29 research outputs found

    Composable and Finite Computational Security of Quantum Message Transmission

    Full text link
    Recent research in quantum cryptography has led to the development of schemes that encrypt and authenticate quantum messages with computational security. The security definitions used so far in the literature are asymptotic, game-based, and not known to be composable. We show how to define finite, composable, computational security for secure quantum message transmission. The new definitions do not involve any games or oracles, they are directly operational: a scheme is secure if it transforms an insecure channel and a shared key into an ideal secure channel from Alice to Bob, i.e., one which only allows Eve to block messages and learn their size, but not change them or read them. By modifying the ideal channel to provide Eve with more or less capabilities, one gets an array of different security notions. By design these transformations are composable, resulting in composable security. Crucially, the new definitions are finite. Security does not rely on the asymptotic hardness of a computational problem. Instead, one proves a finite reduction: if an adversary can distinguish the constructed (real) channel from the ideal one (for some fixed security parameters), then she can solve a finite instance of some computational problem. Such a finite statement is needed to make security claims about concrete implementations. We then prove that (slightly modified versions of) protocols proposed in the literature satisfy these composable definitions. And finally, we study the relations between some game-based definitions and our composable ones. In particular, we look at notions of quantum authenticated encryption and QCCA2, and show that they suffer from the same issues as their classical counterparts: they exclude certain protocols which are arguably secure.Comment: 43+11 pages, 18 figures, v2: minor changes, extended version of the published pape

    Breaking Symmetric Cryptosystems Using Quantum Period Finding

    Get PDF
    Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography. This motivated the cryptographic community to search for quantum-safe solutions. On the other hand, the impact of quantum computing on secret key cryptography is much less understood. In this paper, we consider attacks where an adversary can query an oracle implementing a cryptographic primitive in a quantum superposition of different states. This model gives a lot of power to the adversary, but recent results show that it is nonetheless possible to build secure cryptosystems in it. We study applications of a quantum procedure called Simon's algorithm (the simplest quantum period finding algorithm) in order to attack symmetric cryptosystems in this model. Following previous works in this direction, we show that several classical attacks based on finding collisions can be dramatically sped up using Simon's algorithm: finding a collision requires Ω(2n/2)\Omega(2^{n/2}) queries in the classical setting, but when collisions happen with some hidden periodicity, they can be found with only O(n)O(n) queries in the quantum model. We obtain attacks with very strong implications. First, we show that the most widely used modes of operation for authentication and authenticated encryption e.g. CBC-MAC, PMAC, GMAC, GCM, and OCB) are completely broken in this security model. Our attacks are also applicable to many CAESAR candidates: CLOC, AEZ, COPA, OTR, POET, OMD, and Minalpher. This is quite surprising compared to the situation with encryption modes: Anand et al. show that standard modes are secure with a quantum-secure PRF. Second, we show that Simon's algorithm can also be applied to slide attacks, leading to an exponential speed-up of a classical symmetric cryptanalysis technique in the quantum model.Comment: 31 pages, 14 figure

    Effect of MgO sintering additive on mullite structures manufactured by fused deposition modeling (FDM) technology

    No full text
    An optimized recipe for 3D printing of Mullite-based structures was used to investigate the effect of MgO sintering additive on the processing stages and final ceramic properties. To achieve dense 3:2 mullite, ceramic filaments were prepared based on an alumina powder, a methyl silicone resin, EVA elastomeric binder and MgO powder. Using 1 wt% MgO and a dwell time of 5 h at 1600 \ub0C, a dense mullite structure could be obtained from filaments with a diameter of 1.75 mm. Ceramic structures with and without sintering additive were printed in vertical and horizontal direction, to investigate the effect of printing direction on mechanical strength after sintering. Using four-point bending test, it was demonstrated that by using MgO, the printing orientation did not affect the mechanical strength significantly anymore. The low Weibull modulus could be explained by the closed porosity that emerge during the degassing of the preceramic polymer due to cross-linking

    SiC particle reinforced Al matrix composites brazed on aluminum body for lightweight wear resistant brakes

