156 research outputs found

    Algebraic Cryptanalysis of STARK-Friendly Designs:Application to MARVELlous and MiMC

    Get PDF
    The block cipher Jarvis and the hash function Friday, both members of the MARVELlous family of cryptographic primitives, are among the first proposed solutions to the problem of designing symmetric-key algorithms suitable for transparent, post-quantum secure zero-knowledge proof systems such as ZK-STARKs. In this paper we describe an algebraic cryptanalysis of Jarvis and Friday and show that the proposed number of rounds is not sufficient to provide adequate security. In Jarvis, the round function is obtained by combining a finite field inversion, a full-degree affine permutation polynomial and a key addition. Yet we show that even though the high degree of the affine polynomial may prevent some algebraic attacks (as claimed by the designers), the particular algebraic properties of the round function make both Jarvis and Friday vulnerable to Gröbner basis attacks. We also consider MiMC, a block cipher similar in structure to Jarvis. However, this cipher proves to be resistant against our proposed attack strategy. Still, our successful cryptanalysis of Jarvis and Friday does illustrate that block cipher designs for “algebraic platforms” such as STARKs, FHE or MPC may be particularly vulnerable to algebraic attacks

    On the Concrete Security of Goldreich’s Pseudorandom Generator

    Get PDF
    International audienceLocal pseudorandom generators allow to expand a short random string into a long pseudo-random string, such that each output bit depends on a constant number d of input bits. Due to its extreme efficiency features, this intriguing primitive enjoys a wide variety of applications in cryptography and complexity. In the polynomial regime, where the seed is of size n and the output of size n s for s > 1, the only known solution, commonly known as Goldreich's PRG, proceeds by applying a simple d-ary predicate to public random sized subsets of the bits of the seed. While the security of Goldreich's PRG has been thoroughly investigated, with a variety of results deriving provable security guarantees against class of attacks in some parameter regimes and necessary criteria to be satisfied by the underlying predicate, little is known about its concrete security and efficiency. Motivated by its numerous theoretical applications and the hope of getting practical instantiations for some of them, we initiate a study of the concrete security of Goldreich's PRG, and evaluate its resistance to cryptanalytic attacks. Along the way, we develop a new guess-and-determine-style attack, and identify new criteria which refine existing criteria and capture the security guarantees of candidate local PRGs in a more fine-grained way

    What parameters affect left ventricular diastolic flow propagation velocity? in vitro studies using color m-mode doppler echocardiography

    Get PDF
    BACKGROUND: Insufficient data describe the relationship of hemodynamic parameters to left ventricular (LV) diastolic flow propagation velocity (Vp) measured using color M-mode Doppler echocardiography. METHODS: An in vitro LV model used to simulate LV diastolic inflow with Vp measured under conditions of varying: 1) Stroke volume, 2) heart rate (HR), 3) LV volume, 4) LV compliance, and 5) transmitral flow (TMF) waveforms (Type 1: constant low diastasis flow and Type 2: no diastasis flow). RESULTS: Univariate analysis revealed excellent correlations of Vp with stroke volume (r = 0.98), LV compliance (r = 0.94), and HR with Type 1 TMF (r = 0.97). However, with Type 2 TMF, HR was not associated with Vp. LV volume was not related to Vp under low compliance, but inversely related to Vp under high compliance conditions (r = -0.56). CONCLUSION: These in vitro findings may help elucidate the relationship of hemodynamic parameters to early diastolic LV filling

    Oxidative Stress and Mitochondrial Functions in the Intestinal Caco-2/15 Cell Line

    Get PDF
    Although mitochondrial dysfunction and oxidative stress are central mechanisms in various pathological conditions, they have not been extensively studied in the gastrointestinal tract, which is known to be constantly exposed to luminal oxidants from ingested foods. Key among these is the simultaneous consumption of iron salts and ascorbic acid, which can cause oxidative damage to biomolecules.The objective of the present work was to evaluate how iron-ascorbate (FE/ASC)-mediated lipid peroxidation affects mitochondrion functioning in Caco-2/15 cells. Our results show that treatment of Caco-2/15 cells with FE/ASC (0.2 mM/2 mM) (1) increased malondialdehyde levels assessed by HPLC; (2) reduced ATP production noted by luminescence assay; (3) provoked dysregulation of mitochondrial calcium homeostasis as evidenced by confocal fluorescence microscopy; (4) upregulated the protein expression of cytochrome C and apoptotic inducing factor, indicating exaggerated apoptosis; (5) affected mitochondrial respiratory chain complexes I, II, III and IV; (6) elicited mtDNA lesions as illustrated by the raised levels of 8-OHdG; (7) lowered DNA glycosylase, one of the first lines of defense against 8-OHdG mutagenicity; and (8) altered the gene expression and protein mass of mitochondrial transcription factors (mtTFA, mtTFB1, mtTFB2) without any effects on RNA Polymerase. The presence of the powerful antioxidant BHT (50 microM) prevented the occurrence of oxidative stress and most of the mitochondrial abnormalities.Collectively, our findings indicate that acute exposure of Caco-2/15 cells to FE/ASC-catalyzed peroxidation produces harmful effects on mitochondrial functions and DNA integrity, which are abrogated by the powerful exogenous BHT antioxidant. Functional derangements of mitochondria may have implications in oxidative stress-related disorders such as inflammatory bowel diseases

    Plants used traditionally to treat malaria in Brazil: the archives of Flora Medicinal

