45 research outputs found
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
In this paper, we describe a new variant of cube attacks called correlation cube attack. The new attack recovers the secret key of a cryptosystem by exploiting conditional correlation properties between the superpoly of a cube and a specific set of low-degree polynomials that we call a basis, which satisfies that the superpoly is a zero constant when all the polynomials in the basis are zeros. We present a detailed procedure of correlation cube attack for the general case, including how to find a basis of the superpoly of a given cube. One of the most significant advantages of this new analysis technique over other variants of cube attacks is that it converts from a weak-key distinguisher to a key recovery attack.
As an illustration, we apply the attack to round-reduced variants of the stream cipher Trivium. Based on the tool of numeric mapping introduced by Liu at CRYPTO 2017, we develop a specific technique to efficiently find a basis of the superpoly of a given cube as well as a large set of potentially good cubes used in the attack on Trivium variants, and further set up deterministic or probabilistic equations on the key bits according to the conditional correlation properties between the superpolys of the cubes and their bases. For a variant when the number of initialization rounds is reduced from 1152 to 805, we can recover about 7-bit key information on average with time complexity , using keystream bits and preprocessing time . For a variant of Trivium reduced to 835 rounds, we can recover about 5-bit key information on average with the same complexity. All the attacks are practical and fully verified by experiments. To the best of our knowledge, they are thus far the best known key recovery attacks for these variants of Trivium, and this is the first time that a weak-key distinguisher on Trivium stream cipher can be converted to a key recovery attack
A Key-recovery Attack on 855-round Trivium
In this paper, we propose a key-recovery attack on Trivium reduced to 855 rounds.
As the output is a complex Boolean polynomial over secret key and IV bits and it is hard to find the solution of the secret keys, we propose a novel nullification technique of the Boolean polynomial to reduce the output Boolean polynomial of 855-round Trivium. Then we determine the degree upper bound of the reduced nonlinear boolean polynomial and detect the right keys. These techniques can be applicable to most stream ciphers based on nonlinear feedback shift registers (NFSR). Our attack on -round Trivium costs time complexity . As far as we know, this is the best key-recovery attack on round-reduced Trivium.
To verify our attack, we also give some experimental data on 721-round reduced Trivium
Legislative History: An Act Concerning the Operation of Emergency Medical Vehicles (SP482)(LD 1303)
https://digitalmaine.com/legishist114/2302/thumbnail.jp
Influences on the thermal efficiency of energy piles
Energy piles have recently emerged as a viable alternative to borehole heat exchangers, but their energy efficiency has so far seen little research. In this work, a finite element numerical model is developed for the accurate 3D analysis of transient diffusive and convective heat exchange phenomena taking place in geothermal structures. The model is validated by reproducing both the outcome of a thermal response test carried out on a test pile, and the average response of the linear heat source analytical solution. Then, the model is employed to carry out a parametric analysis to identify the key factors in maximising the pile energy efficiency. It is shown that the most influential design parameter is the number of pipes, which can be more conveniently increased, within a reasonable range, compared to increasing the pile dimensions. The influence of changing pile length, concrete conductivity, pile diameter and concrete cover are also discussed in light of their energetic implications. Counter to engineering intuition, the fluid flowrate does not emerge as important in energy efficiency, provided it is sufficient to ensure turbulent flow. The model presented in this paper can be easily adapted to the detailed study of other types of geothermal structures
Fast Near Collision Attack on the Grain v1 Stream Cipher
Modern stream ciphers often adopt a large internal state to resist various
attacks, where the cryptanalysts have to deal with a large number of variables
when mounting state recovery attacks. In this paper, we propose a general new
cryptanalytic method on stream ciphers, called fast near collision attack, to
address this situation. It combines a near collision property with the
divide-and-conquer strategy so that only subsets of the internal state,
associated with different keystream vectors, are recovered first and merged
