7,851 research outputs found

    Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI

    Full text link
    The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001. There are a great deal of cryptanalytic results on KASUMI, however, its security evaluation against the recent zero-correlation linear attacks is still lacking so far. In this paper, we select some special input masks to refine the general 5-round zero-correlation linear approximations combining with some observations on the FLFL functions and then propose the 6-round zero-correlation linear attack on KASUMI. Moreover, zero-correlation linear attacks on the last 7-round KASUMI are also introduced under some weak keys conditions. These weak keys take 2142^{-14} of the whole key space. The new zero-correlation linear attack on the 6-round needs about 2852^{85} encryptions with 262.82^{62.8} known plaintexts. For the attack under weak keys conditions on the last 7 round, the data complexity is about 262.12^{62.1} known plaintexts and the time complexity 2110.52^{110.5} encryptions

    Workers Rights Consortium Assessment re Easy Group (Mariveles/BEZ, Philippines): Easy Fashion Corporation, Allen Garments, & Kasumi Apparel Ltd. Corporation: Summary of Findings and Recommendations

    Get PDF
    Report of an assessment of labor practices at three closely related manufacturing facilities located in the Bataan Economic Zone (BEZ) in Mariveles, Phillipines. The WRC’s assessment has been carried out in response to three principal complaints: working hours and compensation, misuse of a contract labor system, and freedom of association and collective bargaining

    A novel epigenetic AML1-ETO/THAP10/miR-383 mini-circuitry contributes to t(8;21) leukaemogenesis

    Get PDF
    DNA methylation patterns are frequently deregulated in t(8;21) acute myeloid leukaemia (AML), but little is known of the mechanisms by which specific gene sets become aberrantly methylated. Here, we found that the promoter DNA methylation signature of t(8;21)(+) AML blasts differs from that of t(8;21)(-) AMLs. This study demonstrated that a novel hypermethylated zinc finger-containing protein, THAP10, is a target gene and can be epigenetically suppressed by AML1-ETO at the transcriptional level in t(8;21) AML. Our findings also show that THAP10 is a bona fide target of miR-383 that can be epigenetically activated by the AML1-ETO recruiting co-activator p300. In this study, we demonstrated that epigenetic suppression of THAP10 is the mechanistic link between AML1-ETO fusion proteins and tyrosine kinase cascades. In addition, we showed that THAP10 is a nuclear protein that inhibits myeloid proliferation and promotes differentiation both in vitro and in vivo Altogether, our results revealed an unexpected and important epigenetic mini-circuit of AML1-ETO/THAP10/miR-383 in t(8;21) AML, in which epigenetic suppression of THAP10 predicts a poor clinical outcome and represents a novel therapeutic target

    Survey and Benchmark of Block Ciphers for Wireless Sensor Networks

    Get PDF
    Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time with little energy supply, and that available storage is scarce on these sensor nodes. However, to our knowledge, no systematic work has been done in this area so far.We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations. For evaluating and assessing these candidates, we not only consider the security properties but also the storage- and energy-efficiency of the candidates. Finally, based on the evaluation results, we select the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy efficiency being implicit). In terms of operation mode, we recommend Output Feedback Mode for pairwise links but Cipher Block Chaining for group communications

    Benchmarking Block Ciphers for Wireless Sensor Networks

    Get PDF
    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for WSNs based on existing literature. For evaluating and assessing these candidates, we have devised a systematic framework that not only considers the security properties but also the storage- and energy-efficency of the candidates. Finally, based on the evaluation results, we have selected the suitable ciphers for WSNs, namely Rijndael for high security and energy efficiency requirements; and MISTY1 for good storage and energy efficiency

    Dystroglycan Depletion Impairs Actin-Dependent Functions of Differentiated Kasumi-1 Cells

    Get PDF
    Background Dystroglycan has recently been characterised in blood tissue cells, as part of the dystrophin glycoprotein complex involved in the differentiation process of neutrophils. Purpose In the present study we have investigated the role of dystroglycan in the human promyelocytic leukemic cell line Kasumi-1 differentiated to macrophage-like cells. Methods We characterised the pattern expression and subcellular distribution of dystroglycans in non-differentiated and differentiated Kasumi-1 cells. Results Our results demonstrated by WB and flow cytometer assays that during the differentiation process to macrophages, dystroglycans were down-regulated; these results were confirmed with qRT-PCR assays. Additionally, depletion of dystroglycan by RNAi resulted in altered morphology and reduced properties of differentiated Kasumi-1 cells, including morphology, migration and phagocytic activities although secretion of IL-1β and expression of markers of differentiation are not altered. Conclusion Our findings strongly implicate dystroglycan as a key membrane adhesion protein involved in actin-based structures during the differentiation process in Kasumi-1 cells

    Edge-weighting of gene expression graphs

    Get PDF
    In recent years, considerable research efforts have been directed to micro-array technologies and their role in providing simultaneous information on expression profiles for thousands of genes. These data, when subjected to clustering and classification procedures, can assist in identifying patterns and providing insight on biological processes. To understand the properties of complex gene expression datasets, graphical representations can be used. Intuitively, the data can be represented in terms of a bipartite graph, with weighted edges corresponding to gene-sample node couples in the dataset. Biologically meaningful subgraphs can be sought, but performance can be influenced both by the search algorithm, and, by the graph-weighting scheme and both merit rigorous investigation. In this paper, we focus on edge-weighting schemes for bipartite graphical representation of gene expression. Two novel methods are presented: the first is based on empirical evidence; the second on a geometric distribution. The schemes are compared for several real datasets, assessing efficiency of performance based on four essential properties: robustness to noise and missing values, discrimination, parameter influence on scheme efficiency and reusability. Recommendations and limitations are briefly discussed
    corecore