45 research outputs found

    Post-Quantum Security for the Extended Access Control Protocol

    Get PDF
    The Extended Access Control (EAC) protocol for authenticated key agreement is mainly used to secure connections between machine-readable travel documents (MRTDs) and inspection terminals, but it can also be adopted as a universal solution for attribute-based access control with smart cards. The security of EAC is currently based on the Diffie-Hellman problem, which may not be hard when considering quantum computers. In this work we present PQ-EAC, a quantum-resistant version of the EAC protocol. We show how to achieve post-quantum confidentiality and authentication without sacrificing real-world usability on smart cards. To ease adoption, we present two main versions of PQ-EAC: One that uses signatures for authentication and one where authentication is facilitated using long-term KEM keys. Both versions can be adapted to achieve forward secrecy and to reduce round complexity. To ensure backwards-compatibility, PQ-EAC can be implemented using only Application Protocol Data Units (APDUs) specified for EAC in standard BSI TR-03110. Merely the protocol messages needed to achieve forward secrecy require an additional APDU not specified in TR-03110. We prove security of all versions in the real-or-random model of Bellare and Rogaway. To show real-world practicality of PQ-EAC we have implemented a version using signatures on an ARM SC300 security controller, which is typically deployed in MRTDs. We also implemented PQ-EAC on a VISOCORE terminal for border control. We then conducted several experiments to evaluate the performance of PQ-EAC executed between chip and terminal under various real-world conditions. Our results strongly suggest that PQ-EAC is efficient enough for use in border control

    Burning embers: towards more transparent and robust climate-change risk assessments

    Get PDF
    The Intergovernmental Panel on Climate Change (IPCC) reports provide policy-relevant insights about climate impacts, vulnerabilities and adaptation through a process of peer-reviewed literature assessments underpinned by expert judgement. An iconic output from these assessments is the burning embers diagram, first used in the Third Assessment Report to visualize reasons for concern, which aggregate climate-change-related impacts and risks to various systems and sectors. These burning embers use colour transitions to show changes in the assessed level of risk to humans and ecosystems as a function of global mean temperature. In this Review, we outline the history and evolution of the burning embers and associated reasons for concern framework, focusing on the methodological approaches and advances. While the assessment framework and figure design have been broadly retained over time, refinements in methodology have occurred, including the consideration of different risks, use of confidence statements, more formalized protocols and standardized metrics. Comparison across reports reveals that the risk level at a given temperature has generally increased with each assessment cycle, reflecting accumulating scientific evidence. For future assessments, an explicit, transparent and systematic process of expert elicitation is needed to enhance comparability, quality and credibility of burning embers

    High Mountain Areas

    Get PDF
    The cryosphere (including, snow, glaciers, permafrost, lake and river ice) is an integral element of high-mountain regions, which are home to roughly 10% of the global population. Widespread cryosphere changes affect physical, biological and human systems in the mountains and surrounding lowlands, with impacts evident even in the ocean. Building on the IPCC’s Fifth Assessment Report (AR5), this chapter assesses new evidence on observed recent and projected changes in the mountain cryosphere as well as associated impacts, risks and adaptation measures related to natural and human systems. Impacts in response to climate changes independently of changes in the cryosphere are not assessed in this chapter. Polar mountains are included in Chapter 3, except those in Alaska and adjacent Yukon, Iceland, and Scandinavia, which are included in this chapter

    Klimaschutz, das Kyoto-Protokoll und der Schweizer Wald. [E-Anhang]

    No full text
    ISSN:0036-7818ISSN:2235-146

    Unterrichtsprogramm "Stabilität"

    No full text

    Unterrichtsprogramm "Drosophila"

    No full text

    Synchrony and travelling waves of larch bud moth? Time series analysis with changing scale

    No full text
    Spatio-temporal patterns of cyclic larch bud moth population densities, for instance synchrony (valley scale) and travelling waves (Alpine arc scale), have been observed at different scales and maybe related to distinct causes. In this study, quantification of population data through cross-correlation analysis and spectral analysis revealed that larch bud moth population cycles at the valley scale could be considered to be in close synchrony with one another. At the Alpine arc scale the presence of travelling waves could generally be confirmed. These results have implications for the understanding of the causal mechanisms behind the observed spatio-temporal patterns, suggesting that at the valley scale synchrony depends not only on distances between subpopulations, but is also affected by environmental/habitat characteristics that vary in space. At the Alpine scale, distance between populations is of greater importance in shaping spatio-temporal patterns than at the valley scale

    Towards Narrowing the Curation Gap—Theoretical Considerations and Lessons Learned from Decades of Practice

    No full text
    Research as a digital enterprise has created new, often poorly addressed challenges for the management and curation of research to ensure continuity, transparency, and accountability. There is a common misunderstanding that curation can be considered at a later point in the research cycle or delegated or that it is too burdensome or too expensive due to a lack of efficient tools. This creates a curation gap between research practice and curation needs. We argue that this gap can be narrowed if curators provide attractive support that befits research needs and if researchers consistently manage their work according to generic concepts consistently from the beginning. A rather uniquely long-term case study demonstrates how such concepts have helped to pragmatically implement a research practice intentionally using only minimalist tools for sustained, self-contained archiving since 1989. The paper sketches the concepts underlying three core research activities. (i) handling of research data, (ii) reference management as part of scholarly publishing, and (iii) advancing theories through modelling and simulation. These concepts represent a universally transferable best research practice, while technical details are obviously prone to continuous change. We hope it stimulates researchers to manage research similarly and that curators gain a better understanding of the curation challenges research practice actually faces
    corecore