    No full text
    Aluminum alloys are well known light-weight alloys and very interesting materials to optimize the strength/weight ratio in order to reduce automotive vehicle weight, fuel consumption and CO2 emissions; unfortunately, they are also relatively soft and therefore cannot be used for high wear applications. The aim of this work was to develop an aluminum alloy brake disc with wear-resistant SiC particle reinforced aluminum matrix composites (SiC/Al) joined on to its surface. Different approaches based on brazing or shrink fitting joining technologies were used to join SiC/Al to the aluminum alloy surface. A functional graded structure was built by brazing thin layers of aluminum matrix composites reinforced with progressively higher amount of SiC particles by using a Zn–Al based alloy as joining material. Several samples were prepared by shrink fitting and brazing: 40 mm x 40 mm x 10 mm samples and a 100 mm diameter brake disc with 68% SiC particle reinforced Al matrix surface and aluminum alloy A365 body. Tribological tests demonstrated that an aluminum alloy brake disc with wear-resistant SiC particle reinforced aluminum matrix composites (SiC/Al) brazed on its surface is a promising technical opportunity

    Mechanisms of resistance to EGFR targeted therapies

    No full text
    EGFR is a validated therapeutic target in many human cancers. EGFR targeted therapies are in widespread clinical use in patients with non-small cell lung cancer and other tumor types. Despite the clinical success of EGFR targeted therapy, resistance to treatment is a significant barrier to the optimized use of EGFR inhibitors to cure patients with lung and other cancers. Here, we review established and emerging mechanisms of resistance to EGFR targeted therapy and highlight strategies that could overcome treatment resistance and therefore enhance clinical outcomes

    NF-ÎșB-Activating Complex Engaged in Response to EGFR Oncogene Inhibition Drives Tumor Cell Survival and Residual Disease in Lung Cancer

    No full text
    Although oncogene-targeted therapy often elicits profound initial tumor responses in patients, responses are generally incomplete because some tumor cells survive initial therapy as residual disease that enables eventual acquired resistance. The mechanisms underlying tumor cell adaptation and survival during initial therapy are incompletely understood. Here, through the study of EGFR mutant lung adenocarcinoma, we show that NF-ÎșB signaling is rapidly engaged upon initial EGFR inhibitor treatment to promote tumor cell survival and residual disease. EGFR oncogene inhibition induced an EGFR-TRAF2-RIP1-IKK complex that stimulated an NF-ÎșB-mediated transcriptional survival program. The direct NF-ÎșB inhibitor PBS-1086 suppressed this adaptive survival program and increased the magnitude and duration of initial EGFR inhibitor response in multiple NSCLC models, including a patient-derived xenograft. These findings unveil NF-ÎșB activation as a critical adaptive survival mechanism engaged by EGFR oncogene inhibition and provide rationale for EGFR and NF-ÎșB co-inhibition to eliminate residual disease and enhance patient responses

    Third-generation femtosecond technology

    No full text
    Femtosecond pulse generation was pioneered four decades ago using mode-locked dye lasers, which dominated the field for the following 20 years. Dye lasers were then replaced with titanium-doped sapphire (Ti:Sa) lasers, which have had their own two-decade reign. Broadband optical parametric amplifiers (OPAs) appeared on the horizon more than 20 years ago but have been lacking powerful, cost-effective picosecond pump sources for a long time. Diode-pumped ytterbium-doped solid-state lasers are about to change this state of affairs profoundly. They are able to deliver 1 ps scale pulses at kilowatt-scale average power levels, which, in thin-disk lasers, may come in combination with terawatt-scale peak powers. Broadband OPAs pumped by these sources hold promise for surpassing the performance of current femtosecond systems so dramatically as to justify referring to them as the next generation. Third-generation femtosecond technology (3FST) offers the potential for femtosecond light tunable over several octaves, multi-terawatt few-cycle pulses, and synthesized multi-octave light transients. Unique tunability, temporal confinement, and waveform variety in combination with unprecedented average powers will extend nonlinear optics and laser spectroscopy to previously inaccessible wavelength domains, ranging from the far IR to the x-ray regime. Here we review the underlying concepts, technologies, and proof-of-principle experiments. A conceptual design study of a prototypical tunable and wideband source demonstrates the potential of 3FST for pushing the frontiers of femtosecond and attosecond science
    corecore