🔍Provably Fair
Verifiable fairness ensures that the entire process of casino games cannot be tampered with
In the current Web2 online gambling industry, game fairness is mainly defined and validated through a “Random Number Generator” (RNG) and third-party laboratory certification.
The RNGs used by online casinos generally follow similar technical logic. Most online casinos rely on RNGs based on Pseudo-Random Number Generator (PRNG) algorithms, which depend on an initial value (or “seed”) and a complex mathematical formula to generate a sequence of numbers that simulate real randomness. Common algorithms include Linear Congruential Generator (LCG) and Mersenne Twister. To maintain the perceived randomness of generated numbers, these systems continually update the seed.
However, PRNGs have some limitations. Traditional PRNGs are dependent on an initial seed and operate within centralized systems with limited transparency, relying heavily on the casino’s assurances and institutional audits, typically lacking independent player verification.
Blockchain technology, however, has introduced new possibilities. The immutable and transparent nature of blockchain data provides players with fairer gaming experiences.
BSH-RNG
AlanoGames has chosen to integrate blockchain data (such as block hashes or timestamps) to generate the initial seeds for game randomness, introducing external entropy into the generation process. Combined with traditional PRNGs, this produces highly random and difficult-to-predict values, creating what we call a “Blockchain Seeded Hybrid RNG” (BSH-RNG).
Key features include:
1. Blockchain-Based Seeds: Blockchain data (e.g., block hashes or timestamps) is used to generate the initial seeds for randomness, introducing external entropy into the process.
2. Hybrid Generation: By combining blockchain seeds with traditional generator algorithms, such as PRNG or cryptographic methods, this system enhances both randomness and interference resistance.
3. Enhanced Randomness: This method increases the unpredictability of random numbers through the incorporation of uncontrollable blockchain data and cryptographic techniques.
AlanoGames uses BSH-RNG to offer players greater transparency and verifiability. All data on the blockchain is transparent, verifiable, and immutable, ensuring that each game at AlanoGames is fair and credible. This also allows players genuine opportunities for independent verification, enabling them to enjoy a fair gaming experience in a secure, transparent Web3 environment, free from human intervention.
Data Source
Uses blockchain’s immutable data as a random seed
Uses algorithmic methods based on an initial seed
Verifiability
Every result can be independently verified on-chain
Results typically cannot be independently verified
Transparency
Highly transparent, with results auditable by anyone
Lower transparency, relies on casino’s claims
Tamper Resistance
Immutable data prevents manipulation
May be vulnerable to manipulation or algorithm flaws
Cost
Higher implementation and maintenance costs
Lower cost due to simpler technology
Complexity
Requires integration of blockchain and cryptographic algorithms
Simpler technology, easy to implement
User Trust
Enhances user trust through transparency and verifiability
Relies on casino’s reputation and certification
Third-Party Testing
Unnecessary, as users can verify results
Often certified by labs like GLI
Introduction to asymmetric encryption algorithms
Asymmetric encryption algorithms are publicly verified algorithms that require two keys to interact with each other: public keys and private keys. The public key and the private key are a pair. If the data is encrypted with the public key, it can only be decrypted with the corresponding private key. Because encryption and decryption use two different keys (i.e., public key and private key), it is called an asymmetric encryption algorithm.
The basic process of implementing confidential information exchange with an asymmetric encryption algorithm is: Party A generates a pair of keys and makes the public key public. Other roles (Party B) who need to send information to Party A use the public key to encrypt the confidential information and then send it to Party A. Then Party A uses its own private key to decrypt the encrypted information. When Party A wants to reply to Party B, it is just the opposite. It uses Party B's public key to encrypt the data. Similarly, Party B uses its own private key to decrypt it.
On the other hand, Party A can use its own private key to sign confidential information and then send it to Party B; Party B then uses Party A's public key to verify the signature of the data sent back by Party A. Party A can use its private key to decrypt any information encrypted by its public key.
Define the effective period for running asymmetric algorithms
1. After the official game betting is over, everyone's betting situation (betting amount and betting options) has been determined, publicly known and irreversible, so the platform cannot modify this part of the data;
2. After the official game betting stage is over, before the official game officially starts, the asymmetric encryption algorithm can be operated to obtain the random number of the game lottery result;
AlanoGames' game random number acquisition process
After the betting is over and before the game officially starts, that is, within the "qualified time period" mentioned above, the following process will be carried out in steps:
1. AlanoGames server first generates a seed A, at which time A is in the state of a private key.
2. AlanoGames encrypts A with the MD5 algorithm to obtain a 32-bit encrypted hash AH, which will be made public to everyone.
3. Generate a seed B through the public key contract on the blockchain, at which time B is in the state of a public key, and B will be made public to everyone.
4. Perform asymmetric encryption algorithm conversion, convert A and B to get the result C, at this time C is the random number based on the lottery result of this game.
How do users verify?
1. After the game is over, AlanoGames will disclose the private key A, and the user can encrypt A through MD5 to get a hash. Compare this hash with AH. If the two hash values are consistent, it can be confirmed that the value of A has not been tampered with throughout the process.
2. Players can get the verification result by putting seeds A and B into the verification contract. Compare this result with C. If the two values are consistent, it can be confirmed that the entire game process is fair.
3. Players use the verification contract and need to pay a certain amount of Gas to the corresponding blockchain network according to the actual situation of the blockchain network.
The above rules are only applicable to the current system version. AlanoGames will continue to upgrade more comprehensive and advanced rules in subsequent updated versions. Please refer to the latest version of this page.
Last updated