4,577 research outputs found

    Leakage-Resilient Cryptography

    Get PDF
    We construct a stream-cipher SC whose \emph{implementation} is secure even if arbitrary (adversely chosen) information on the internal state of SC is leaked during computation. This captures \emph{all} possible side-channel attacks on SC where the amount of information leaked in a given period is bounded, but overall cankbe arbitrary large, in particular much larger than the internalkstate of SC. The only other assumption we make on the \emph{implementation} of SC is that only data that is accessedkduring computation leaks information. The construction can be based on any pseudorandom generator, and the only computational assumption we make is that this PRG is secure against non-uniform adversaries in the classical sense (i.e. when there are no side-channels). The stream-cipher SC generates its output in chunks K1,K2,…K_1,K_2,\ldots, and arbitrary but bounded information leakage is modeled by allowing the adversary to adaptively chose a function fℓ:{0,1}∗→{0,1}λf_\ell:\{0,1\}^*\rightarrow\{0,1\}^\lambda before KℓK_\ell is computed, she then gets fℓ(τℓ)f_\ell(\tau_\ell) where τℓ\tau_\ell is the internal state of \SC that is accessed during the computation of KℓK_\ell. One notion of security we prove for \SC is that KℓK_\ell is indistinguishable from random when given K1,…,Kℓ−1K_1,\ldots,K_{\ell-1}, f1(τ1),…,fℓ−1(τℓ−1)f_1(\tau_1),\ldots, f_{\ell-1}(\tau_{\ell-1}) and also the complete internal state of SC after Kℓ+1K_{\ell+1} has been computed (i.e. our cipher is forward-secure). The construction is based on alternating extraction (previously used in the intrusion-resilient secret-sharing scheme from FOCS'07). We move this concept to the computational setting by proving a lemma that states that the output of any PRG has high HILL pseudoentropy (i.e. is indistinguishable from some distribution with high min-entropy) even if arbitrary information about the seed is leaked. The amount of leakage \leak that we can tolerate in each step depends on the strength of the underlying PRG, it is at least logarithmic, but can be as large as a constant fraction of the internal state of SC if the PRG is exponentially hard

    A flood vulnerability index for coastal cities and its use in assessing climate change impacts

    Get PDF
    Worldwide, there is a need to enhance our understanding of vulnerability and to develop methodologies and tools to assess vulnerability. One of the most important goals of assessing coastal flood vulnerability, in particular, is to create a readily understandable link between the theoretical concepts of flood vulnerability and the day-to-day decision-making process and to encapsulate this link in an easily accessible tool. This article focuses on developing a Coastal City Flood Vulnerability Index (CCFVI) based on exposure, susceptibility and resilience to coastal flooding. It is applied to nine cities around the world, each with different kinds of exposure. With the aid of this index, it is demonstrated which cities are most vulnerable to coastal flooding with regard to the system's components, that is, hydro-geological, socio-economic and politico-administrative. The index gives a number from 0 to 1, indicating comparatively low or high coastal flood vulnerability, which shows which cities are most in need of further, more detailed investigation for decision-makers. Once its use to compare the vulnerability of a range of cities under current conditions has been demonstrated, it is used to study the impact of climate change on the vulnerability of these cities over a longer timescale. The results show that CCFVI provides a means of obtaining a broad overview of flood vulnerability and the effect of possible adaptation options. This, in turn, will allow for the direction of resources to more in-depth investigation of the most promising strategies

    Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey

    Full text link
    The rapid development of information and communications technology has enabled the use of digital-controlled and software-driven distributed energy resources (DERs) to improve the flexibility and efficiency of power supply, and support grid operations. However, this evolution also exposes geographically-dispersed DERs to cyber threats, including hardware and software vulnerabilities, communication issues, and personnel errors, etc. Therefore, enhancing the cyber-resiliency of DER-based smart grid - the ability to survive successful cyber intrusions - is becoming increasingly vital and has garnered significant attention from both industry and academia. In this survey, we aim to provide a systematical and comprehensive review regarding the cyber-resiliency enhancement (CRE) of DER-based smart grid. Firstly, an integrated threat modeling method is tailored for the hierarchical DER-based smart grid with special emphasis on vulnerability identification and impact analysis. Then, the defense-in-depth strategies encompassing prevention, detection, mitigation, and recovery are comprehensively surveyed, systematically classified, and rigorously compared. A CRE framework is subsequently proposed to incorporate the five key resiliency enablers. Finally, challenges and future directions are discussed in details. The overall aim of this survey is to demonstrate the development trend of CRE methods and motivate further efforts to improve the cyber-resiliency of DER-based smart grid.Comment: Submitted to IEEE Transactions on Smart Grid for Publication Consideratio

    Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model

    Get PDF
    We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adversary leaking arbitrary (yet bounded) information on the entire state of the signer (sometimes known as fully leakage resilience), including the random coin tosses of the signing algorithm. The main feature of our constructions is that they offer a graceful degradation of security in situations where standard existential unforgeability is impossible
    • …
    corecore