Mersenne Twister

The Mersenne Twister is a general-purpose pseudorandom number generator (PRNG) developed in 1997 by Makoto Matsumoto (松本 眞) and Takuji Nishimura (西村 拓士).[1][2] Its name derives from the fact that its period length is chosen to be a Mersenne prime.

The Mersenne Twister was designed specifically to rectify most of the flaws found in older PRNGs.

The most commonly used version of the Mersenne Twister algorithm is based on the Mersenne prime . The standard implementation of that, MT19937, uses a 32-bit word length. There is another implementation (with five variants[3]) that uses a 64-bit word length, MT19937-64; it generates a different sequence.

Application

Software

The Mersenne Twister is used as default PRNG by the following software:

It is also available in Apache Commons,[30] in the standard C++ library (since C++11),[31][32] and in Mathematica.[33] Add-on implementations are provided in many program libraries, including the Boost C++ Libraries,[34] the CUDA Library,[35] and the NAG Numerical Library.[36]

The Mersenne Twister is one of two PRNGs in SPSS: the other generator is kept only for compatibility with older programs, and the Mersenne Twister is stated to be "more reliable".[37] The Mersenne Twister is similarly one of the PRNGs in SAS: the other generators are older and deprecated.[38] The Mersenne Twister is the default PRNG in Stata, the other one is KISS, for compatibility with older versions of Stata.[39]

Advantages

  • Permissively-licensed and patent-free for all variants except CryptMT.
  • Passes numerous tests for statistical randomness, including the Diehard tests and most, but not all of the TestU01 tests.[40]
  • A very long period of . Note that while a long period is not a guarantee of quality in a random number generator, short periods, such as the common in many older software packages, can be problematic.[41]
  • k-distributed to 32-bit accuracy for every (for a definition of k-distributed, see below)
  • Implementations generally create random numbers faster than hardware-implemented methods. A study found that the Mersenne Twister creates 64-bit floating point random numbers approximately twenty times faster than the hardware-implemented, processor-based RDRAND instruction set.[42]

Disadvantages

  • Relatively large state buffer, of almost 2.5 kB, unless the TinyMT variant (discussed below) is used.
  • Mediocre throughput by modern standards, unless the SFMT variant (discussed below) is used.[43]
  • Exhibits two clear failures (linear complexity) in both Crush and BigCrush in the TestU01 suite. The test, like Mersenne Twister, is based on an -algebra.[40]
  • Multiple instances that differ only in seed value (but not other parameters) are not generally appropriate for Monte-Carlo simulations that require independent random number generators, though there exists a method for choosing multiple sets of parameter values.[44][45]
  • Poor diffusion: can take a long time to start generating output that passes randomness tests, if the initial state is highly non-random—particularly if the initial state has many zeros. A consequence of this is that two instances of the generator, started with initial states that are almost the same, will usually output nearly the same sequence for many iterations, before eventually diverging. The 2002 update to the MT algorithm has improved initialization, so that beginning with such a state is very unlikely.[46] The GPU version (MTGP) is said to be even better.[47]
  • Contains subsequences with more 0's than 1's. This adds to the poor diffusion property to make recovery from many-zero states difficult.
  • Is not cryptographically secure, unless the CryptMT variant (discussed below) is used. The reason is that observing a sufficient number of iterations (624 in the case of MT19937, since this is the size of the state vector from which future iterations are produced) allows one to predict all future iterations.

Alternatives

An alternative generator, WELL ("Well Equidistributed Long-period Linear"), offers quicker recovery, and equal randomness, and nearly equal speed.[48]

Marsaglia's xorshift generators and variants are the fastest in the class of LFSRs.[49]

64-bit MELGs ("64-bit Maximally Equidistributed -Linear Generators with Mersenne Prime Period") are completely optimized in terms of the k-distribution properties.[50]

The ACORN family (published 1989) is another k-distributed PRNG, which shows similar computational speed to MT, and better statistical properties as it satisfies all the current (2019) TestU01 criteria; when used with appropriate choices of parameters, ACORN can have arbitrarily long period and precision.

The PCG family is a more modern long-period generator, with better cache locality, and less detectable bias using modern analysis methods.[51]

k-distribution

A pseudorandom sequence of w-bit integers of period P is said to be k-distributed to v-bit accuracy if the following holds.

Let truncv(x) denote the number formed by the leading v bits of x, and consider P of the k v-bit vectors
.
Then each of the possible combinations of bits occurs the same number of times in a period, except for the all-zero combination that occurs once less often.

Algorithmic detail

Visualisation of generation of pseudo-random 32-bit integers using a Mersenne Twister. The 'Extract number' section shows an example where integer 0 has already been output and the index is at integer 1. 'Generate numbers' is run when all integers have been output.

For a w-bit word length, the Mersenne Twister generates integers in the range .

