Be aware in all of this of the Heisenberg-Schödinger Credulity Effect. That
effect is that the word "quantum" sucks people's brains out, and otherwise
sensible people suffer from impaired reasoning.
It is certainly true that radioactivity is a random effect, and is quantum in
nature. That does not mean that in order for a random sampling to be quantum,
it must be based on radioactivity; there are other quantum sources of
randomness. Noisy diodes, resister noise, CCD noise, etc. are all quantum. If
you want to get picky, *all* physical effects are quantum, even ones that
aren't usefully random. There is nothing magic about one physical source or
other that makes it more suited for crypto. Thinking that a hardware source
should be radioactive is affirming the consequence, as well.
Not does it mean that a radioactive (or other) source is suitable for
cryptography without some sort of conditioning. Hardware sources are often
biased in distribution, or have other numeric flaws that can be fixed with a
whitening function.
In short, radioactivity is neither necessary nor sufficient for cryptographic
use. If you want to use a source for crypto, you want to run it through a
system like /dev/random or at the very least a DRBG to give clean outputs.
Furthermore, what we really want in crypto is what I call "unguessability."
This is both weaker than true randomness and stronger. It's stronger in that
the numbers have to remain secret. A completely random process that everyone
knows is completely unsuitable for crypto, but a weakly entropic input can be
jiggered into suitability.
To sum up -- don't get wrapped around the axle about radioactivity. It's not
the only random process in the universe, and you have to do a lot of work once
you have it. The sort of work that you need to do is precisely what a well-done
OSRNG does.
Jon