Bingo numbers

Randomise me: the role of random number generators in cybersecurity

Random number generators (RNGs) are an unsung hero of cybersecurity, using algorithms or devices to generate non sequential and non-predetermined characters. But, what exactly can RNGs be used for? Let’s take a look.

Passwords

You may assume from the name that RNGs only work with numbers. However, they can also generate random sequences of letters, words, and symbols. Just take something like online casino games, for example. New players can find a range of casino promotions and offers such as free spins on slot games and golden chips for roulette. As these are digital games, the slot and on-demand roulette games operate using RNGs instead of any physical spinning wheels. Here, the RNGs randomly decide the icons that land on the reels or which number the ball lands on, with no bias towards the free spins or chips. In essence, this digitally mimics the aspect of chance, providing an immersive and authentic casino experience.

With this in mind, RNGs can be used to generate secure passwords that use a combination of capital and lowercase letters, numbers, and special characters. By being generated randomly, this reduces the likelihood that passwords contain full words. In addition, it ensures that the passwords are not based on personal information such as names, addresses, or birthdays. Thanks to this, these passwords are less likely to be hacked because they have no relation to reality, making them harder for hackers to guess.

Security codes

Particularly if RNGs are not used for passwords, two-factor authentication (2FA) is highly recommended. One study found that the use of 2FA can reduce the number of compromised accounts by 50%. This process required people to use not only their password but also another authentication factor to log in to their account. Perhaps the most popular form of 2FA is one-time security codes. As the name suggests, these are randomly generated numerical codes that can only be used once.

Security codes can be sent to users by a number of methods, depending on their preferences and their previously confirmed and verified communication methods. For Microsoft users, it could appear on the Authenticator app. Only the verified user will receive the code, and the code changes each time, increasing security.

Payment tokenization

In order to make a payment in person or online, card details are sent over the internet for approval by the bank. This can leave communications open to hackers. However, payment tokenization replaces sensitive card details with randomly generated and unrelated numbers. It is these tokenized details that are transmitted, and only the authorised entities can decode the token to match the details with the correct account.

Payment tokenization can be employed at the point-of-sale device, so not even the vendor can see the details. It can also be used on databases so that only authorised personnel can see client details. In fact, you may already be using it. Both Apple Pay and Google Pay use payment tokenization – you’ll see a virtual account number in the app that is distinct from your actual details.

As you can see, RNGs are a key tool to have for bolstering cybersecurity measures. Whether you’re a business or consumer alike, RNGs can be leveraged to take your security to the next level, further protecting yourself and those around you from malicious attacks.