The Mersenne Twister algorithm is based on a matrix linear recurrence over a finite binary field . The algorithm is a twisted generalised feedback shift register[52] (twisted GFSR, or TGFSR) of rational normal form (TGFSR(R)), with state bit reflection and tempering. The basic idea is to define a series through a simple recurrence relation, and then output numbers of the form , where T is an invertible -matrix called a tempering matrix.

The general algorithm is characterized by the following quantities (some of these explanations make sense only after reading the rest of the algorithm):

  • w: word size (in number of bits)
  • n: degree of recurrence
  • m: middle word, an offset used in the recurrence relation defining the series ,
  • r: separation point of one word, or the number of bits of the lower bitmask,
  • a: coefficients of the rational normal form twist matrix
  • b, c: TGFSR(R) tempering bitmasks
  • s, t: TGFSR(R) tempering bit shifts
  • u, d, l: additional Mersenne Twister tempering bit shifts/masks

with the restriction that is a Mersenne prime. This choice simplifies the primitivity test and k-distribution test that are needed in the parameter search.

The series is defined as a series of w-bit quantities with the recurrence relation:

where denotes concatenation of bit vectors (with upper bits on the left), the bitwise exclusive or (XOR), means the upper wr bits of , and means the lower r bits of . The twist transformation A is defined in rational normal form as:

with as the identity matrix. The rational normal form has the benefit that multiplication by A can be efficiently expressed as: (remember that here matrix multiplication is being done in , and therefore bitwise XOR takes the place of addition)

where is the lowest order bit of .

As like TGFSR(R), the Mersenne Twister is cascaded with a tempering transform to compensate for the reduced dimensionality of equidistribution (because of the choice of A being in the rational normal form). Note that this is equivalent to using the matrix A where for T an invertible matrix, and therefore the analysis of characteristic polynomial mentioned below still holds.

As with A, we choose a tempering transform to be easily computable, and so do not actually construct T itself. The tempering is defined in the case of Mersenne Twister as

where is the next value from the series, is a temporary intermediate value, and is the value returned from the algorithm, with and as the bitwise left and right shifts, and as the bitwise AND. The first and last transforms are added in order to improve lower-bit equidistribution. From the property of TGFSR, is required to reach the upper bound of equidistribution for the upper bits.

The coefficients for MT19937 are:

Note that 32-bit implementations of the Mersenne Twister generally have d = FFFFFFFF16. As a result, the d is occasionally omitted from the algorithm description, since the bitwise and with d in that case has no effect.

The coefficients for MT19937-64 are:[53]

Initialization

The state needed for a Mersenne Twister implementation is an array of n values of w bits each. To initialize the array, a w-bit seed value is used to supply through by setting to the seed value and thereafter setting

for from to .

  • The first value the algorithm then generates is based on , not on .
  • The constant f forms another parameter to the generator, though not part of the algorithm proper.
  • The value for f for MT19937 is 1812433253.
  • The value for f for MT19937-64 is 6364136223846793005.[53]

Comparison with classical GFSR

In order to achieve the theoretical upper limit of the period in a TGFSR, must be a primitive polynomial, being the characteristic polynomial of

The twist transformation improves the classical GFSR with the following key properties:

  • The period reaches the theoretical upper limit (except if initialized with 0)
  • Equidistribution in n dimensions (e.g. linear congruential generators can at best manage reasonable distribution in five dimensions)

Pseudocode

The following pseudocode implements the general Mersenne Twister algorithm. The constants w, n, m, r, a, u, d, s, b, t, c, l, and f are as in the algorithm description above. It is assumed that int represents a type sufficient to hold values with w bits:

 // Create a length n array to store the state of the generator
 int[0..n-1] MT
 int index := n+1
 const int lower_mask = (1 << r) - 1 // That is, the binary number of r 1's
 const int upper_mask = lowest w bits of (not lower_mask)
 
 // Initialize the generator from a seed
 function seed_mt(int seed) {
     index := n
     MT[0] := seed
     for i from 1 to (n - 1) { // loop over each element
         MT[i] := lowest w bits of (f * (MT[i-1] xor (MT[i-1] >> (w-2))) + i)
     }
 }
 
 // Extract a tempered value based on MT[index]
 // calling twist() every n numbers
 function extract_number() {
     if index >= n {
         if index > n {
           error "Generator was never seeded"
           // Alternatively, seed with constant value; 5489 is used in reference C code[54]
         }
         twist()
     }
 
     int y := MT[index]
     y := y xor ((y >> u) and d)
     y := y xor ((y << s) and b)
     y := y xor ((y << t) and c)
     y := y xor (y >> l)
 
     index := index + 1
     return lowest w bits of (y)
 }
 
 // Generate the next n values from the series x_i 
 function twist() {
     for i from 0 to (n-1) {
         int x := (MT[i] and upper_mask)
                   | (MT[(i+1) mod n] and lower_mask)
         int xA := x >> 1
         if (x mod 2) != 0 { // lowest bit of x is 1
             xA := xA xor a
         }
         MT[i] := MT[(i + m) mod n] xor xA
     }
     index := 0
 }

Variants

CryptMT

CryptMT is a stream cipher and cryptographically secure pseudorandom number generator which uses Mersenne Twister internally.[55][56] It was developed by Matsumoto and Nishimura alongside Mariko Hagita and Mutsuo Saito. It has been submitted to the eSTREAM project of the eCRYPT network.[55] Unlike Mersenne Twister or its other derivatives, CryptMT is patented.

