45 research outputs found

    Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery

    Get PDF
    In this paper, we describe a new variant of cube attacks called correlation cube attack. The new attack recovers the secret key of a cryptosystem by exploiting conditional correlation properties between the superpoly of a cube and a specific set of low-degree polynomials that we call a basis, which satisfies that the superpoly is a zero constant when all the polynomials in the basis are zeros. We present a detailed procedure of correlation cube attack for the general case, including how to find a basis of the superpoly of a given cube. One of the most significant advantages of this new analysis technique over other variants of cube attacks is that it converts from a weak-key distinguisher to a key recovery attack. As an illustration, we apply the attack to round-reduced variants of the stream cipher Trivium. Based on the tool of numeric mapping introduced by Liu at CRYPTO 2017, we develop a specific technique to efficiently find a basis of the superpoly of a given cube as well as a large set of potentially good cubes used in the attack on Trivium variants, and further set up deterministic or probabilistic equations on the key bits according to the conditional correlation properties between the superpolys of the cubes and their bases. For a variant when the number of initialization rounds is reduced from 1152 to 805, we can recover about 7-bit key information on average with time complexity 2442^{44}, using 2452^{45} keystream bits and preprocessing time 2512^{51}. For a variant of Trivium reduced to 835 rounds, we can recover about 5-bit key information on average with the same complexity. All the attacks are practical and fully verified by experiments. To the best of our knowledge, they are thus far the best known key recovery attacks for these variants of Trivium, and this is the first time that a weak-key distinguisher on Trivium stream cipher can be converted to a key recovery attack

    A Key-recovery Attack on 855-round Trivium

    Get PDF
    In this paper, we propose a key-recovery attack on Trivium reduced to 855 rounds. As the output is a complex Boolean polynomial over secret key and IV bits and it is hard to find the solution of the secret keys, we propose a novel nullification technique of the Boolean polynomial to reduce the output Boolean polynomial of 855-round Trivium. Then we determine the degree upper bound of the reduced nonlinear boolean polynomial and detect the right keys. These techniques can be applicable to most stream ciphers based on nonlinear feedback shift registers (NFSR). Our attack on 855855-round Trivium costs time complexity 2772^{77}. As far as we know, this is the best key-recovery attack on round-reduced Trivium. To verify our attack, we also give some experimental data on 721-round reduced Trivium

    Influences on the thermal efficiency of energy piles

    Get PDF
    Energy piles have recently emerged as a viable alternative to borehole heat exchangers, but their energy efficiency has so far seen little research. In this work, a finite element numerical model is developed for the accurate 3D analysis of transient diffusive and convective heat exchange phenomena taking place in geothermal structures. The model is validated by reproducing both the outcome of a thermal response test carried out on a test pile, and the average response of the linear heat source analytical solution. Then, the model is employed to carry out a parametric analysis to identify the key factors in maximising the pile energy efficiency. It is shown that the most influential design parameter is the number of pipes, which can be more conveniently increased, within a reasonable range, compared to increasing the pile dimensions. The influence of changing pile length, concrete conductivity, pile diameter and concrete cover are also discussed in light of their energetic implications. Counter to engineering intuition, the fluid flowrate does not emerge as important in energy efficiency, provided it is sufficient to ensure turbulent flow. The model presented in this paper can be easily adapted to the detailed study of other types of geothermal structures

    Fast Near Collision Attack on the Grain v1 Stream Cipher

    Get PDF
    Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of variables when mounting state recovery attacks. In this paper, we propose a general new cryptanalytic method on stream ciphers, called fast near collision attack, to address this situation. It combines a near collision property with the divide-and-conquer strategy so that only subsets of the internal state, associated with different keystream vectors, are recovered first and merged carefully later to retrieve the full large internal state. A self-contained method is introduced and improved to derive the target subset of the internal state from the partial state difference efficiently. As an application, we propose a new key recovery attack on Grain v1, one of the 77 finalists selected by the eSTREAM project, in the single-key setting. Both the pre-computation and the online phases are tailored according to its internal structure, to provide an attack for any fixed IV in 275.72^{75.7} cipher ticks after the pre-computation of 28.12^{8.1} cipher ticks, given 2282^{28}-bit memory and about 2192^{19} keystream bits. Practical experiments on Grain v1 itself whenever possible and on a 80-bit reduced version confirmed our results

