Introduction

Quantum random number generators (QRNGs) access the inherent randomness of quantum processes as a source of entropy in order to produce an unbiased and unpredictable output. These devices have been shown to have many prospective use cases, notably in cryptography1, simulation2, telecommunications3, and financial systems4.

In contrast to other physical random number generators, the unpredictability, which is a natural consequence of quantum mechanics, provides an abundant and uncomplicated source of randomness. Despite this relative availability, it is non-trivial to extract randomness from a quantum source due to the presence of technical noise arising from the imperfect nature of the measurement devices5.

In recent years, there have been many successful demonstrations of quantum random number generators in laboratories6,7,8, and several commercial products have entered the marketplace9. Besides this, there has been theoretical progress in more advanced QRNG schemes that allow public verification10, self-testing11 and even device-independent quantum random number generation12,13.

Of the many schemes to extract entropy from a photonic quantum system, we highlight: measuring the photon number statistics of a suitably attenuated source14, projective measurements of photon polarization orthogonal to the preparation basis15, and the measurement of interference between laser pulses with random phase16. Where entanglement is present, there are also opportunities to exploit the corresponding super-classical correlations to produce randomness which contains a degree of device independence12,13,17, or to generate so-called certified randomness17,18.

In this work, we describe the implementation of a quantum random number generator on an orbiting nanosatellite, SpooQy-119. While we are able to repurpose the satellite’s primary quantum optics payload for QRNG operation, constraints imposed by the resource-scarce platform restrict us to a simple scheme based on photon number statistics. In addition to the applications noted previously, orbiting random number generators enable the implementation of a resource known as a randomness beacon20. While a number of randomness beacons are currently accessible via the internet20,21, an orbiting beacon would be available to remote infrastructures with only sporadic, high-latency internet access, for example, monitoring stations connected via store-and-forward satellite services22,23. These installations could then make use of beacon pulses in applications such as time-stam** algorithms to increase the integrity of record-kee**, or for auditable input to a sampling process24. We describe here a proof-of-concept implementation of a public randomness beacon, and demonstrate the retrieval of beacon data via two distant ground stations, located in Switzerland and Singapore. Preliminary data from this publication was previously presented25, lacking detailed analysis and the demonstration of a prototype randomness beacon.

Results and discussion

The quantum optics payload on-board SpooQy-1 performs tomography on pairs of polarization-entangled photons generated from a spontaneous parametric down-conversion process. This paves the way to future implementation of entanglement-based quantum key distribution protocols such as Ekert9126 and BBM9227 in satellite-to-ground and satellite-to-satellite settings. For full details of the instrument, we refer readers to references19,28. Certified randomness can in principle be extracted from the correlation measurements of entangled photon pairs. However, the detection scheme on SpooQy-1 enables only the counting of coincident detections, and does not permit the time-stam** of individual events. Due to this design constraint, it is not feasible to utilize entanglement as a source of entropy for our QRNG. Instead, we take as our entropy source fluctuations in the discrete event rates captured during payload operation.

In the context of our QRNG implementation, it is sufficient to consider the production and detection of correlated photon pairs, with random detection times inherited from the statistical properties of the pump beam (see Fig. 1). The observation of shot noise in the measured event rate can be traced directly to the quantum description of the laser source, i.e., a coherent state [29, Chapter 8]. (see Supplementary note 1 for a discussion on shot noise as a randomness source).

Fig. 1: A high-level schematic of our quantum random number generator.
figure 1

A diode laser is used to pump (with mean photon counts/s, Sp) a spontaneous parametric down-conversion (SPDC) process based on bulk crystals. This results in the production of correlated pairs of photons, which inherit the random arrival time distribution from the pump field (see plotted call-outs). After removal of the pump light, these photon pairs are efficiently separated using a dichroic mirror (DM), and directed to two avalanche photodiode detectors (D1, D2) via two sets of optics implementing a polarization projection. Detectors D1 and D2 have mean photon counts/s, Si and Ss, respectively. Digitized electronic signals from the detectors are then combined with an AND gate, and coincident events are accumulated with a microcontroller (MC). For a detailed description of the optical payload, please refer to references19,28.

