73 research outputs found

    A Differential Fault Attack on Plantlet

    Get PDF
    Lightweight stream ciphers have received serious attention in the last few years. The present design paradigm considers very small state (less than twice the key size) and use of the secret key bits during pseudo-random stream generation. One such effort, Sprout, had been proposed two years back and it was broken almost immediately. After carefully studying these attacks, a modified version named Plantlet has been designed very recently. While the designers of Plantlet do not provide any analysis on fault attack, we note that Plantlet is even weaker than Sprout in terms of Differential Fault Attack (DFA). Our investigation, following the similar ideas as in the analysis against Sprout, shows that we require only around 4 faults to break Plantlet by DFA in a few hours time. While fault attack is indeed difficult to implement and our result does not provide any weakness of the cipher in normal mode, we believe that these initial results will be useful for further understanding of Plantlet

    Differential Fault Attack on Grain v1, ACORN v3 and Lizard

    Get PDF
    Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a stream cipher. This considers that the stream cipher can be weakened by injection of the fault. In this paper we study DFA on three ciphers, namely Grain v1, Lizard and ACORN v3. We show that Grain v1 (an eStream cipher) can be attacked with injection of only 5 faults instead of 10 that has been reported in 2012. For the first time, we have mounted the fault attack on Lizard, a very recent design and show that one requires only 5 faults to obtain the state. ACORN v3 is a third round candidate of CAESAR and there is only one hard fault attack on an earlier version of this cipher. However, the `hard fault\u27 model requires a lot more assumption than the generic DFA. In this paper, we mount a DFA on ACORN v3 that requires 9 faults to obtain the state. In case of Grain v1 and ACORN v3, we can obtain the secret key once the state is known. However, that is not immediate in case of Lizard. While we have used the basic framework of DFA that appears in literature quite frequently, specific tweaks have to be explored to mount the actual attacks that were not used earlier. To the best of our knowledge, these are the best known DFA on these three ciphers

    A TMDTO Attack Against Lizard

    Get PDF
    Lizard is a very recently proposed lightweight stream cipher that claims 60 bit security against distinguishing (related to state recovery) and 80 bit security against key recovery attack. This cipher has 121 bit state size. In this paper, we first note that using ψ\psi key stream bits one can recover ψ\psi unknown bits of the state when τ\tau state bits are fixed to a specific pattern. This is made possible by guessing the remaining state bits. This helps us in mounting a TMDTO attack with preprocessing complexity 2672^{67}, and the maximum of Data, Time and Memory complexity during the online phase as 2542^{54}. The parameters in the online phase are significantly less than 2602^{60}

    Fault Location Identification By Machine Learning

    Get PDF
    As the fault based analysis techniques are becoming more and more powerful, there is a need to streamline the existing tools for better accuracy and ease of use. In this regard, we propose a machine learning assisted tool that can be used in the context of a differential fault analysis. In particular, finding the exact fault location by analyzing the XORed output of a stream cipher/ stream cipher based design is somewhat non-trivial. Traditionally, Pearson\u27s correlation coefficient is used for this purpose. We show that a machine learning method is more powerful than the existing correlation coefficient, aside from being simpler to implement. As a proof of concept, we take two variants of Grain-128a (namely a stream cipher, and a stream cipher with authentication), and demonstrate that machine learning can outperform correlation with the same training/testing data. Our analysis shows that the machine learning can be considered as a replacement for the correlation in the future research works

    Denosumab compared with risedronate in postmenopausal women suboptimally adherent to alendronate therapy: Efficacy and safety results from a randomized open-label study

