105 research outputs found

    Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE

    Get PDF
    The signed difference is a powerful tool for analyzing the Addition, XOR, Rotation (ARX) cryptographic primitives. Currently, solving the accurate model for the signed difference propagation is infeasible. We propose an approximate MILP modeling method capturing the propagation rules of signed differences. Unlike the accurate signed difference model, the approximate model only focuses on active bits and ignores the possible bit conditions on inactive bits. To overcome the negative effect of a lower accuracy arising from ignoring bit conditions on inactive bits, we propose an additional tool for deducing all bit conditions automatically. Such a tool is based on a directed-graph capturing the whole computation process of ARX primitives by drawing links among intermediate words and operations. The digraph is also applicable in the MILP model construction process: it enables us to identify the parameters upper bounding the number of bit conditions so as to define the objective function; it is further used to connect the boomerang top and bottom signed differential paths by introducing proper constraints to avoid incompatible intersections. Benefiting from the approximate model and the directed-graph based tool, the solving time of the new MILP model is significantly reduced, enabling us to deduce signed differential paths efficiently and accurately. To show the utility of our method, we propose boomerang attacks on the keyed permutations of three ARX hash functions of BLAKE. For the first time we mount an attack on the full 7 rounds of BLAKE3, with the complexity as low as 21802^{180}. Our best attack on BLAKE2s can improve the previously best result by 0.5 rounds but with lower complexity. The attacks on BLAKE-256 cover the same 8 rounds with the previous best result but with complexity 2162^{16} times lower. All our results are verified practically with round-reduced boomerang quartets

    Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher

    Get PDF
    In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improved cryptanalysis results on the Sosemanuk stream cipher, one of the 7 finalists in the eSTREAM project in 2008. The new algorithm exploits the direct sum construction of covering codes in decoding phase which approximates the random vectors to a nearest codeword in a linear code. The new strategy provides large flexibility for the adversary and could reduce the time/memory/data complexities significantly. As a case study, we carefully revisit Sosemanuk and demonstrate a state recovery attack with a time complexity of 2134.8, which is 220 times faster than achievable before by the same kind of attack and is the fastest one among all known attacks so far. Our result indicates an inefficiency in longer keys than 135 bits and depicts that the security margin of Sosemanuk is around 28 for the 128-bit security for the first time

    Number 2 Feibi Recipe Reduces PM2.5-Induced Lung Injury in Rats

    Get PDF
    Air pollution is the main cause of respiratory diseases. Fine particulates with the diameter below 2.5 μm can get into the alveoli and then enter the blood circulation through the lung tissue ventilation function and cause multiple systemic diseases especially the respiratory diseases. This study investigated the pathological mechanism of the lungs injury in rats induced by PM2.5 and the effect and mechanism of the Chinese herbal medicine number 2 Feibi Recipe (number 2 FBR) on lungs injury. In this experiment, Wistar rats were used. Lungs injury was induced by PM2.5. Number 2 FBR was used to treat the rats. The result showed that number 2 FBR could improve the lung injury in the rats. Meanwhile, it significantly reduced pathological response and inflammatory mediators including interleukin-6 (IL-6), interleukin-13 (IL-13), interleukin-17 (IL17), monocyte chemotactic protein-1 (MCP-1), and transforming growth factor-α (TNF-α) and upregulated glutathione peroxidase (GSH-Px) in the PM2.5 induced lung injury in the rats. Collectively, number 2 FBR appears to attenuate the lungs injury in rats induced by PM2.5

    Key Filtering in Cube Attacks from the Implementation Aspect

    Get PDF
    In cube attacks, key filtering is a basic step of identifying the correct key candidates by referring to the truth tables of superpolies. When terms of superpolies get massive, the truth table lookup complexity of key filtering increases significantly. In this paper, we propose the concept of implementation dependency dividing all cube attacks into two categories: implementation dependent and implementation independent. The implementation dependent cube attacks can only be feasible when the assumption that one encryption oracle query is more complicated than one table lookup holds. On the contrary, implementation independent cube attacks remain feasible in the extreme case where encryption oracles are implemented in the full codebook manner making one encryption query equivalent to one table lookup. From this point of view, we scrutinize existing cube attack results of stream ciphers Trivium, Grain-128AEAD, Acorn and Kreyvium. As a result, many of them turn out to be implementation dependent. Combining with the degree evaluation and divide-and-conquer techniques used for superpoly recovery, we further propose new cube attack results on Kreyvium reduced to 898, 899 and 900 rounds. Such new results not only mount to the maximal number of rounds so far but also are implementation independent