Photon pairs produced in the instrument are separated using a dichroic mirror and directed to two avalanche photodiodes. The digitized electronic signal from these detectors is routed to an AND gate and coincident detection events are recorded by a microcontroller.

Prior to detection, photons undergo polarization projection, implemented using a pair of liquid crystal polarization rotators and polarizers. This projection is used to select a measurement basis for each photon. When the same measurement bases are selected for both photons, the majority of coincident events are attributed to photon pairs. This approach allows accidental coincidences attributed to other sources (e.g., detector dark counts, stray light) to be rendered negligible by the use of a sufficiently short timing window. For example, in this implementation, they account for ~2% of the signal28,30, and this could be further reduced with more precise timing electronics.

As a direct consequence of the polarization entanglement generated by the optical system, any polarization basis measured simultaneously on both of the photons produce equivalent correlations. During QRNG operation, we select the diagonal basis to measure both of the photons. This detection scheme based on coincident events can be used to minimize the contribution from other entropy sources, significantly reducing the classical effect that would otherwise dominate the single detection channels. In the absence of any external noise source, random variations in the detected event rates can be traced to the quantization of the spontaneous parametric down-conversion field, which can be considered a uniform sampling of the photons in the pump beam. We use this as our raw entropy source.

Our approach resembles the work described by ref. 5, where random numbers are generated by sampling a coherent illuminating beam with a mobile phone camera. Due to the random inter-arrival times of the photons, the number of detected coincident events per unit of time may be expected to follow a Poisson distribution31. Care is taken to operate the instrument in a regime where the detectors are not saturated, preserving the Poissonian distribution of the source (see Supplementary note 2 for a discussion of how these statistics might be affected by detector recovery times). To extract uniform bits from this distribution we employ a Toeplitz hash-based extractor, as outlined in the Methods section.

To validate the uniformity of our QRNG’s output, a 35.6 kB sequence of random data generated in the laboratory is evaluated using the “Dieharder” test suite, and the result is visualized using the KS test (summarized in Fig. 2), alongside output generated using the C language RNG implementation32. In this analysis, the expectation for a random source is that the p value for each test should be distributed in the interval [0.01, 0.99]. Our data appears to conform to this expectation showing the empirically obtained p values remain close to the theoretical ideal line. This test also illustrates the limitations of such statistical analysis in assessing a random generator, specifically that such tests are restricted to the assessment of uniformity. The reader will note the similar performance obtained using the C RNG, which is pseudorandom and therefore entirely predictable with the knowledge of the seed.

Fig. 2: Statistical evaluation.
figure 2

We evaluate the (statistical) randomness of bits produced by our quantum random number generator. Data generated in laboratory setup passes all tests in the “Dieharder” suite (i.e., 0.01 < p < 0.99), illustrated here in the form of the KS test42 (blue curves) alongside a hypothetical ideal randomness source (black dashed line) and pseudorandom numbers generated using C RNG (yellow curves). This qualitative test sorts p values and plots them alongside values uniformly distributed over the interval [0,1].

Experiment performance in orbit

The experiment is repeated on-board SpooQy-1, after deployment in low Earth orbit. Due to the limited duty cycle of satellite operations and communication bandwidth, we are restricted to retrieve at most 256 random bits per trial. It is non-trivial to test the quality of randomness of such small datasets. For example, the “Dieharder” test is not suitable for these datasets33. However, one may estimate the quality of randomness of such short sequences of bits by observing the frequencies of occurrences of sub-strings of a particular length (namely the Borel normality condition)34, with a perfectly random sequence expected to produce a uniform distribution for each length. Figure 3 shows an analysis of 16896 random bits (i.e., the result of 66 trials in orbit), with the relative frequencies matching this expectation. For example, asymptotically the relative frequencies of occurrences of both 0 and 1 should be 50%, and occurrences of each of the strings 00, 01, 10, and 11 should be 25%. In our analysis of 66 trials, the occurrences of 0 and 1 are 49.8(3)% and 50.5(3)% respectively. The sequences 00, 01, 10, and 11 are observed with occurrences 24.5(4)%, 26.0(4)%, 24.3(4)%, and 25.0(4)% respectively.

