent entropy quality unattainable via software algorithms alone.
Most general-purpose computers now integrate random number generators within CPUs allowing applications access to decent hardware-based random data. For the highest security use cases, dedicated standalone hardware random number generators exist exceeding >100Gbps speeds. Hence accessing genuine randomness is available today even on common computing devices.
Cryptographically Secure Pseudo-Random Number Generators
While hardware mechanisms utilize hard-to-predict physical phenomena to produce randomness, software solutions must take a different approach. Algorithmically-generated randomness cannot achieve true randomness from a physics perspective. However clever mathematical techniques like cyclical algorithms can generate randomness passing many statistical tests of randomness within their output bit length limits.
Cryptographically secure pseudo-random number generators (CSPRNG) serve as the premier software-based method for generating randomness. CSPRNGs work by repeatedly applying cryptographic primitives like hash or cipher functions on initial random seed values. This process produces a chain of output bits not reproducible without the original seed key. Leading CSPRNG algorithms include:
- Hash_DRBG
- HMAC_DRBG
- CTR_DRBG
Software libraries implement these CSPRNGs so developers can integrate quality randomness into applications with proper seeding. Seeding establishes the initial starting point for randomness generation using an entropy source like hardware random number generators or timing variability.
CSPRNGs allow the production of vast quantities of randomized data for any purpose needed. Compared to hardware mechanisms limited by physics on maximum speeds, algorithms scale boundlessly in the bits created as long as adequate computational power exists.
Yet key differences between software and hardware randomness remain. While CSPRNG outputs pass statistical testing and contain no observable patterns, their pseudo-randomness means given the same seed, the exact same value sequence will generate each time. Also, if a CSPRNG algorithm or implementation has flaws, adversaries could predict and exploit output resulting in compromised security. Still, with proper cryptographic design and regular reseeding, CSPRNGs provide quality randomness for most software needs.
Conclusion
From the above exploration, we see true randomness plays a pivotal role across computing – from cybersecurity to simulations and beyond. While no substitutes for true physically-derived entropy exist, modern hardware and hybrid hardware-software solutions provide abundant randomness for practical usage.
However as computing continues evolving with new technologies like quantum, ensuring high-quality randomness generation tackles emerging information security and system reliability challenges. Access to ample true randomness stands necessary now for current computing functionality and lays the foundation for future innovation.
Features
Susan Silverman: diversification personified
By GERRY POSNER I recently had the good fortune to meet, by accident, a woman I knew from my past, that is my ancient past. Her name is Susan Silverman. Reconnecting with her was a real treat. The treat became even better when I was able to learn about her life story.
From the south end of Winnipeg beginning on Ash Street and later to 616 Waverley Street – I can still picture the house in my mind – and then onward and upwards, Susan has had quite a life. The middle daughter (sisters Adrienne and Jo-Anne) of Bernie Silverman and Celia (Goldstein), Susan was a student at River Heights, Montrose and then Kelvin High School. She had the good fortune to be exposed to music early in her life as her father was (aside from being a well known businessman) – an accomplished jazz pianist. He often hosted jam sessions with talented Black musicians. As well, Susan could relate to the visual arts as her mother became a sculptor and later, a painter.
When Susan was seven, she (and a class of 20 others), did three grades in two years. The result was that that she entered the University of Manitoba at the tender age of 16 – something that could not happen today. What she gained the most, as she looks back on those years, were the connections she made and friendships formed, many of which survive and thrive to this day. She was a part of the era of fraternity formals, guys in tuxedos and gals in fancy “ cocktail dresses,” adorned with bouffant hair-dos and wrist corsages.
Upon graduation, Susan’s wanderlust took her to London, England. That move ignited in her a love of travel – which remains to this day. But that first foray into international travel lasted a short time and soon she was back in Winnipeg working for the Children’s Aid Society. That job allowed her to save some money and soon she was off to Montreal. It was there, along with her roommate, the former Diane Unrode, that she enjoyed a busy social life and a place for her to take up skiing. She had the good fortune of landing a significant job as an executive with an international chemical company that allowed her to travel the world as in Japan, Hong Kong, New Zealand, Australia, Mexico, the Netherlands and even the USA. Not a bad gig.