    BAG Family Gene and Its Relationship with Lung Adenocarcinoma Susceptibility

    Get PDF
    Background and objective BAG genes (Bcl-2-associated athanogene) belong to a recently discovered multifunctional anti-apoptosis gene family that regulate various physiological processes which include apoptosis, tumorigenesis, neural differentiation, stress response and cell cycle and so on. The expression status of BAG family genes are related to certain tumor incidence and prognosis. The aim of this study is to explore the association of the BAG family gene expression status with the susceptibility of lung adenocarcinoma. Methods The gene expression data of BAG family genes from 29 cases of lung adenocarcinoma tissues and matched pericancerous lung tissess were generated by microarray chips. Cox regression was used to analyze the association between the expression of BAG family genes and the susceptibility of lung adenocarcinoma and the results were verified by GEO database. Results The expression levels of BAG-1, BAG-2, BAG-5 in cancer tissues were significantly downregulated compared with matched pericancerous lung tissues and were protective factors of lung adenocarcinoma (P < 0.05, OR < 1); while the expression level of BAG-4 in cancer tissues were remankably upregulated compared with the matched pericancerous lung tissues and was risk factor of lung adenocarcinoma (P < 0.05, OR > 1). Conclusion BAG-1, BAG-2, BAG-5 might be the potential protective factors while BAG-4 is possible risk factor of lung adenocarcinoma

    A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods

    Get PDF
    The impossible boomerang attack (IBA) is a combination of the impossible differential attack and boomerang attack, which has demonstrated remarkable power in the security evaluation of AES and other block ciphers. However, this method has not received sufficient attention in the field of symmetric cipher analysis. The only existing search method for impossible boomerang distinguishers (IBD), the core of IBAs, is the UB-method\mathcal{UB}\text{-method}, but it is considered rather rudimentary given current technological advancements and may result in missed opportunities for effective attacks. Therefore, this paper delves into a comprehensive study on the construction theory and automatic search method of IBDs. Theoretically, we propose 5 IBD constructions aligned with the techniques of arbitrary S-box, boomerang distinguisher, Boomerang Connectivity Table, U/L/EBCT and mixed tables for differential propagation for SPN-network block ciphers, and 2 IBD constructions accompanied by state propagation for block ciphers with any structure. Furthermore, we investigate the relationship among these IBD constructions and demonstrate that the most superior IBD aligns precisely with the original definition. Technically, we develop a general SAT-based automatic search tool for IBDs by introducing optimized search strategies of the composite model method and the mixed model method. This tool not only considers the details of each operation but also takes into account the impact of key schedule in a single-key setting. As applications, we first acquire 59584 4-round 1 active word truncated IBDs for AES-128, and 192 of those IBDs cannot be detected by the UB-method\mathcal{UB} \text{-method}. For Midori64, we first demonstrate the non-existence of 77-round 11 active word truncated IBDs, and obtain 72967296 66-round 11 active word truncated IBDs, which is complementary to the finding that there are no existing 66-round 11 active word truncated IDs. For PRESENT-80, we get the first 6-round IBDs which cannot be detected by the UB-method\mathcal{UB}\text{-method}. Those results indicate that our method outperforms the UB-method\mathcal{UB}\text{-method} and offer an advantage over IDs. We believe that our work can bring new insights to symmetric cipher analysis

    Transcriptome profiling in rumen, reticulum, omasum, and abomasum tissues during the developmental transition of pre-ruminant to the ruminant in yaks

