18,057 research outputs found
Design and implementation of robust embedded processor for cryptographic applications
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fault attacks. Thus, some masking and fault detection algorithms must be incorporated into these implementations. These additions further increase the complexity of the cryptographic devices which already need to perform computationally-intensive operations. Therefore, the general-purpose processors are usually supported by coprocessors/hardware accelerators to protect as well as to accelerate cryptographic applications. Using a configurable processor is just another solution. This work designs and implements robust execution units as an extension to a configurable processor, which detect the data faults (adversarial or otherwise) while performing the arithmetic operations. Assuming a capable adversary who can injects faults to the cryptographic computation with high precision, a nonlinear error detection code with high error detection capability is used. The designed units are tightly integrated to the datapath of the configurable processor using its tool chain. For different configurations, we report the increase in the space and time complexities of the configurable processor. Also, we present performance evaluations of the software implementations using the robust execution units. Implementation results show that it is feasible to implement robust arithmetic units with relatively low overhead in an embedded processor
Product Construction of Affine Codes
Binary matrix codes with restricted row and column weights are a desirable
method of coded modulation for power line communication. In this work, we
construct such matrix codes that are obtained as products of affine codes -
cosets of binary linear codes. Additionally, the constructions have the
property that they are systematic. Subsequently, we generalize our construction
to irregular product of affine codes, where the component codes are affine
codes of different rates.Comment: 13 pages, to appear in SIAM Journal on Discrete Mathematic
On q-ary codes correcting all unidirectional errors of a limited magnitude
We consider codes over the alphabet Q={0,1,..,q-1}intended for the control of
unidirectional errors of level l. That is, the transmission channel is such
that the received word cannot contain both a component larger than the
transmitted one and a component smaller than the transmitted one. Moreover, the
absolute value of the difference between a transmitted component and its
received version is at most l.
We introduce and study q-ary codes capable of correcting all unidirectional
errors of level l. Lower and upper bounds for the maximal size of those codes
are presented.
We also study codes for this aim that are defined by a single equation on the
codeword coordinates(similar to the Varshamov-Tenengolts codes for correcting
binary asymmetric errors). We finally consider the problem of detecting all
unidirectional errors of level l.Comment: 22 pages,no figures. Accepted for publication of Journal of Armenian
Academy of Sciences, special issue dedicated to Rom Varshamo
Codeword stabilized quantum codes: algorithm and structure
The codeword stabilized ("CWS") quantum codes formalism presents a unifying
approach to both additive and nonadditive quantum error-correcting codes
(arXiv:0708.1021). This formalism reduces the problem of constructing such
quantum codes to finding a binary classical code correcting an error pattern
induced by a graph state. Finding such a classical code can be very difficult.
Here, we consider an algorithm which maps the search for CWS codes to a problem
of identifying maximum cliques in a graph. While solving this problem is in
general very hard, we prove three structure theorems which reduce the search
space, specifying certain admissible and optimal ((n,K,d)) additive codes. In
particular, we find there does not exist any ((7,3,3)) CWS code though the
linear programming bound does not rule it out. The complexity of the CWS search
algorithm is compared with the contrasting method introduced by Aggarwal and
Calderbank (arXiv:cs/0610159).Comment: 11 pages, 1 figur
On the Duality of Probing and Fault Attacks
In this work we investigate the problem of simultaneous privacy and integrity
protection in cryptographic circuits. We consider a white-box scenario with a
powerful, yet limited attacker. A concise metric for the level of probing and
fault security is introduced, which is directly related to the capabilities of
a realistic attacker. In order to investigate the interrelation of probing and
fault security we introduce a common mathematical framework based on the
formalism of information and coding theory. The framework unifies the known
linear masking schemes. We proof a central theorem about the properties of
linear codes which leads to optimal secret sharing schemes. These schemes
provide the lower bound for the number of masks needed to counteract an
attacker with a given strength. The new formalism reveals an intriguing duality
principle between the problems of probing and fault security, and provides a
unified view on privacy and integrity protection using error detecting codes.
Finally, we introduce a new class of linear tamper-resistant codes. These are
eligible to preserve security against an attacker mounting simultaneous probing
and fault attacks
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions
We introduce the class of multiply constant-weight codes to improve the
reliability of certain physically unclonable function (PUF) response. We extend
classical coding methods to construct multiply constant-weight codes from known
-ary and constant-weight codes. Analogues of Johnson bounds are derived and
are shown to be asymptotically tight to a constant factor under certain
conditions. We also examine the rates of the multiply constant-weight codes and
interestingly, demonstrate that these rates are the same as those of
constant-weight codes of suitable parameters. Asymptotic analysis of our code
constructions is provided
Observational signatures of Jordan-Brans-Dicke theories of gravity
We analyze the Jordan-Brans-Dicke model (JBD) of gravity, where deviations
from General Relativity (GR) are described by a scalar field non-minimally
coupled to gravity. The theory is characterized by a constant coupling
parameter, ; GR is recovered in the limit . In such theories, gravity modifications manifest at early times,
so that one cannot rely on the usual approach of looking for inconsistencies in
the expansion history and perturbations growth in order to discriminate between
JBD and GR. However, we show that a similar technique can be successfully
applied to early and late times observables instead. Cosmological parameters
inferred extrapolating early-time observations to the present will match those
recovered from direct late-time observations only if the correct gravity theory
is used. We use the primary CMB, as will be seen by the Planck satellite, as
the early-time observable; and forthcoming and planned Supernov{\ae}, Baryonic
Acoustic Oscillations and Weak Lensing experiments as late-time observables. We
find that detection of values of as large as 500 and 1000 is
within reach of the upcoming (2010) and next-generation (2020) experiments,
respectively.Comment: minor revision, references added, matching version published in JCA
- …