In 1983, her company relocated to Toronto. She ended up working for companies in the forest products industry as well the construction technology industry. After a long stint in the corporate world, Susan began her own company called “The Resourceful Group,” providing human resource and management consulting services to smaller enterprises. Along the way, she served on a variety of boards of directors for both profit and non-profit sectors.
Even with all that, Susan was really just beginning. Upon her retirement in 2006, she began a life of volunteering. That role included many areas, from mentoring new Canadians in English conversation through JIAS (Jewish Immigrant Aid Services) to visiting patients at a Toronto rehabilitation hospital, to conducting minyan and shiva services. Few people volunteer in such diverse ways. She is even a frequent contributor to the National Post Letters section, usually with respect to the defence of Israel
and Jewish causes.
The stars aligned on New Year’s Eve, 1986, when she met her soon to be husband, Murray Leiter, an ex- Montrealer. Now married for 36 plus years, they have been blessed with a love of travel and adventure. In the early 1990s they moved to Oakville and joined the Temple Shaarei Beth -El Congregation. They soon were involved in synagogue life, making life long friends there. Susan and Murray joined the choir, then Susan took the next step and became a Bat Mitzvah. Too bad there is no recording of that moment. Later, when they returned to Toronto, they joined Temple Emanu-el and soon sang in that choir as well.
What has inspired both Susan and Murray to this day is the concept of Tikkun Olam. Serving as faith visitors at North York General Hospital and St. John’s Rehab respectively is just one of the many volunteer activities that has enriched both of their lives and indeed the lives of the people they have assisted and continue to assist.
Another integral aspect of Susan’s life has been her annual returns to Winnipeg. She makes certain to visit her parents, grandparents, and other family members at the Shaarey Zedek Cemetery. She also gets to spend time with her cousins, Hilllaine and Richard Kroft and friends, Michie end Billy Silverberg, Roz and Mickey Rosenberg, as well as her former brother-in-law Hy Dashevsky and his wife Esther. She says about her time with her friends: “how lucky we are to experience the extraordinary Winnipeg hospitality.”
Her Winnipeg time always includes requisite stops at the Pancake House, Tre Visi Cafe and Assiniboine Park. Even 60 plus years away from the “‘peg,” Susan feels privileged to have grown up in such a vibrant Jewish community. The city will always have a special place in her heart. Moreover, she seems to have made a Winnipegger out of her husband. That would be a new definition of Grow Winnipeg.
Features
Beneath the Prairie Calm: Manitoba’s Growing Vulnerability to Influence Networks
By MARTIN ZEILIG After reading Who’s Behind the Hard Right in Canada? A Reference Guide to Canada’s Disinformation Network — a report published by the Canadian AntiHate Network that maps the organizations, influencers, and funding pipelines driving coordinated right wing disinformation across the country — I’m left with a blunt conclusion: Canada is losing control of its political story, and Manitoba is far more exposed than we like to admit.
We often imagine ourselves as observers of political upheaval elsewhere — the U.S., Europe, even Alberta.
But the document lays out a sprawling, coordinated ecosystem of think tanks, influencers, strategists, and international organizations that is already shaping political attitudes across the Prairies. Manitoba is not an exception. In many ways, we’re a prime target.
The report describes a pipeline of influence that begins with global organizations like the International Democracy Union and the Atlas Network. These groups are not fringe. They are well funded, deeply connected, and explicitly designed to shape political outcomes across borders. Their Canadian partners translate global ideological projects into local messaging, policy proposals, and campaign strategies.
But the most concerning part isn’t the international influence — it’s the domestic machinery built to amplify it.
The Canada Strong and Free Network acts as a central hub linking donors, strategists, and political operatives. Around it sits a constellation of digital media outlets and influencer accounts that specialize in outrage driven content. They take think tank talking points, strip out nuance, and convert them into viral narratives designed to provoke anger rather than understanding.