    Get PDF
    The development of the four stomachs of yak is closely related to its health and performance, however the underlying molecular mechanisms are largely unknown. Here, we systematically analyzed mRNAs of four stomachs in five growth time points [0 day, 20 days, 60 days, 15 months and 3 years (adult)] of yaks. Overall, the expression patterns of DEmRNAs were unique at 0 d, similar at 20 d and 60 d, and similar at 15 m and adult in four stomachs. The expression pattern in abomasum was markedly different from that in rumen, reticulum and omasum. Short Time-series Expression Miner (STEM) analysis demonstrated that multi-model spectra are drastically enriched over time in four stomachs. All the identified mRNAs in rumen, reticulum, omasum and abomasum were classified into 6, 4, 7, and 5 cluster profiles, respectively. Modules 9, 38, and 41 were the most significant three colored modules. By weighted gene co-expression network analysis (WGCNA), a total of 5,486 genes were categorized into 10 modules. CCKBR, KCNQ1, FER1L6, and A4GNT were the hub genes of the turquoise module, and PAK6, TRIM29, ADGRF4, TGM1, and TMEM79 were the hub genes of the blue module. Furthermore, functional KEGG enrichment analysis suggested that the turquoise module was involved in gastric acid secretion, sphingolipid metabolism, ether lipid metabolism, etc., and the blue module was enriched in pancreatic secretion, pantothenate and CoA biosynthesis, and starch and sucrose metabolism, etc. Our study aims to lay a molecular basis for the study of the physiological functions of rumen, reticulum, omasum and abomasum in yaks. It can further elucidate the important roles of these mRNAs in regulation of growth, development and metabolism in yaks, and to provide a theoretical basis for age-appropriate weaning and supplementary feeding in yaks

    Muscle activation patterns and muscle synergies reflect different modes of coordination during upper extremity movement

    Get PDF
    A core issue in motor control is how the central nervous system generates and selects the muscle activation patterns necessary to achieve a variety of behaviors and movements. Extensive studies have verified that it is the foundation to induce a complex movement by the modular combinations of several muscles with a synergetic relationship. However, a few studies focus on the synergetic similarity and dissimilarity among different types of movements, especially for the upper extremity movements. In this study, we introduced the non-negative matrix factorization (NMF) method to explore the muscle activation patterns and synergy structure under 6 types of movements, involving the hand open (HO), hand close (HC), wrist flexion (WF), wrist extension (WE), supination (SU), and pronation (PR). For this, we enrolled 10 healthy subjects to record the electromyography signal for NMF calculation. The results showed a highly modular similarity of the muscle synergy among subjects under the same movement. Furthermore, Spearman’s correlation analysis indicated significant similarities among HO-WE, HO-SU, and WE-SU (p < 0.001). Additionally, we also found shared synergy and special synergy in activation patterns among different movements. This study confirmed the theory of modular structure in the central nervous system, which yields a stable synergetic pattern under the same movement. Our findings on muscle synergy will be of great significance to motor control and even to clinical assessment techniques

    Exfoliated polymeric carbon nitride nanosheets for photocatalytic applications

    Get PDF
    Exfoliation into a 2D nanosheet structure can lead to enhanced surface activity and unique optical and electronic properties in polymeric carbon nitride (PCN). In this study, four common exfoliation strategies (liquid ultrasonication, thermal oxidation, hydrothermal oxidation, and chemical oxidation) were adopted, and their effects on the structural and electronic changes in PCN were analyzed in detail. This allows us to understand the relationship between the exfoliation mechanism and the structural/optical properties. Here, we demonstrate that the thermal and ultrasonic exfoliation methods can effectively reduce the thickness of PCN while preserving its original structure. In contrast, the chemical and hydrothermal treatments can strongly affect the morphology and structure of PCN, leading to a decreased performance in phenol photodegradation. Therefore, depending on the employed exfoliation method, the surface area, functionalization, band edge positions, charge carrier generation, and mobility are influenced differently up to the point where semiconducting behavior is entirely lost. Our results allow conclusions about the applicability of the different exfoliation methods to obtain distinct material properties for photocatalytic applications
    • …
    corecore