    A three-country comparison of psychotropic medication prevalence in youth

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The study aims to compare cross-national prevalence of psychotropic medication use in youth.</p> <p>Methods</p> <p>A population-based analysis of psychotropic medication use based on administrative claims data for the year 2000 was undertaken for insured enrollees from 3 countries in relation to age group (0–4, 5–9, 10–14, and 15–19), gender, drug subclass pattern and concomitant use. The data include insured youth aged 0–19 in the year 2000 from the Netherlands (n = 110,944), Germany (n = 356,520) and the United States (n = 127,157).</p> <p>Results</p> <p>The annual prevalence of any psychotropic medication in youth was significantly greater in the US (6.7%) than in the Netherlands (2.9%) and in Germany (2.0%). Antidepressant and stimulant prevalence were 3 or more times greater in the US than in the Netherlands and Germany, while antipsychotic prevalence was 1.5–2.2 times greater. The atypical antipsychotic subclass represented only 5% of antipsychotic use in Germany, but 48% in the Netherlands and 66% in the US. The less commonly used drugs e.g. alpha agonists, lithium and antiparkinsonian agents generally followed the ranking of US>Dutch>German youth with very rare (less than 0.05%) use in Dutch and German youth. Though rarely used, anxiolytics were twice as common in Dutch as in US and German youth. Prescription hypnotics were half as common as anxiolytics in Dutch and US youth and were very uncommon in German youth. Concomitant drug use applied to 19.2% of US youth which was more than double the Dutch use and three times that of German youth.</p> <p>Conclusion</p> <p>Prominent differences in psychotropic medication treatment patterns exist between youth in the US and Western Europe and within Western Europe. Differences in policies regarding direct to consumer drug advertising, government regulatory restrictions, reimbursement policies, diagnostic classification systems, and cultural beliefs regarding the role of medication for emotional and behavioral treatment are likely to account for these differences.</p

    Pediatric drug safety signal detection: a new drug-event reference set for performance testing of data-mining methods and systems

    Get PDF
    BACKGROUND: Better evidence regarding drug safety in the pediatric population might be generated from existing data sources such as spontaneous reporting systems and electronic healthcare records. The Global Research in Paediatrics (GRiP)-Network of Excellence aims to develop pediatric-specific methods that can be applied to these data sources. A reference set of positive and negative drug-event associations is required. OBJECTIVE: The aim of this study was to develop a pediatric-specific reference set of positive and negative drug-event associations. METHODS: Considering user patterns and expert opinion, 16 drugs that are used in individuals aged 0-18 years were selected and evaluated against 16 events, regarded as important safety outcomes. A cross-table of unique drug-event pairs was created. Each pair was classified as potential positive or negative control based on information from the drug's Summary of Product Characteristics and Micromedex. If both information sources consistently listed the event as an adverse event, the combination was reviewed as potential positive control. If both did not, the combination was evaluated as potential negative control. Further evaluation was based on published literature. RESULTS: Selected drugs include ibuprofen, flucloxacillin, domperidone, methylphenidate, montelukast, quinine, and cyproterone/ethinylestradiol. Selected events include bullous eruption, aplastic anemia, ventricular arrhythmia, sudden death, acute kidney injury, psychosis, and seizure. Altogether, 256 unique combinations were reviewed, yielding 37 positive (17 with evidence from the pediatric population and 20 with evidence from adults only) and 90 negative control pairs, with the remainder being unclassifiable. CONCLUSION: We propose a drug-event reference set that can be used to compare different signal detection methods in the pediatric population
    corecore