CAHN’s analysis reinforces this point. The report describes Canada’s far right ecosystem as “coordinated and emboldened,” with actors who deliberately craft emotionally charged narratives meant to overwhelm rather than inform. They operate what the report characterizes as an “outrage feedback loop,” where sensational claims spread faster than journalists or researchers can contextualize them. The goal is not persuasion through evidence, but domination through repetition.
This is not healthy democratic debate.
It is a parallel information system engineered to overwhelm journalism, distort public perception, and create the illusion of widespread grassroots demand. And because these groups operate outside formal political structures, they face far fewer transparency requirements. Manitobans have no clear way of knowing who funds them, who directs them, or what their longterm objectives are.
If this feels abstract, look closer to home.
Manitoba has become fertile ground for these networks. Our province has a long history of political moderation, but also deep economic anxieties — especially in rural communities, resource dependent regions, and areas hit hard by demographic change. These are precisely the conditions that make disinformation ecosystems effective.
When people feel unheard, the loudest voices win.
We saw hints of this during the pandemic, when convoy aligned groups found strong support in parts of Manitoba. We see it now in the rise of local influencers who echo national talking points almost in real time. And we see it in the growing hostility toward institutions — from public health to the CBC — that once formed the backbone of civic trust in this province.
CAHN’s research also shows how quickly these networks can grow. Some nationalist groups have seen membership spikes of more than 60 percent in short periods, driven by targeted digital campaigns that exploit economic uncertainty and cultural anxiety. These surges are not organic. They are engineered.
The document also highlights the rise of explicitly exclusionary nationalist groups promoting ideas like “remigration,” a euphemism for mass deportation of nonEuropean immigrants. These groups remain small, but Manitoba’s demographic reality — a province where immigration is essential to economic survival — makes their presence especially dangerous. When extremist ideas begin to circulate within mainstream political networks, they gain a legitimacy they have not earned.
Even more troubling is how these ideas migrate.
CAHN warns that concepts once confined to fringe spaces are now being repackaged in sanitized language and pushed through influencers, think tanks, and political operatives seeking legitimacy. When these narratives appear alongside conventional policy debates, they gain a veneer of normalcy that obscures their origins.
None of this means Manitoba is on the brink of political collapse.
Our institutions remain resilient, and our political culture is still fundamentally moderate. But sovereignty is not just about borders or military power. It is also about information — who controls it, who manipulates it, and who benefits from its distortion. When opaque networks shape public opinion through coordinated disinformation, that sovereignty erodes.
CAHN’s broader warning is that trust itself is under attack. Farright networks intentionally target public institutions — media, universities, public health agencies, cultural organizations — because weakening trust creates a vacuum they can fill with their own narratives. A democracy becomes vulnerable when people no longer share a common set of facts.
The danger is not that Manitoba will suddenly adopt the politics of another country. The danger is that we will drift into a political environment shaped by forces we don’t see, don’t understand, and cannot hold accountable. A democracy cannot function if its information ecosystem is captured by actors who thrive on outrage, opacity, and division.
The solution is not censorship. It is transparency. It is rebuilding trust in journalism. It is demanding higher standards from the organizations that shape our political discourse. Manitobans deserve to know who is influencing their democracy and why.
We are not immune.
And believing we are immune is the most dangerous illusion of all.
Features
Israel Has Always Been Treated Differently
By HENRY SREBRNIK We think of the period between 1948 and 1967 as one where Israel was largely accepted by the international community and world opinion, in large part due to revulsion over the Nazi Holocaust. Whereas the Arabs in the former British Mandate of Palestine were, we are told, largely forgotten.
But that’s actually not true. Israel declared its independence on May 14,1948 and fought for its survival in a war lasting almost a year into 1949. A consequence was the expulsion and/or flight of most of the Arab population. In the immediate aftermath of the Second World War, millions of other people across the world were also driven from their homes, and boundaries were redrawn in Europe and Asia that benefited the victorious states, to the detriment of the defeated countries. That is indeed forgotten.
