1,825 research outputs found

    Selected Topics in Cryptanalysis of Symmetric Ciphers

    Get PDF
    It is well established that a symmetric cipher may be described as a system of Boolean polynomials, and that the security of the cipher cannot be better than the difficulty of solving said system. Compressed Right-Hand Side (CRHS) Equations is but one way of describing a symmetric cipher in terms of Boolean polynomials. The first paper of this thesis provides a comprehensive treatment firstly of the relationship between Boolean functions in algebraic normal form, Binary Decision Diagrams and CRHS equations. Secondly, of how CRHS equations may be used to describe certain kinds of symmetric ciphers and how this model may be used to attempt a key-recovery attack. This technique is not left as a theoretical exercise, as the process have been implemented as an open-source project named CryptaPath. To ensure accessibility for researchers unfamiliar with algebraic cryptanalysis, CryptaPath can convert a reference implementation of the target cipher, as specified by a Rust trait, into the CRHS equations model automatically. CRHS equations are not limited to key-recovery attacks, and Paper II explores one such avenue of CRHS equations flexibility. Linear and differential cryptanalysis have long since established their position as two of the most important cryptanalytical attacks, and every new design since must show resistance to both. For some ciphers, like the AES, this resistance can be mathematically proven, but many others are left to heuristic arguments and computer aided proofs. This work is tedious, and most of the tools require good background knowledge of a tool/technique to transform a design to the right input format, with a notable exception in CryptaGraph. CryptaGraph is written in Rust and transforms a reference implementation into CryptaGraphs underlying data structure automatically. Paper II introduces a new way to use CRHS equations to model a symmetric cipher, this time in such a way that linear and differential trail searches are possible. In addition, a new set of operations allowing us to count the number of active S-boxes in a path is presented. Due to CRHS equations effective initial data compression, all possible trails are captured in the initial system description. As is the case with CRHS equations, the crux is the memory consumption. However, this approach also enables the graph of a CRHS equation to be pruned, allowing the memory consumption to be kept at manageable levels. Unfortunately, pruning nodes also means that we will lose valid, incomplete paths, meaning that the hulls found are probably incomplete. On the flip side, all paths, and their corresponding probabilities, found by the tool are guaranteed to be valid trails for the cipher. This theory is also implemented in an extension of CryptaPath, and the name is PathFinder. PathFinder is also able to automatically turn a reference implementation of a cipher into its CRHS equations-based model. As an additional bonus, PathFinder supports the reference implementation specifications specified by CryptaGraph, meaning that the same reference implementation can be used for both CryptaGraph and PathFinder. Paper III shifts focus onto symmetric ciphers designed to be used in conjunction with FHE schemes. Symmetric ciphers designed for this purpose are relatively new and have naturally had a strong focus on reducing the number of multiplications performed. A multiplication is considered expensive on the noise budget of the FHE scheme, while linear operations are viewed as cheap. These ciphers are all assuming that it is possible to find parameters in the various FHE schemes which allow these ciphers to work well in symbiosis with the FHE scheme. Unfortunately, this is not always possible, with the consequence that the decryption process becomes more costly than necessary. Paper III therefore proposes Fasta, a stream cipher which has its parameters and linear layer especially chosen to allow efficient implementation over the BGV scheme, particularly as implemented in the HElib library. The linear layers are drawn from a family of rotation-based linear transformations, as cyclic rotations are cheap to do in FHE schemes that allow packing of multiple plaintext elements in one FHE ciphertext. Fasta follows the same design philosophy as Rasta, and will never use the same linear layer twice under the same key. The result is a stream cipher tailor-made for fast evaluation in HElib. Fasta shows an improvement in throughput of a factor more than 7 when compared to the most efficient implementation of Rasta.Doktorgradsavhandlin

    Structure-based classification and ontology in chemistry

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Recent years have seen an explosion in the availability of data in the chemistry domain. With this information explosion, however, retrieving <it>relevant </it>results from the available information, and <it>organising </it>those results, become even harder problems. Computational processing is essential to filter and organise the available resources so as to better facilitate the work of scientists. Ontologies encode expert domain knowledge in a hierarchically organised machine-processable format. One such ontology for the chemical domain is ChEBI. ChEBI provides a classification of chemicals based on their structural features and a role or activity-based classification. An example of a structure-based class is 'pentacyclic compound' (compounds containing five-ring structures), while an example of a role-based class is 'analgesic', since many different chemicals can act as analgesics without sharing structural features. Structure-based classification in chemistry exploits elegant regularities and symmetries in the underlying chemical domain. As yet, there has been neither a systematic analysis of the types of structural classification in use in chemistry nor a comparison to the capabilities of available technologies.</p> <p>Results</p> <p>We analyze the different categories of structural classes in chemistry, presenting a list of patterns for features found in class definitions. We compare these patterns of class definition to tools which allow for automation of hierarchy construction within cheminformatics and within logic-based ontology technology, going into detail in the latter case with respect to the expressive capabilities of the Web Ontology Language and recent extensions for modelling structured objects. Finally we discuss the relationships and interactions between cheminformatics approaches and logic-based approaches.</p> <p>Conclusion</p> <p>Systems that perform intelligent reasoning tasks on chemistry data require a diverse set of underlying computational utilities including algorithmic, statistical and logic-based tools. For the task of automatic structure-based classification of chemical entities, essential to managing the vast swathes of chemical data being brought online, systems which are capable of hybrid reasoning combining several different approaches are crucial. We provide a thorough review of the available tools and methodologies, and identify areas of open research.</p

