566 research outputs found

    Distinguishing Majorana bound states from localized Andreev bound states by interferometry

    Full text link
    Experimental evidence for Majorana bound states (MBSs) is so far mainly based on the robustness of a zero-bias conductance peak. However, similar features can also arise due to Andreev bound states (ABSs) localized at the end of an island. We show that these two scenarios can be distinguished by an interferometry experiment based on embedding a Coulomb-blockaded island into an Aharonov-Bohm ring. For two ABSs, when the ground state is nearly degenerate, cotunneling can change the state of the island and interference is suppressed. By contrast, for two MBSs the ground state is nondegenerate and cotunneling has to preserve the island state, which leads to h/eh / e-periodic conductance oscillations with magnetic flux. Such interference setups can be realized with semiconducting nanowires or two-dimensional electron gases with proximity-induced superconductivity and may also be a useful spectroscopic tool for parity-flip mechanisms

    Coupling and braiding Majorana bound states in networks defined in proximitized two-dimensional electron gases

    Full text link
    Two-dimensional electron gases with strong spin-orbit coupling covered by a superconducting layer offer a flexible and potentially scalable platform for Majorana networks. We predict Majorana bound states (MBSs) to appear for experimentally achievable parameters and realistic gate potentials in two designs: either underneath a narrow stripe of a superconducting layer (S-stripes) or where a narrow stripe has been removed from a uniform layer (N-stripes). The coupling of the MBSs can be tuned for both types in a wide range (10 μ\mueV) using gates placed adjacent to the stripes. For both types, we numerically compute the local density of states for two parallel Majorana-stripe ends as well as Majorana trijunctions formed in a tuning-fork geometry. The MBS coupling between parallel Majorana stripes can be suppressed below 1 neV for potential barriers in the meV range for separations of about 200 nm. We further show that the MBS couplings in a trijunction can be gate-controlled in a range similar to the intra-stripe coupling while maintaining a sizable gap to the excited states (tens of μ\mueV). Altogether, this suggests that braiding can carried out on a time scale of 10-100 ns

    On the Design and Analysis of Stream Ciphers

    Get PDF
    This thesis presents new cryptanalysis results for several different stream cipher constructions. In addition, it also presents two new stream ciphers, both based on the same design principle. The first attack is a general attack targeting a nonlinear combiner. A new class of weak feedback polynomials for linear feedback shift registers is identified. By taking samples corresponding to the linear recurrence relation, it is shown that if the feedback polynomial has taps close together an adversary to take advantage of this by considering the samples in a vector form. Next, the self-shrinking generator and the bit-search generator are analyzed. Both designs are based on irregular decimation. For the self-shrinking generator, it is shown how to recover the internal state knowing only a few keystream bits. The complexity of the attack is similar to the previously best known but uses a negligible amount of memory. An attack requiring a large keystream segment is also presented. It is shown to be asymptotically better than all previously known attacks. For the bit-search generator, an algorithm that recovers the internal state is given as well as a distinguishing attack that can be very efficient if the feedback polynomial is not carefully chosen. Following this, two recently proposed stream cipher designs, Pomaranch and Achterbahn, are analyzed. Both stream ciphers are designed with small hardware complexity in mind. For Pomaranch Version 2, based on an improvement of previous analysis of the design idea, a key recovery attack is given. Also, for all three versions of Pomaranch, a distinguishing attack is given. For Achterbahn, it is shown how to recover the key of the latest version, known as Achterbahn-128/80. The last part of the thesis introduces two new stream cipher designs, namely Grain and Grain-128. The ciphers are designed to be very small in hardware. They also have the distinguishing feature of allowing users to increase the speed of the ciphers by adding extra hardware

    Time scales for Majorana manipulation using Coulomb blockade in gate-controlled superconducting nanowires

    Full text link
    We numerically compute the low-energy spectrum of a gate-controlled superconducting topological nanowire segmented into two islands, each Josephson-coupled to a bulk superconductor. This device may host two pairs of Majorana bound states and could provide a platform for testing Majorana fusion rules. We analyze the crossover between (i) a charge-dominated regime utilizable for initialization and readout of Majorana bound states, (ii) a single-island regime for dominating inter-island Majorana coupling, (iii) a Josephson-plasmon regime for large coupling to the bulk superconductors, and (iv) a regime of four Majorana bound states allowing for topologically protected Majorana manipulations. From the energy spectrum, we derive conservative estimates for the time scales of a fusion-rule testing protocol proposed recently [arXiv:1511.05153]. We also analyze the steps needed for basic Majorana braiding operations in branched nanowire structures

    Communicating Cybersecurity Vulnerability Information: A Producer-Acquirer Case Study