Israel was not admitted to the United Nations until May 11, 1949. Admission was contingent on Israel accepting and fulfilling the obligations of the UN Charter, including elements from previous resolutions like the November 29, 1947 General Assembly Resolution 181, the Partition Plan to create Arab and Jewish states in Palestine. This became a dead letter after Israel’s War of Independence. The victorious Jewish state gained more territory, while an Arab state never emerged. Those parts of Palestine that remained outside Israel ended up with Egypt (Gaza) and Jordan (the Old City of Jerusalem and the West Bank). They were occupied by Israel in 1967, after another defensive war against Arab states.
And even at that, we should recall, UN support for the 1947 partition plan came from a body at that time dominated by Western Europe and Latin American states, along with a Communist bloc temporarily in favour of a Jewish entity, at a time when colonial powers were in charge of much of Asia and Africa. Today, such a plan would have had zero chance of adoption.
After all, on November 10, 1975, the General Assembly, by a vote of 72 in favour, 35 against, with 32 abstentions, passed Resolution 3379, which declared Zionism “a form of racism.” Resolution 3379 officially condemned the national ideology of the Jewish state. Though it was rescinded on December 16, 1991, most of the governments and populations in these countries continue to support that view.
As for the Palestinian Arabs, were they forgotten before 1967? Not at all. The United Nations General Assembly adopted resolution 194 on December 11, 1948, stating that “refugees wishing to return to their homes and live at peace with their neighbours should be permitted to do so at the earliest practicable date, and that compensation should be paid for the property of those choosing not to return and for loss of or damage to property which, under principles of international law or equity, should be made good by the Governments or authorities responsible.” This is the so-called right of return demanded by Israel’s enemies.
As well, the United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) was established Dec. 8, 1949. UNRWA’s mandate encompasses Palestinians who fled or were expelled during the 1948 war and subsequent conflicts, as well as their descendants, including legally adopted children. More than 5.6 million Palestinians are registered with UNRWA as refugees. It is the only UN agency dealing with a specific group of refugees. The millions of all other displaced peoples from all other wars come under the auspices of the UN High Commissioner for Refugees (UNHCR). Yet UNRWA has more staff than the UNHRC.
But the difference goes beyond the anomaly of two structures and two bureaucracies. In fact, they have two strikingly different mandates. UNHCR seeks to resettle refugees; UNRWA does not. When, in 1951, John Blanford, UNRWA’s then-director, proposed resettling up to 250,000 refugees in nearby Arab countries, those countries reacted with rage and refused, leading to his departure. The message got through. No UN official since has pushed for resettlement.
Moreover, the UNRWA and UNHCR definitions of a refugee differ markedly. Whereas the UNHCR services only those who’ve actually fled their homelands, the UNRWA definition covers “the descendants of persons who became refugees in 1948,” without any generational limitations.
Israel is the only country that’s the continuous target of three standing UN bodies established and staffed solely for the purpose of advancing the Palestinian cause and bashing Israel — the Committee on the Exercise of the Inalienable Rights of the Palestinian People; the Special Committee to Investigate Israeli Practices Affecting the Human Rights of the Palestinian People; and the Division for Palestinian Rights in the UN’s Department of Political Affairs.
Israel is also the only state whose capital city, Jerusalem, with which the Jewish people have been umbilically linked for more than 3,000 years, is not recognized by almost all other countries.
So from its very inception until today, Israel has been treated differently than all other states, even those, such as the Democratic Republic of Congo, Somalia, and Sudan, immersed in brutal civil wars from their very inception. Newscasts, when reporting about the West Bank, use the term Occupied Palestinian Territories, though there are countless such areas elsewhere on the globe.
Even though Israel left Gaza in September 2005 and is no longer in occupation of the strip (leading to its takeover by Hamas, as we know), this has been contested by the UN, which though not declaring Gaza “occupied” under the legal definition, has referred to Gaza under the nomenclature of “Occupied Palestinian Territories.” It seems Israel, no matter what it does, can’t win. For much of the world, it is seen as an “outlaw” state.
Henry Srebrnik is a professor of political science at the University of Prince Edward Island.