    An Efficient Audio Encryption Scheme Based on Finite Fields

    Get PDF
    Finite fields are well-studied algebraic structures with enormous efficient properties which have applications in the fields of cryptology and coding theory. In this study, we proposed a lossless binary Galois field extension-based efficient algorithm for digital audio encryption. The proposed architecture hired a special type of curve in the diffusion module which depends on efficient elliptic curve arithmetic operations. So, it generates good quality pseudo-random numbers (PRN) and with slight computational efforts, it produces optimum diffusion in the encrypted audio files. For the confusion module, a novel construction mechanism of block cipher has been employed which includes prominent arithmetic operations of binary Galois field inversion and multiplication operations. The suggested scheme generates multiple substitution boxes (S-boxes) by using a higher-order Galois field. Thus, the replacement with multiple S-boxes generates effective perplexity in the data and provides additional security to the ciphered audio. The investigational outcomes through different analyses and time complexity demonstrated the ability of the technique to counter various attacks. Furthermore, as a consequence of a rapid and simple application of the binary finite field in hardware and software, the proposed scheme is more appropriate to be applied for data security.10.13039/501100007446-Deanship of Scientific Research at King Khalid University through the Research Groups Program (Grant Number: RG.P. 2/150/42

    INVESTIGATION OF CHEMICAL DIFFERENCES IN MEDICATIONS OBTAINED FROM DIVERSE SOURCES USING NOVEL SPECTROSCOPIC AND STATISTIC APPROACHES

    Get PDF
    Generic medications are those medicines manufactured by a pharmaceutical company without a license from the company that has first invented and patented the same drug, when the related patent and other exclusivity rights have expired. Only studies of bioequivalence are requested as requirements to introduce a new generic medication in clinics, making easier and financially attractive for many pharmaceutical companies to participate in this typology of market. Organised criminality is strongly attracted by this market both for the high profitability, and for the high similarity to the production and trafficking of illegal controlled substances associated to the extreme difficulties faced by the law enforcement authorities in effectively investigating the online market, because of its anonymity. A significant paradigm continuously frequented in pharmacology is the confliction between views on generic medications that can be used interchangeably with the original medicines. Several clinical studies conducted in certain medical areas have shown as the generic medications present an overlapping therapeutic equivalence to the original ones. On the contrary, for certain other generics, both pharmacokinetics and pharmacodynamics issue have been reported. Also, in some cases issues on the stability of generics have been raised. Despite the numerous research articles and reviews published on the matter of clinical equivalence among generic and original medications, no study to the scientific community has been presented on an analytical evaluation of the chemical composition of the different generic drugs that could shed some lights on the reason of the different clinical performances reported. The main aim of this research was to develop a non-destructive quick qualitative analytical methodology to be able to discriminate differences in the chemical composition from generic medicines that have been reported not presenting similar therapeutic equivalence in clinical comparison studies, obtained from authorised pharmacies and non-authorised online sellers. From the cardio-vascular area, digoxin (with the related cardiac glycosides digitoxin and digoxigenin) and amlodipine (in its different salts maleate, mesylate and besylate used in therapies). In the gastroenterology area, omeprazole both in its racemic and isomeric forms, have been selected as samples to be analysed. In the antihistamine area, cetirizine, in its racemic and isomeric forms, equally for the same reasons as before, have been considered. As starting analytical approaches, voltammetry, FT-IR, Raman spectroscopies and NMR have been considered and a statistical data analysis approach of the analytical data obtained based on multivariate analysis such as principal component analysis, cross validation, correlation scatter plots and factor loadings has been implemented. This work has matched the aims initially set, generating novel methods of analysis to investigate differences in the chemical composition within different groups of generic medications. This study has led to the creation and interpretation of new knowledge, through a systematic acquisition and understanding of a substantial body of scientific literature and through original research, and adjusting the project design in the light of unforeseen problems, conceptualizing, designing and implementing the research project for the generation of novel knowledge

    Recent Advances in Organocatalysis

    Get PDF
    Organocatalysis has recently attracted enormous attention as green and sustainable catalysis. It was realized as a fundamental field providing wide families of catalysts for important organic transformations. It will certainly develop in the future. Given the diversity of accessible transformations, metal-catalyzed reactions have become major tools in organic synthesis that will undoubtedly continue to have an important impact in the future. Alternatively, over the last years, a metal-free approach such as organocatalysis has reached a level of faithfulness, allowing researchers to discover new catalytic systems based on engagement of new or early-prepared organic molecules as organocatalysts. Organocatalysis meets green chemistry principles, especially the reduction of toxicity and chemical accidents, the biodegradability, and the use of benign and friendlier reaction media and conditions

    Computer Science Logic 2018: CSL 2018, September 4-8, 2018, Birmingham, United Kingdom

    Get PDF

    Securing a UAV Using Features from an EEG Signal

    Get PDF
    This thesis focuses on an approach which entails the extraction of Beta component of the EEG (Electroencephalogram) signal of a user and uses his/her EEG beta data to generate a random AES (Advanced Encryption Standard) encryption key. This Key is used to encrypt the communication between the UAVs (Unmanned aerial vehicles) and the ground control station. UAVs have attracted both commercial and military organizations in recent years. The progress in this field has reached significant popularity, and the research has incorporated different areas from the scientific domain. UAV communication became a significant concern when an attack on a Predator UAV occurred in 2009, which allowed the hijackers to get the live video stream. Since a UAVs major function depend on its onboard auto pilot, it is important to harden the system against vulnerabilities. In this thesis, we propose a biometric system to encrypt the UAV communication by generating a key which is derived from Beta component of the EEG signal of a user. We have developed a safety mechanism that gets activated in case the communication of the UAV from the ground control station gets attacked. This system was validated on a commercial UAV under malicious attack conditions during which we implement a procedure where the UAV return safely to an initially deployed "home" position
    • …
    corecore