Fig. 3: In-orbit data analysis.
figure 3

We analyze 66 runs of randomness beacon containing total 16,896 bits generated in orbit. For a limited data set of this size, tests such as “Dieharder” provide little meaningful insight. Instead, it is useful to compute the relative frequencies of occurrences of all binary sub-strings of length 1, 2, 3, … (the so-called Borel normality condition34). This analysis indicates a uniform distribution within error bars limited by finite sample size.

Implementing a prototype randomness beacon

A randomness beacon20 is a public, periodically updated source of randomness provided as a resource for a variety of tasks which require a random input. The beacon publishes “pulses” of random bits on a pre-defined schedule, which are typically broadcast over the internet.

We implement a prototype randomness beacon with a 24-hour refresh interval on-board the nanosatellite SpooQy-1, with the goal of demonstrating the feasibility of distributing such a beacon to off-grid infrastructures. There are a few established functionality principles that a randomness beacon must satisfy in order to be useful20. These include the signing of each “pulse” using a public key traceable to the beacon originator, in order that the provenance of the beacon pulse can be confirmed. Pulses must also bear references to their parent in order to facilitate verification of the beacon’s integrity. While these features should be straightforward to implement on a dedicated satellite, SpooQy-1’s primary mission objectives laid stringent resource constraints on the QRNG subsystem. However, we were able to reinforce several standard elements of the satellite’s on-board radio to meet these requirements.

The on-board radio (Nanocom AX100, GOMspace) broadcasts a beacon signal at 30-second intervals, and is able to contain a simple data structure consisting of up to 256 generated random bits. The radio implements a hash-based message authentication code (HMAC), linking beacons to the satellite’s private key35. Alongside a timestamp, our data structure includes the current randomness beacon data in the form of 256 bits of full-entropy randomness. As computing a hash of the previous beacon data would be too computationally expensive for our highly constrained platform, we opt instead to include the full 256 random bits from the previous beacon, satisfying the requirement for linking to previous pulses.

The satellite beacon is encoded using a proprietary data format, which can be decoded by the GOMspace GS100 ground station receiver36. Beacons were recorded at two ground stations, located at Windisch (Switzerland) and on the National University of Singapore’s Kent Ridge campus (Singapore). As our satellite was deployed from the ISS (International Space Station) orbit (inclination 51.6, period ~90 minutes), we typically observe six passes per day over the Switzerland site, and up to four passes over the Singapore site. Since the two ground stations are in different time zones, it yields a possibility for us to receive the same beacon at two different stations approximately 10 times in 24 hours. Ground track, locations of our ground stations, and a randomness beacon received by the ground stations on 12 January, 2020 are shown in Fig. 4.

Fig. 4: Randomness beacon demonstration.
figure 4

We demonstrate a prototype orbiting randomness beacon. The ground track of our satellite is plotted against the world map, indicating the locations of our ground stations in Windisch (Switzerland) and Kent Ridge (Singapore). With an inclination of 51.6 and an orbital period ~90 minutes, the satellite is able to communicate with both ground stations 10 times within a 24-hour period. As our prototype randomness beacon updates every 24 hours, we are able to confirm the reception of identical beacons at both locations. Map graphics were generated using Cartopy43 with public domain data from Natural Earth.

As microsatellite-based broadband internet proliferates37, there may be an increased demand for satellite-based cryptographic infrastructures such as randomness beacons. To be truly useful, an orbital randomness beacon would require a higher refresh rate than demonstrated in this work (for example, the NIST beacon20 updates every 60 s), robust cryptographic authentication, and rigorous linking of sequential pulses38. While it was not possible to implement all of these on SpooQy-1, we believe that our proof-of-concept demonstration shows that such beacons can be hosted on-board low-resource satellites using existing technologies.

Conclusion

We have implemented a quantum random number generator on board an orbiting nanosatellite where the entropy is derived from the shot noise of photon correlations. QRNG output is tested using randomness testing suites, suggesting that the results are strongly indicative of highly uniform distribution. More comprehensive tests on the random bit string generated can be carried out once sufficient data is available. However, this work clearly shows the feasibility and practicality of this QRNG approach. We also implement a prototype randomness beacon, broadcasting randomness generated from a known and characterized quantum process.