MTGP

MTGP is a variant of Mersenne Twister optimised for graphics processing units published by Mutsuo Saito and Makoto Matsumoto.[57] The basic linear recurrence operations are extended from MT and parameters are chosen to allow many threads to compute the recursion in parallel, while sharing their state space to reduce memory load. The paper claims improved equidistribution over MT and performance on a very old GPU (Nvidia GTX260 with 192 cores) of 4.7 ms for 5×107 random 32-bit integers.

SFMT

The SFMT (SIMD-oriented Fast Mersenne Twister) is a variant of Mersenne Twister, introduced in 2006,[58] designed to be fast when it runs on 128-bit SIMD.

Intel SSE2 and PowerPC AltiVec are supported by SFMT. It is also used for games with the Cell BE in the PlayStation 3.[60]

TinyMT

TinyMT is a variant of Mersenne Twister, proposed by Saito and Matsumoto in 2011.[61] TinyMT uses just 127 bits of state space, a significant decrease compared to the original's 2.5 KiB of state. However, it has a period of , far shorter than the original, so it is only recommended by the authors in cases where memory is at a premium.

References

  1. Matsumoto, M.; Nishimura, T. (1998). "Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator" (PDF). ACM Transactions on Modeling and Computer Simulation. 8 (1): 3–30. CiteSeerX 10.1.1.215.1141. doi:10.1145/272991.272995. S2CID 3332028.
  2. E.g. Marsland S. (2011) Machine Learning (CRC Press), §4.1.1. Also see the section "Adoption in software systems".
  3. John Savard. "The Mersenne Twister". A subsequent paper, published in the year 2000, gave five additional forms of the Mersenne Twister with period 2^19937-1. All five were designed to be implemented with 64-bit arithmetic instead of 32-bit arithmetic.
  4. "Random link". Dyalog Language Reference Guide. Retrieved 2020-06-04.
  5. "RANDOMU (IDL Reference)". Exelis VIS Docs Center. Retrieved 2013-08-23.
  6. "Random Number Generators". CRAN Task View: Probability Distributions. Retrieved 2012-05-29.
  7. ""Random" class documentation". Ruby 1.9.3 documentation. Retrieved 2012-05-29.
  8. "random". free pascal documentation. Retrieved 2013-11-28.
  9. "mt_rand — Generate a better random value". PHP Manual. Retrieved 2016-03-02.
  10. "NumPy 1.17.0 Release Notes — NumPy v1.21 Manual". numpy.org. Retrieved 2021-06-29.
  11. "9.6 random — Generate pseudo-random numbers". Python v2.6.8 documentation. Retrieved 2012-05-29.
  12. "8.6 random — Generate pseudo-random numbers". Python v3.2 documentation. Retrieved 2012-05-29.
  13. "random — Generate pseudo-random numbers — Python 3.8.3 documentation". Python 3.8.3 documentation. Retrieved 2020-06-23.
  14. "Design choices and extensions". CMUCL User's Manual. Retrieved 2014-02-03.
  15. "Random states". The ECL manual. Retrieved 2015-09-20.
  16. "Random Number Generation". SBCL User's Manual.
  17. "Random Numbers · The Julia Language". docs.julialang.org. Retrieved 2022-06-21.
  18. "Random Numbers: GLib Reference Manual".
  19. "Random Number Algorithms". GNU MP. Retrieved 2013-11-21.
  20. "16.3 Special Utility Matrices". GNU Octave. Built-in Function: rand
  21. "Random number environment variables". GNU Scientific Library. Retrieved 2013-11-24.
  22. Mélard, G. (2014), "On the accuracy of statistical procedures in Microsoft Excel 2010", Computational Statistics, 29 (5): 1095–1128, CiteSeerX 10.1.1.455.5508, doi:10.1007/s00180-014-0482-5, S2CID 54032450.
  23. "GAUSS 14 Language Reference" (PDF).
  24. "uniform". Gretl Function Reference.
  25. "New random-number generator—64-bit Mersenne Twister".
  26. "Probability Distributions — Sage Reference Manual v7.2: Probablity".
  27. "grand - Random numbers". Scilab Help.
  28. "random number generator". Maple Online Help. Retrieved 2013-11-21.
  29. "Random number generator algorithms". Documentation Center, MathWorks.