    Get PDF
    The increase in both the use of open-source software (OSS) and the number of new vulnerabilities reported in this software constitutes an increased threat to businesses, people, and our society. To mitigate this threat, vulnerability information must be efficiently handled in organizations. In addition, where e.g., IoT devices are integrated into systems, such information must be disseminated from producers, who are implementing patches and new firmware, to acquirers who are responsible for maintaining the systems. We conduct an exploratory case study with one producer of IoT devices and one acquirer of the same devices, where the acquirer integrates the devices into larger systems. Through this two-sided case study, we describe company roles, internal and inter-company communication, and the decisions that need to be made with regard to cybersecurity vulnerabilities. We also identify and discuss both challenges and opportunities for improvements, from the point of view of both the producer and acquirer

    Cryptanalysis of the Stream cipher BEAN

    Get PDF
    BEAN is a recent stream cipher proposal that uses Feedback with Carry Shift Registers (FCSRs) and an output function. There is a sound motivation behind the use of FCSRs in BEAN as they provide several cryptographically interesting properties. In this paper, we show that the output function is not optimal. We give an efficient distinguisher and a key recovery attack that is slightly better than brute force, requiring no significant memory. We then show how this attack can be made better with access to more keystream. Already with access to 6 KiB, the 80-bit key is recovered in time 2^73

    A Data Model and Processing Environment for Ocean-Wide Bathymetric Data Compilations

    Get PDF
    The compilation of ocean-wide digital bathymetric models (DBM) requires specific features of the bathymetric data storage and great flexibility of the data processing chain. In this article a solution based upon a spatial relational database management system and a Geographical Information System front end is introduced, which will eventually serve the compilation of a new DBM of the North Atlantic Ocean. As shown in a preliminary case study, the abundance of sounding data-both single beam and multibeam-available in that area to date bears an extremely high potential to derive a DBM with much greater accuracy and resolution than the DBMs commonly used today.La compilacion de modelos batimetricos digitales oceanicos requiere caracterfsticas especfficas de almacenamiento de datos batimetricos y una gran flexibilidad en la cadena de procesamiento de datos. En este articulo se presenta una solucion basada en un sistema de administracion de una base de datos relacionales espaciales y se introduce un Sistema de Informacion Geografica, que servira finalmente para la compilacion de un nuevo Modelo Batimetrico Digital del Oceano Atlantica Norte. Tal y como se muestra en un estudio de un caso preliminar, la abundancia de datos de sondeos - tanto multihaz como monohaz - disponibles actualmente en esa zona ofrecen un potencial extremadamente alto para alcanzar un Modelo Batimetrico Digital con mayor precision y resolucion que los modelos utilizados comunmente hoy en dia.La compilation des modeles bathymetriques numeriques (DBM) des oceans necessite des elements specifiques du stockage des donnees bathymetriques et une grande flexibilite de la chaine de traitement des donnees. Dans cet article, une solution reposant sur le systeme de gestion de la base de donnees relationnelle et un systeme d'information geographique frontal sont introduits, ce qui servira en fin de compte a la compilation d'un nouveau systeme DBM de l'ocean atlantique nord septentrional. Comme indique dans l'etude de cas preliminaire, le grand nombre de donnees de sondage, a la fois monofaisceau et multifaisceaux, disponible dans cette zone, constitue a ce jour un potentiet tres eteve pour la mise au point d'un DBM avec une exactitude et une resolution bien superieures a celle aujourd'hui des DBMs en service dans ces jours

    Security Evaluation of Stream Cipher Enocoro-128v2

    Get PDF
    Abstract in Undetermined This report presents a security evaluation of the Enocoro-128v2 stream cipher. Enocoro-128v2 was proposed in 2010 and is a member of the Enocoro family of stream ciphers. This evaluation examines several different attacks applied to the Enocoro-128v2 design. No attack better than exhaustive key search has been found

    Evaluation of Some Algorithms for Hardware-Oriented Message Authentication

    Get PDF
    In this technical report, we consider ultra light-weight constructions of message authentication in hardware applications. We examine several known constructions and evaluate details around their hardware implementations. These constructions are all based on the framework of universal hash functions

    Four-Majorana qubit with charge readout: dynamics and decoherence

    Full text link
    We present a theoretical analysis of a Majorana-based qubit consisting of two topological superconducting islands connected via a Josephson junction. The qubit is operated by electrostatic gates which control the coupling of two of the four Majorana zero modes. At the end of the operation, readout is performed in the charge basis. Even though the operations are not topologically protected, the proposed experiment can potentially shed light on the coherence of the parity degree of freedom in Majorana devices and serve as a first step towards topological Majorana qubits. We discuss in detail the charge-stability diagram and its use for characterizing the parameters of the devices, including the overlap of the Majorana edge states. We describe the multi-level spectral properties of the system and present a detailed study of its controlled coherent oscillations, as well as decoherence resulting from coupling to a non-Markovian environment. In particular, we study a gate-controlled protocol where conversion between Coulomb-blockade and transmon regimes generates coherent oscillations of the qubit state due to the overlap of Majorana modes. We show that, in addition to fluctuations of the Majorana coupling, considerable measurement errors may be accumulated during the conversion intervals when electrostatic fluctuations in the superconducting islands are present. These results are also relevant for several proposed implementations of topological qubits which rely on readout based on charge detection
    corecore