carefully later to retrieve the full large internal state. A self-contained
method is introduced and improved to derive the target subset of the internal
state from the partial state difference efficiently. As an application, we
propose a new key recovery attack on Grain v1, one of the finalists
selected by the eSTREAM project, in the single-key setting. Both the
pre-computation and the online phases are tailored according to its internal
structure, to provide an attack for any fixed IV in cipher ticks
after the pre-computation of cipher ticks, given -bit memory
and about keystream bits. Practical experiments on Grain v1 itself
whenever possible and on a 80-bit reduced version confirmed our results
A three-country comparison of psychotropic medication prevalence in youth
<p>Abstract</p> <p>Background</p> <p>The study aims to compare cross-national prevalence of psychotropic medication use in youth.</p> <p>Methods</p> <p>A population-based analysis of psychotropic medication use based on administrative claims data for the year 2000 was undertaken for insured enrollees from 3 countries in relation to age group (0–4, 5–9, 10–14, and 15–19), gender, drug subclass pattern and concomitant use. The data include insured youth aged 0–19 in the year 2000 from the Netherlands (n = 110,944), Germany (n = 356,520) and the United States (n = 127,157).</p> <p>Results</p> <p>The annual prevalence of any psychotropic medication in youth was significantly greater in the US (6.7%) than in the Netherlands (2.9%) and in Germany (2.0%). Antidepressant and stimulant prevalence were 3 or more times greater in the US than in the Netherlands and Germany, while antipsychotic prevalence was 1.5–2.2 times greater. The atypical antipsychotic subclass represented only 5% of antipsychotic use in Germany, but 48% in the Netherlands and 66% in the US. The less commonly used drugs e.g. alpha agonists, lithium and antiparkinsonian agents generally followed the ranking of US>Dutch>German youth with very rare (less than 0.05%) use in Dutch and German youth. Though rarely used, anxiolytics were twice as common in Dutch as in US and German youth. Prescription hypnotics were half as common as anxiolytics in Dutch and US youth and were very uncommon in German youth. Concomitant drug use applied to 19.2% of US youth which was more than double the Dutch use and three times that of German youth.</p> <p>Conclusion</p> <p>Prominent differences in psychotropic medication treatment patterns exist between youth in the US and Western Europe and within Western Europe. Differences in policies regarding direct to consumer drug advertising, government regulatory restrictions, reimbursement policies, diagnostic classification systems, and cultural beliefs regarding the role of medication for emotional and behavioral treatment are likely to account for these differences.</p
Pediatric drug safety signal detection: a new drug-event reference set for performance testing of data-mining methods and systems
BACKGROUND: Better evidence regarding drug safety in the pediatric population might be generated from existing data sources such as spontaneous reporting systems and electronic healthcare records. The Global Research in Paediatrics (GRiP)-Network of Excellence aims to develop pediatric-specific methods that can be applied to these data sources. A reference set of positive and negative drug-event associations is required. OBJECTIVE: The aim of this study was to develop a pediatric-specific reference set of positive and negative drug-event associations. METHODS: Considering user patterns and expert opinion, 16 drugs that are used in individuals aged 0-18 years were selected and evaluated against 16 events, regarded as important safety outcomes. A cross-table of unique drug-event pairs was created. Each pair was classified as potential positive or negative control based on information from the drug's Summary of Product Characteristics and Micromedex. If both information sources consistently listed the event as an adverse event, the combination was reviewed as potential positive control. If both did not, the combination was evaluated as potential negative control. Further evaluation was based on published literature. RESULTS: Selected drugs include ibuprofen, flucloxacillin, domperidone, methylphenidate, montelukast, quinine, and cyproterone/ethinylestradiol. Selected events include bullous eruption, aplastic anemia, ventricular arrhythmia, sudden death, acute kidney injury, psychosis, and seizure. Altogether, 256 unique combinations were reviewed, yielding 37 positive (17 with evidence from the pediatric population and 20 with evidence from adults only) and 90 negative control pairs, with the remainder being unclassifiable. CONCLUSION: We propose a drug-event reference set that can be used to compare different signal detection methods in the pediatric population