35 research outputs found

    State of the Art in Lightweight Symmetric Cryptography

    Get PDF
    Lightweight cryptography has been one of the hot topics in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a lightweight algorithm is usually designed to satisfy in both the software and the hardware case. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (NIST...) and international (ISO/IEC...) standards are listed. We identified several trends in the design of lightweight algorithms, such as the designers\u27 preference for ARX-based and bitsliced-S-Box-based designs or simpler key schedules. We also discuss more general trade-offs facing the authors of such algorithms and suggest a clearer distinction between two subsets of lightweight cryptography. The first, ultra-lightweight cryptography, deals with primitives fulfilling a unique purpose while satisfying specific and narrow constraints. The second is ubiquitous cryptography and it encompasses more versatile algorithms both in terms of functionality and in terms of implementation trade-offs

    State of the Art in Lightweight Symmetric Cryptography

    Get PDF
    Lightweight cryptography has been one of the ``hot topics'' in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a ``lightweight'' algorithm is usually designed to satisfy. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (\nist{}...) and international (\textsc{iso/iec}...) standards are listed. We then discuss some trends we identified in the design of lightweight algorithms, namely the designers' preference for \arx{}-based and bitsliced-S-Box-based designs and simple key schedules. Finally, we argue that lightweight cryptography is too large a field and that it should be split into two related but distinct areas: \emph{ultra-lightweight} and \emph{IoT} cryptography. The former deals only with the smallest of devices for which a lower security level may be justified by the very harsh design constraints. The latter corresponds to low-power embedded processors for which the \aes{} and modern hash function are costly but which have to provide a high level security due to their greater connectivity

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms

    Get PDF
    In this thesis, I present the research I did with my co-authors on several aspects of symmetric cryptography from May 2013 to December 2016, that is, when I was a PhD student at the university of Luxembourg under the supervision of Alex Biryukov. My research has spanned three different areas of symmetric cryptography. In Part I of this thesis, I present my work on lightweight cryptography. This field of study investigates the cryptographic algorithms that are suitable for very constrained devices with little computing power such as RFID tags and small embedded processors such as those used in sensor networks. Many such algorithms have been proposed recently, as evidenced by the survey I co-authored on this topic. I present this survey along with attacks against three of those algorithms, namely GLUON, PRINCE and TWINE. I also introduce a new lightweight block cipher called SPARX which was designed using a new method to justify its security: the Long Trail Strategy. Part II is devoted to S-Box reverse-engineering, a field of study investigating the methods recovering the hidden structure or the design criteria used to build an S-Box. I co-invented several such methods: a statistical analysis of the differential and linear properties which was applied successfully to the S-Box of the NSA block cipher Skipjack, a structural attack against Feistel networks called the yoyo game and the TU-decomposition. This last technique allowed us to decompose the S-Box of the last Russian standard block cipher and hash function as well as the only known solution to the APN problem, a long-standing open question in mathematics. Finally, Part III presents a unifying view of several fields of symmetric cryptography by interpreting them as purposefully hard. Indeed, several cryptographic algorithms are designed so as to maximize the code size, RAM consumption or time taken by their implementations. By providing a unique framework describing all such design goals, we could design modes of operations for building any symmetric primitive with any form of hardness by combining secure cryptographic building blocks with simple functions with the desired form of hardness called plugs. Alex Biryukov and I also showed that it is possible to build plugs with an asymmetric hardness whereby the knowledge of a secret key allows the privileged user to bypass the hardness of the primitive

    Safety and Reliability - Safe Societies in a Changing World

    Get PDF
    The contributions cover a wide range of methodologies and application areas for safety and reliability that contribute to safe societies in a changing world. These methodologies and applications include: - foundations of risk and reliability assessment and management - mathematical methods in reliability and safety - risk assessment - risk management - system reliability - uncertainty analysis - digitalization and big data - prognostics and system health management - occupational safety - accident and incident modeling - maintenance modeling and applications - simulation for safety and reliability analysis - dynamic risk and barrier management - organizational factors and safety culture - human factors and human reliability - resilience engineering - structural reliability - natural hazards - security - economic analysis in risk managemen

    Cellular Automata

    Get PDF
    Modelling and simulation are disciplines of major importance for science and engineering. There is no science without models, and simulation has nowadays become a very useful tool, sometimes unavoidable, for development of both science and engineering. The main attractive feature of cellular automata is that, in spite of their conceptual simplicity which allows an easiness of implementation for computer simulation, as a detailed and complete mathematical analysis in principle, they are able to exhibit a wide variety of amazingly complex behaviour. This feature of cellular automata has attracted the researchers' attention from a wide variety of divergent fields of the exact disciplines of science and engineering, but also of the social sciences, and sometimes beyond. The collective complex behaviour of numerous systems, which emerge from the interaction of a multitude of simple individuals, is being conveniently modelled and simulated with cellular automata for very different purposes. In this book, a number of innovative applications of cellular automata models in the fields of Quantum Computing, Materials Science, Cryptography and Coding, and Robotics and Image Processing are presented