Our results demonstrate the feasibility of implementing a sophisticated, photonics-based solution despite the challenges imposed by these small, resource-limited platforms. We hope that these results can pave the way towards more powerful QRNG implementations in orbit, including self-testing39 or even device-independent designs12.

Methods

In order to construct a randomness extractor, we must first estimate the available entropy of the sampled random signal. For a coincidence rate λ, with X a random variable corresponding to the number of events observed in one second, the probability of observing a particular outcome n is given by

$$Pr[X=n]=\frac{{e}^{-\lambda }{\lambda }^{n}}{n!}.$$
(1)

The accessible entropy from this source is estimated using the min entropy of this distribution, given by

$${H}_{\min }(X)=-{\log }_{2}\left(\frac{{e}^{-\lambda }{\lambda }^{\lfloor \lambda \rfloor }}{\lfloor \lambda \rfloor !}\right).$$
(2)

We extract uniform random numbers from this signal using a Toeplitz hashing extractor40 with extraction ratio g. With k bits encoding each event X, g must be less than \({H}_{\min }(X)/k\), with this value calculated following Equation (2). The result is uniformly distributed random bits5 with probability

$$1-\epsilon \ge 1-{2}^{-(gm-l)/2}.$$
(3)

Here m is the number of input low entropy bits and l is the number of extracted high entropy bits. The security parameter, ϵ > 0, is the probability of failure for the randomness extraction.

In our experiment, coincidence data is encoded in k = 16-bit registers. From analysis of 47, 422 seconds of data generated using a ground-based identical copy of the source, we estimate the quantum randomness per bit as g ≥ 1/4. We employ a Toeplitz matrix with dimensions l = 256 and m = 3072, yielding 256 bits of extracted randomness per 192 16-bit registers and achieving a generation rate of 80 bits/minute (see, Fig. 5). From equation (3), we expect the generated random bits to deviate from perfect randomness with probability at most 2−256. This means that one must collect and process 2256 random bits before being able to predict the next bit, assuming full control over, or knowledge of, the classical noise of the original source.

Fig. 5: Visualization of the random number extraction process.
figure 5

256 uniform random bits (y) are generated from 3072 input bits (x), captured as 192 16-bit integers. The extraction is performed using a 256 × 3072 Toeplitz matrix40 (M), which simultaneously removes any bias from the input sequence, and excludes the impact of non-quantum noise sources. Input and output integer sequences are shown here in greyscale representation, and we further expand 64 bits of the output to show a binary representation.

Figure 6a depicts detector coincident counts collected for 125 minutes in a laboratory setting using a source identical to that on the satellite. The raw data collected exhibits a slow-moving trend (orange curve). After removing the low-frequency components using fast Fourier transform (FFT) (cutoff frequency used 0.01 (Hz)), we obtain data which conforms well to a Poisson distribution (mean 1785 and Fano factor41 of 1 ± 0.013, Fig. 6c). This suggests that the remaining data consists of shot noise5. While resource constraints on the satellite do not permit the use of FFT algorithms, the use of only short-duration data blocks (192 samples of the coincident event rate) enables us to disregard these low-frequency contributions. This is confirmed by Fig. 6b, in which Fano factors of 192-point data blocks are shown to be within the range from 0.8 to 1.2, a signature of Poisson statistics reinforcing the absence of significant low-frequency effects.

Fig. 6: Analysis of coincidence data obtained in a laboratory setting.
figure 6

a Raw coincident event rate and the moving average of the data points (orange curve) indicate the presence of a low-frequency component to the noise. b Histogram of Fano factors for each segment of 192 seconds length from the raw data in a. It shows that the Fano factors are centered ~1. This implies that in short time intervals the Poisson distribution is preserved. c The same data after removing low-frequency components by Fast Fourier Transform (FFT) filtering. d The histogram of the filtered coincidence data fit a Poisson distribution (red curve), indicating the remaining fluctuations are consistent with shot noise.