    Get PDF
    Denosumab has been shown to reduce new vertebral, nonvertebral, and hip fractures in postmenopausal women with osteoporosis. In subjects who were treatment-naive or previously treated with alendronate, denosumab was associated with greater gains in bone mineral density (BMD) and decreases in bone turnover markers when compared with alendronate-treated subjects. This trial was designed to compare the efficacy and safety of denosumab with risedronate over 12 months in postmenopausal women who transitioned from daily or weekly alendronate treatment and were considered to be suboptimally adherent to therapy. In this randomized, open-label study, postmenopausal women aged ≥55 years received denosumab 60 mg subcutaneously every 6 months or risedronate 150 mg orally every month for 12 months. Endpoints included percentage change from baseline in total hip BMD (primary endpoint), femoral neck, and lumbar spine BMD at month 12, and percentage change from baseline in sCTX-1 at months 1 and 6. Safety was also assessed. A total of 870 subjects were randomized (435, risedronate; 435, denosumab) who had a mean (SD) age of 67.7 (6.9) years, mean (SD) BMD T-scores of -1.6 (0.9), -1.9 (0.7), and -2.2 (1.2) at the total hip, femoral neck, and lumbar spine, respectively, and median sCTX-1 of 0.3 ng/mL at baseline. At month 12, denosumab significantly increased BMD compared with risedronate at the total hip (2.0% vs 0.5%), femoral neck (1.4% vs 0%), and lumbar spine (3.4% vs 1.1%; p<0.0001 at all sites). Denosumab significantly decreased sCTX-1 compared with risedronate at month 1 (median change from baseline of -78% vs -17%; p<0.0001) and month 6 (-61% vs -23%; p<0.0001). Overall and serious adverse events were similar between groups. In postmenopausal women who were suboptimally adherent to alendronate therapy, transitioning to denosumab was well tolerated and more effective than risedronate in increasing BMD and reducing bone turnover

    Regulation of matrix Gla protein by parathyroid hormone in MC3T3-E1 osteoblast-like cells involves protein kinase A and extracellular signal-regulated kinase pathways

    Full text link
    Inhibition of osteoblast-mediated mineralization is one of the major catabolic effects of parathyroid hormone (PTH) on bone. Previously, we showed that PTH induces matrix Γ-carboxyglutamic acid (Gla) protein (MGP) expression and established that this induction is critical for PTH-mediated inhibition of osteoblast mineralization. In the present study, we focus on the mechanism through which PTH regulates MGP expression in osteoblastic MC3T3-E1 cells. Following transient transfection of these cells with a −748 bp murine MGP promoter-luciferase construct (pMGP-luc), PTH (10 −7 M) induced promoter activity in a time-dependent manner with a maximal four- to six fold induction seen 6 h after PTH treatment. Both H-89 (PKA inhibitor) and U0126 (MEK inhibitor), suppressed PTH induction of MGP promoter activity as well as the MGP mRNA level. In addition, forskolin (PKA activator) stimulated MGP promoter activity and mRNA levels confirming that PKA is one of the signaling molecules required for regulation of MGP by PTH. Co-transfection of MC3T3-E1 cells with pMGP-luc and MEK(SP), a plasmid encoding the constitutively active form of MEK, led to a dose-dependent increase in MGP promoter activity. Both MGP promoter activity and MGP mRNA level were not affected by the protein kinase C (PKC) inhibitor, GF109203X. However, phorbol 12-myristate 13-acetate (PMA), a selective PKC activator induced MGP mRNA expression through activation of extracellular signal-regulated kinase (ERK). Taken together, these results indicate that PTH regulates MGP via both PKA- and ERK-dependent pathways. J. Cell. Biochem. 102: 496–505, 2007. © 2007 Wiley-Liss, Inc.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/57362/1/21314_ftp.pd

    SUSTAINABLE METHODS AND PRACTICES IN INDIAN LEATHER EXPORTS

    No full text
    <p>Indian leather has bright prospects of exports and foreign exchange earning. But in the hindsight the fact that the very nature of this industry is pollution intensive has made this sector heterogeneous. This theory has been very well proved by Copeland and Taylor (2004) which states that “under free trade between developed countries and the developing countries, the exports of dirty industry increases in the developing countries as a  result of higher production and consequential impact on<br>environment of the developing country”.</p> <p> </p

    A Differential Fault Attack on Plantlet

    No full text
    corecore