    Proceedings of the Eighteenth International Sea Turtle Symposium, 3-7 March 1998, Mazatlán, Sinaloa, Mexico

    Get PDF
    For the first time in its history, the International Symposium on Sea Turtle Biology and Conservation migrated to a site outside of the United States. Thus the Eighteenth edition was hosted by the Mazatlán Research Unit of the Instituto de Ciencias del Mar y Limnología of the Mexican National Autonomous University (UNAM) in Mazatlán, Sinaloa (Mexico) where it was held from 3-7, March, 1998. Above all, our symposium is prominent for its dynamism and enthusiasm in bringing together specialists from the world´s sea turtle populations. In an effort to extend this philosophy, and fully aware of how fast the interest in sea turtles has grown, the organizers paid special attention to bring together as many people as possible. With the tremendous efforts of the Travel Committee and coupled with a special interest by the Latin American region´s devotees, we managed to get 653 participants from 43 countries. The number of presentations increased significantly too, reaching a total of 265 papers, ranging from cutting-edge scientific reports based on highly sophisticated methods, to the experiences and successes of community-based and environmental education programs. A priority given by this symposium was the support and encouragement for the construction of "bridges" across cultural and discipline barriers. We found success in achieving a multinational dialogue among interest groups- scientists, resource managers, decision makers, ngo's, private industry. There was a broad representation of the broad interests that stretch across these sectors, yet everyone was able to listen and offer their own best contribution towards the central theme of the Symposium: the conservation of sea turtles and the diversity of marine and coastal environments in which they develop through their complicated and protracted life cycle. Our multidisciplinary approach is highly important at the present, finding ourselves at a cross roads of significant initiatives in the international arena of environmental law, where the conservation of sea turtles has a key role to play. Many, many people worked hard over the previous 12 months, to make the symposium a success. Our sincerest thanks to all of them: Program committee: Laura Sarti (chair), Ana Barragán, Rod Mast, Heather Kalb, Jim Spotilla, Richard Reina, Sheryan Epperly, Anna Bass, Steve Morreale, Milani Chaloupka, Robert Van Dam, Lew Ehrhart, J. Nichols, David Godfrey, Larry Herbst, René Márquez, Jack Musick, Peter Dutton, Patricia Huerta, Arturo Juárez, Debora Garcia, Carlos Suárez, German Ramírez, Raquel Briseño, Alberto Abreu; Registration and Secretary: Jane Provancha (chair), Lupita Polanco; Informatics: Germán Ramírez, Carlos Suárez; Cover art: Blas Nayar; Designs: Germán Ramírez, Raquel Briseño, Alberto Abreu. Auction: Rod Mast; Workshops and special meetings: Selina Heppell; Student prizes: Anders Rhodin; Resolutions committee: Juan Carlos Cantú; Local organizing committee: Raquel Briseño, Jane Abreu; Posters: Daniel Ríos and Jeffrey Semminoff; Travel committee: Karen Eckert (chair), Marydele Donnelly, Brendan Godley, Annette Broderick, Jack Frazier; Student travel: Francisco Silva and J. Nichols; Vendors: Tom McFarland and J. Nichols; Volunteer coordination: Richard Byles; Latin American Reunión: Angeles Cruz Morelos; Nominations committee: Randall Arauz, Colleen Coogan, Laura Sarti, Donna Shaver, Frank Paladino. Once again, Ed Drane worked his usual magic with the Treasury of the Symposium Significant financial contributions were generously provided by government agencies. SEMARNAP (Mexico´s Ministry of Environment, Natural Resources and Fisheries) through its central office, the Mazatlán Regional Fisheries Research Center (CRIP-Mazatlán) and the National Center for Education and Capacity Building for Sustainable Development (CECADESU) contributed to the logistics and covered the costs of auditoria and audiovisual equipment for the Symposium, teachers and their hotels for the Community Development and Environmental Education workshop in the 5th Latin American Sea Turtle Specialists; DIF (Dept of Family Affairs) provided free accomodation and food for the more than 100 participants in the Latin American Reunion. In this Reunion, the British Council-Mexico sponsored the workshop on the Project Cycle. The National Chamber of the Fisheries Industry (CANAINPES) kindly sponsored the Symposium´s coffee breaks. Personnel from the local Navy (Octave Zona Naval) provided invaluable aid in transport and logistics. The Scientific Coordination Office from UNAM (CICUNAM) and the Latin American Biology Network (RELAB) also provided funding. Our most sincere recognition to all of them. In the name of this Symposium´s compilers, I would like to also express our gratitude to Wayne Witzell, Technical Editor for his guidance and insights and to Jack Frazier for his help in translating and correcting the English of contributions from some non-native English speakers. Many thanks to Angel Fiscal and Tere Martin who helped with the typing in the last, last corrections and editions for these Proceedings. To all, from around the world, who generously helped make the 18th Symposium a huge success, shared their experiences and listened to ours, our deepest gratitude! (PDF contains 316 pages
    corecore