61 research outputs found

    Trusted Computing using Enhanced Manycore Architectures with Cryptoprocessors

    No full text
    International audienceManycore architectures correspond to a main evolution of computing systems due to their high processing power. Many applications can be executed in parallel which provides users with a very efficient technology. Cloud computing is one of the many domains where manycore architectures will play a major role. Thus, building secure manycore architectures is a critical issue. However a trusted platform based on manycore architectures is not available yet. In this paper we discuss the main challenges and some possible solutions to enhance manycore architectures with cryptoprocessor

    Side-Channel Analysis of the TERO PUF

    Get PDF
    Physical Unclonable Functions (PUFs) have the potential to provide a higher level of security for key storage than traditional Non-Volatile Memory (NVM). However, the susceptibility of the PUF primitives to non-invasive Side-Channel Analysis (SCA) is largely unexplored. While resistance to SCA was indicated for the Transient Effect Ring Oscillator (TERO) PUF, it was not backed by an actual assessment. To investigate the physical security of the TERO PUF, we first discuss and study the conceptual behavior of the PUF primitive to identify possible weaknesses. We support our claims by conducting an EM-analysis of a TERO design on an FPGA. When measuring TERO cells with an oscilloscope in the time domain, a Short Time Fourier Transform (STFT) based approach allows to extract the relevant information in the frequency domain. By applying this method we significantly reduce the entropy of the PUF. Our analysis shows the vulnerability of not only the originally suggested TERO PUF implementation but also the impact on TERO designs in general. We discuss enhancements of the design that potentially prevent the TERO PUF from exposing the secret and point out that regarding security the TERO PUF is similar to the more area-efficient Ring Oscillator PUF

    Landuse and soil degradation in the southern Maya lowlands, from Pre-Classic to Post-Classic times : The case of La Joyanca (Petén, Guatemala)

    Get PDF
    International audienceThis work focuses on the impact of Maya agriculture on soil degradation. In site and out site studies in the area of the city of La Joyanca (NW Petén) show that "Maya clays" do not constitute a homogeneous unit, but represent a complex sedimentary record. A high resolution analysis leads us to document changes in rates and practices evolving in time in relation with major socio-political and economic changes. It is possible to highlight extensive agricultural practices between Early Pre-classical to Late Pre-classical times. Intensification occurs in relation with reduction of the fallow duration during Pre-classic to Classic periods. The consequences of these changes on soil erosion are discussed. However, it does not seem that the agronomic potential of the soils was significantly degraded before the end of the Classic period

    Improved Key Recovery Attacks on Reduced-Round AES with Practical Data an d Memory Complexities

    Get PDF
    Determining the security of AES is a central problem in cryptanalysis, but progress in this area had been slow and only a handful of cryptanalytic techniques led to significant advancements. At Eurocrypt 2017 Grassi et al. presented a novel type of distinguisher for AES-like structures, but so far all the published attacks which were based on this distinguisher were inferior to previously known attacks in their complexity. In this paper we combine the technique of Grassi et al. with several other techniques in a novel way to obtain the best known key recovery attack on 5-round AES in the single-key model, reducing its overall complexity from about 2322^{32} to less than 2222^{22}. Extending our techniques to 7-round AES, we obtain the best known attacks on AES-192 which use practical amounts of data and memory, breaking the record for such attacks which was obtained in 2000 by the classical Square attack

    “Control-Alt-Delete”: Rebooting Solutions for the E-Waste Problem

    Full text link
    A number of efforts have been launched to solve the global electronic waste (e-waste) problem. The efficiency of e-waste recycling is subject to variable national legislation, technical capacity, consumer participation, and even detoxification. E-waste management activities result in procedural irregularities and risk disparities across national boundaries. We review these variables to reveal opportunities for research and policy to reduce the risks from accumulating e-waste and ineffective recycling. Full regulation and consumer participation should be controlled and reinforced to improve local e-waste system. Aiming at standardizing best practice, we alter and identify modular recycling process and infrastructure in eco-industrial parks that will be expectantly effective in countries and regions to handle the similar e-waste stream. Toxicity can be deleted through material substitution and detoxification during the life cycle of electronics. Based on the idea of "Control-Alt-Delete", four patterns of the way forward for global e-waste recycling are proposed to meet a variety of local situations

    Hardware implementation of some ECB-Mix-ECB based algorithms

    No full text
    International audienc

    Pipeline Implementation of Three Authenticated Encryption Algorithms

    No full text
    International audienc
    • …
    corecore