  30. "Data Generation". Apache Commons Math User Guide.
  31. "Random Number Generation in C++11" (PDF). Standard C++ Foundation.
  32. "std::mersenne_twister_engine". Pseudo Random Number Generation. Retrieved 2012-09-25.
  33. Mathematica Documentation
  34. "boost/random/mersenne_twister.hpp". Boost C++ Libraries. Retrieved 2012-05-29.
  35. "Host API Overview". CUDA Toolkit Documentation. Retrieved 2016-08-02.
  36. "G05 – Random Number Generators". NAG Library Chapter Introduction. Retrieved 2012-05-29.
  37. "Random Number Generators". IBM SPSS Statistics. Retrieved 2013-11-21.
  38. "Using Random-Number Functions". SAS Language Reference. Retrieved 2013-11-21.
  39. Stata help: set rng -- Set which random-number generator (RNG) to use
  40. P. L'Ecuyer and R. Simard, "TestU01: "A C library for empirical testing of random number generators", ACM Transactions on Mathematical Software, 33, 4, Article 22 (August 2007).
  41. Note: 219937 is approximately 4.3 × 106001; this is many orders of magnitude larger than the estimated number of particles in the observable universe, which is 1087.
  42. Route, Matthew (August 10, 2017). "Radio-flaring Ultracool Dwarf Population Synthesis". The Astrophysical Journal. 845 (1): 66. arXiv:1707.02212. Bibcode:2017ApJ...845...66R. doi:10.3847/1538-4357/aa7ede. S2CID 118895524.
  43. "SIMD-oriented Fast Mersenne Twister (SFMT): twice faster than Mersenne Twister". Japan Society for the Promotion of Science. Retrieved 27 March 2017.
  44. Makoto Matsumoto; Takuji Nishimura. "Dynamic Creation of Pseudorandom Number Generators" (PDF). Retrieved 19 July 2015.
  45. Hiroshi Haramoto; Makoto Matsumoto; Takuji Nishimura; François Panneton; Pierre L'Ecuyer. "Efficient Jump Ahead for F2-Linear Random Number Generators" (PDF). Retrieved 12 Nov 2015.
  46. "mt19937ar: Mersenne Twister with improved initialization". hiroshima-u.ac.jp. Retrieved 4 October 2015.
  47. Fog, Agner (1 May 2015). "Pseudo-Random Number Generators for Vector Processors and Multicore Processors". Journal of Modern Applied Statistical Methods. 14 (1): 308–334. doi:10.22237/jmasm/1430454120.
  48. P. L'Ecuyer, "Uniform Random Number Generators", International Encyclopedia of Statistical Science, Lovric, Miodrag (Ed.), Springer-Verlag, 2010.
  49. "xorshift*/xorshift+ generators and the PRNG shootout".
  50. Harase, S.; Kimoto, T. (2018). "Implementing 64-bit Maximally Equidistributed F2-Linear Generators with Mersenne Prime Period". ACM Transactions on Mathematical Software. 44 (3): 30:1–30:11. arXiv:1505.06582. doi:10.1145/3159444. S2CID 14923086.
  51. "The PCG Paper". 27 July 2017.
  52. Matsumoto, M.; Kurita, Y. (1992). "Twisted GFSR generators". ACM Transactions on Modeling and Computer Simulation. 2 (3): 179–194. doi:10.1145/146382.146383. S2CID 15246234.
  53. "std::mersenne_twister_engine". Pseudo Random Number Generation. Retrieved 2015-07-20.
  54. Takuji Nishimura; Makoto Matsumoto. "A C-program for MT19937, with initialization improved 2002/1/26". Retrieved 20 July 2015.
  55. "CryptMt and Fubuki". eCRYPT. Archived from the original on 2012-07-01. Retrieved 2017-11-12.
  56. Matsumoto, Makoto; Nishimura, Takuji; Hagita, Mariko; Saito, Mutsuo (2005). "Cryptographic Mersenne Twister and Fubuki Stream/Block Cipher" (PDF).
  57. Mutsuo Saito; Makoto Matsumoto (2010). "Variants of Mersenne Twister Suitable for Graphic Processors". arXiv:1005.4973v3 [cs.MS].
  58. "SIMD-oriented Fast Mersenne Twister (SFMT)". hiroshima-u.ac.jp. Retrieved 4 October 2015.
  59. "SFMT:Comparison of speed". hiroshima-u.ac.jp. Retrieved 4 October 2015.
  60. "PlayStation3 License". scei.co.jp. Retrieved 4 October 2015.
  61. "Tiny Mersenne Twister (TinyMT)". hiroshima-u.ac.jp. Retrieved 4 October 2015.

Further reading

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.