143,721 research outputs found

    Security Analysis of PRINCE

    Get PDF
    Publié à FSE 2013International audienceIn this article, we provide the first third-party security analysis of the PRINCE lightweight block cipher, and the underlying PRINCE_core. First, while no claim was made by the authors regarding related-key attacks, we show that one can attack the full cipher with only a single pair of related keys, and then reuse the same idea to derive an attack in the single-key model for the full PRINCE_core for several instances of the α parameter (yet not the one randomly chosen by the designers). We also show how to exploit the structural linear relations that exist for PRINCE in order to obtain a key recovery attack that slightly breaks the security claims for the full cipher. We analyze the application of integral attacks to get the best known key-recovery attack on a reduced version of the PRINCE cipher. Finally, we provide time-memory-data tradeoffs, that require only known plaintext-ciphertext data, and that can be applied to full PRINCE

    Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE

    Get PDF
    Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases. In this paper, we consider PRINCE, a widely analyzed block cipher proposed in 2012. After the identification of a 2.5 rounds subspace trail of PRINCE, we present several (truncated differential) attacks up to 6 rounds of PRINCE. This includes a very practical attack with the lowest data complexity of only 8 plaintexts for 4 rounds, which co-won the final round of the PRINCE challenge in the 4-round chosen-plaintext category. The attacks have been verified using a C implementation. Of independent interest, we consider a variant of PRINCE in which ShiftRows and MixLayer operations are exchanged in position. In particular, our result shows that the position of ShiftRows and MixLayer operations influences the security of PRINCE. The same analysis applies to follow-up designs inspired by PRINCE

    Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA

    Get PDF
    Over a decade, cryptographers are more attentive on designing lightweight ciphers in focus to compact cryptographic devices. More often, the security of these algorithms are defined in terms of its resistance to mathematical cryptanalysis methods. Nevertheless, designers are well aware of implementation attacks and concentrating on new design strategies to improve the defence quality against implementation attack. PRINCE ~\cite{Julia2012} and RECTANGLE ~\cite{cryptoeprint:2014:084} lightweight block ciphers are designed using new design strategies for efficiency and security. In this paper we analyse the security of PRINCE and RECTANGLE against a type of implementation attack called Differential Power Analysis (DPA) attack. Our attack reduces key search space from 21282^{128} to 3300833008 for PRINCE and 2802^{80} to 288288 for RECTANGLE

    Investing in Change: Trends, Challenges, and Opportunities For Women in the Washington Region's Labor Force

    Get PDF
    In this issue brief, we focus on promising approaches to building economic security for women through workforce development. In the following pages, we share the latest employment and labor force participation trends for working women in the Washington region, with a particular focus on low-income women. We identify some of the strategies of successful workforce development programs that support these women, and conclude with concrete steps that funders, policymakers, advocates, employers, and individuals can take to provide women with the effective education and job training programs they need to build economic security and change the trajectory of their lives

    Aftershocks: Women Speak Out Against Sexual Violence in Haiti's Camps

    Get PDF
    One year on, rape survivors continue to arrive at the office of a local women's support group almost every other day. Sexual violence was widespread in Haiti before January 2010 but this has been exacerbated by the conditions since the earthquake. AI's report highlights how the lack of security and policing in and around the camps is a major factor for the increase in attacks over the past year. AI is calling for the new government to urgently take steps to end violence against women as part of a wider plan to address the humanitarian effort. The report states that women in the camps must be fully involved in developing any such plan

    Optimal Checkpointing for Secure Intermittently-Powered IoT Devices

    Full text link
    Energy harvesting is a promising solution to power Internet of Things (IoT) devices. Due to the intermittent nature of these energy sources, one cannot guarantee forward progress of program execution. Prior work has advocated for checkpointing the intermediate state to off-chip non-volatile memory (NVM). Encrypting checkpoints addresses the security concern, but significantly increases the checkpointing overheads. In this paper, we propose a new online checkpointing policy that judiciously determines when to checkpoint so as to minimize application time to completion while guaranteeing security. Compared to state-of-the-art checkpointing schemes that do not account for the overheads of encrypted checkpoints we improve execution time up to 1.4x.Comment: ICCAD 201

    Civic Contributions: Taxes Paid by Immigrants in the Washington, DC, Metropolitan Area

    Get PDF
    This report estimates the taxes paid by immigrants in the Washington, D.C., area in 1999-2000 and documents their demographics, household composition, income, and dispersal across jurisdictions in the region. The findings in this report are based mostly on analysis of 2000 U.S. Census data, because the census provides the most recent comprehensive data that allow disaggregation by country of origin groups and by many of the region's local jurisdictions. The demographic data in the report are updated through 2004 using the U.S. Current Population Survey. We calculate taxes at both the individual level (e.g., income and payroll taxes) and the household level (e.g., property taxes), but aggregate them up to the household level. Throughout the report we refer to households headed by immigrants (whether citizens, legal immigrants, or unauthorized migrants) as "immigrant households" and compare their incomes and tax payments to households headed by native-born U.S. citizens

    Moving from the 'Why' to the 'How': Reflections on Humanitarian Response in urban settings

    Get PDF
    Given the rising numbers of crises in urban settings, Médecins Sans Frontières (MSF) is currently shifting its focus from 'why' it should intervene to 'how' it should intervene effectively in these contexts. Beyond communities affected by natural disasters and epidemics, MSF has chosen to target populations in urban settings that are affected by violence or by marginalisation and neglect: these groups appear to suffer the greatest number of severe threats to their health and well-being. Recent reflection within MSF has identified a number of key operational challenges to confront in order to respond efficiently to the needs of these populations. These include: appropriate assessments; measurable indicators of vulnerability and impact; pertinent operational approaches and medical strategies; adapted security management; and responsible closure of activities. This paper summarises the main lessons learned from working in urban settings with the principal aim of mutual sharing and understanding

    Greater Washington Works: IT and Health Careers with Promise

    Get PDF
    The Greater Washington Workforce Development Collaborative, an initiative of The Community Foundation for the National Capital Region, has partnered with JPMorgan Chase & Co. to develop new a research report, Greater Washington Works: IT and Health Careers with Promise, released today. The report focuses on how our region can address the skills gap and lift more of our neighbors out of poverty through careers in IT and Healthcare.With over 70% of net new jobs requiring post-secondary education and training, the Washington regional economy continues to be highly knowledge-based. Local employers, however, face challenges in finding skilled workers. Nearly 800,000 individuals in our region have no education past high school, highlighting a skills gap that has the potential to undermine our region's global economic competitiveness.Further, while it is encouraging that our regional unemployment rate has improved to pre-Great Recession levels, many of our neighbors are still struggling to make ends meet. Our region can count 100,000 additional residents living below the Federal poverty level since 2009. African American or Latino workers in the region are three times more likely to earn an income below the poverty level. Addressing our region's race, ethnicity, and gender-based income inequality is a critical challenge for our region to tackle if we want to ensure that all in our region have a fair shot for prosperity
    • …
    corecore