    Get PDF
    The archives of Flora Medicinal, an ancient pharmaceutical laboratory that supported ethnomedical research in Brazil for more than 30 years, were searched for plants with antimalarial use. Forty plant species indicated to treat malaria were described by Dr. J. Monteiro da Silva (Flora Medicinal leader) and his co-workers. Eight species, Bathysa cuspidata, Cosmos sulphureus, Cecropia hololeuca, Erisma calcaratum, Gomphrena arborescens, Musa paradisiaca, Ocotea odorifera, and Pradosia lactescens, are related as antimalarial for the first time in ethnobotanical studies. Some species, including Mikania glomerata, Melampodium divaricatum, Galipea multiflora, Aspidosperma polyneuron, and Coutarea hexandra, were reported to have activity in malaria patients under clinical observation. In the information obtained, also, there were many details about the appropriate indication of each plant. For example, some plants are indicated to increase others' potency. There are also plants that are traditionally employed for specific symptoms or conditions that often accompany malaria, such as weakness, renal failure or cerebral malaria. Many plants that have been considered to lack activity against malaria due to absence of in vitro activity against Plasmodium can have other mechanisms of action. Thus researchers should observe ethnomedical information before deciding which kind of screening should be used in the search of antimalarial drugs

    Genome-wide temporal-spatial gene expression profiling of drought responsiveness in rice

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Rice is highly sensitive to drought, and the effect of drought may vary with the different genotypes and development stages. Genome-wide gene expression profiling was used as the initial point to dissect molecular genetic mechanism of this complex trait and provide valuable information for the improvement of drought tolerance in rice. Affymetrix rice genome array containing 48,564 <it>japonica </it>and 1,260 <it>indica </it>sequences was used to analyze the gene expression pattern of rice exposed to drought stress. The transcriptome from leaf, root, and young panicle at three developmental stages was comparatively analyzed combined with bioinformatics exploring drought stress related <it>cis</it>-elements.</p> <p>Results</p> <p>There were 5,284 genes detected to be differentially expressed under drought stress. Most of these genes were tissue- or stage-specific regulated by drought. The tissue-specific down-regulated genes showed distinct function categories as photosynthesis-related genes prevalent in leaf, and the genes involved in cell membrane biogenesis and cell wall modification over-presented in root and young panicle. In a drought environment, several genes, such as <it>GA2ox, SAP15</it>, and <it>Chitinase III</it>, were regulated in a reciprocal way in two tissues at the same development stage. A total of 261 transcription factor genes were detected to be differentially regulated by drought stress. Most of them were also regulated in a tissue- or stage-specific manner. A <it>cis</it>-element containing special CGCG box was identified to over-present in the upstream of 55 common induced genes, and it may be very important for rice plants responding to drought environment.</p> <p>Conclusions</p> <p>Genome-wide gene expression profiling revealed that most of the drought differentially expressed genes (DEGs) were under temporal and spatial regulation, suggesting a crosstalk between various development cues and environmental stimuli. The identification of the differentially regulated DEGs, including TF genes and unique candidate <it>cis</it>-element for drought responsiveness, is a very useful resource for the functional dissection of the molecular mechanism in rice responding to environment stress.</p

    Finding the Needles in the Metagenome Haystack

    Get PDF
    In the collective genomes (the metagenome) of the microorganisms inhabiting the Earth’s diverse environments is written the history of life on this planet. New molecular tools developed and used for the past 15 years by microbial ecologists are facilitating the extraction, cloning, screening, and sequencing of these genomes. This approach allows microbial ecologists to access and study the full range of microbial diversity, regardless of our ability to culture organisms, and provides an unprecedented access to the breadth of natural products that these genomes encode. However, there is no way that the mere collection of sequences, no matter how expansive, can provide full coverage of the complex world of microbial metagenomes within the foreseeable future. Furthermore, although it is possible to fish out highly informative and useful genes from the sea of gene diversity in the environment, this can be a highly tedious and inefficient procedure. Microbial ecologists must be clever in their pursuit of ecologically relevant, valuable, and niche-defining genomic information within the vast haystack of microbial diversity. In this report, we seek to describe advances and prospects that will help microbial ecologists glean more knowledge from investigations into metagenomes. These include technological advances in sequencing and cloning methodologies, as well as improvements in annotation and comparative sequence analysis. More significant, however, will be ways to focus in on various subsets of the metagenome that may be of particular relevance, either by limiting the target community under study or improving the focus or speed of screening procedures. Lastly, given the cost and infrastructure necessary for large metagenome projects, and the almost inexhaustible amount of data they can produce, trends toward broader use of metagenome data across the research community coupled with the needed investment in bioinformatics infrastructure devoted to metagenomics will no doubt further increase the value of metagenomic studies in various environments

    Public Key Compression for Constrained Linear Signature Schemes

    Get PDF
    We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation of signature schemes, concrete instantiations of which can be found in MQ-based, code-based, and lattice-based cryptography. Moreover, we revisit and expand on a transformation by Szepieniec et al. to shrink the public key at the cost of a larger signature while reducing their combined size. This transformation can be used in a way that is provably secure in the random oracle model, and in a more aggressive variant whose security remained unproven. In this paper we show that this transformation applies to any constrained linear trapdoor signature scheme, and prove the security of the first mode in the quantum random oracle model. Moreover, we identify a property of constrained linear trapdoors that is sufficient (and necessary) for the more aggressive variant to be secure in the quantum random oracle model. We apply the transformation to an MQ-based scheme, a code-based scheme and a lattice-based scheme targeting 128-bits of post quantum security, and we show that in some cases the combined size of a signature and a public key can be reduced by more than a factor 300
    • …
    corecore