19 research outputs found
Algorithms for switching between block-wise and arithmetic masking
The task of ensuring the required level of security of information systems in the adversary models with additional data obtained through side channels (a striking example of implementing threats in such a model is a differential power analysis) has become increasingly relevant in recent years. An effective protection method against side-channel attacks is masking all intermediate variables used in the algorithm with random values. At the same time, many algorithms use masking of different kinds, for example, Boolean, byte-wise, and arithmetic; therefore, a problem of switching between masking of different kinds arises. Switching between Boolean and arithmetic masking is well studied, while no solutions have been proposed for switching between masking of other kinds. This article recalls the requirements for switching algorithms and presents algorithms for switching between block-wise and arithmetic masking, which includes the case of switching between byte-wise and arithmetic masking
Influence of Sedimentation on Convective Instabilities in Colloidal Suspensions
We investigate theoretically the bifurcation scenario for colloidal
suspensions subject to a vertical temperature gradient taking into account the
effect of sedimentation. In contrast to molecular binary mixtures, here the
thermal relaxation time is much shorter than that for concentration
fluctuations. This allows for differently prepared ground states, where a
concentration profile due to sedimentation and/or the Soret effect has been
established or not. This gives rise to different linear instability behaviors,
which are manifest in the temporal evolution into the final, generally
stationary convective state. In a certain range above a rather high barometric
number there is a coexistence between the quiescent state and the stationary
convective one, allowing for a hysteretic scenario.Comment: to appear in Int. J. Bif. Chao
Streebog as a Random Oracle
The random oracle model is an instrument used for proving that protocol has no structural flaws when settling with standard hash properties is impossible or fairly difficult. In practice, however, random oracles have to be instantiated with some specific hash functions, which are not random oracles. Hence, in the real world, an adversary has broader capabilities than considered in the random oracle proof — it can exploit the peculiarities of a specific hash function to achieve its goal. In a case when a hash function is based on some building block, one can go further and show that even if the adversary has access to that building block, the hash function still behaves like a random oracle under some assumptions made about the building block. Thereby, the protocol can be proved secure against more powerful adversaries under less complex assumptions. The indifferentiability notion formalizes that approach.
In this paper we study whether Streebog, a Russian standardized hash function, can instantiate a random oracle from that point of view. We prove that Streebog is indifferentiable from a random oracle under an ideal cipher assumption for the underlying block cipher
Redirection and Splitting of Sound Waves by a Periodic Chain of Thin Perforated Cylindrical Shells
[EN] The scattering of sound by finite and infinite chains of equally spaced perforated metallic cylindrical shells
in an ideal (inviscid) and viscous fluid is theoretically studied using rigorous analytical and numerical
approaches. Because of perforations, a chain of thin shells is practically transparent for sound within a wide
range of frequencies. It is shown that strong scattering and redirection of sound by 90° may occur only for a
discrete set of frequencies (Wood¿s anomalies) where the leaky eigenmodes are excited. The spectrum of
eigenmodes consists of antisymmetric and symmetric branches with normal and anomalous dispersion,
respectively. The antisymmetric eigenmode turns out to be a deaf mode, since it cannot be excited at normal
incidence. However, at slightly oblique incidence, both modes can be resonantly excited at different but close
frequencies. The symmetric mode, due to its anomalous dispersion, scatters sound in the ¿wrong¿ direction.
This property may find an application for the splitting of the two resonant harmonics of the incoming signal
into two beams propagating along the chain in the opposite directions. A chain of perforated cylinders may
also be used as a passive antenna that detects the direction to the incoming signal by measuring the frequencies
of the waves excited in the chain. Calculations are presented for aluminum shells in viscous air where the
effects of anomalous scattering, redirection, and signal splitting are well manifested.A. K. acknowledges support from Programa de Apoyo a la Investigacion y Desarrollo (PAID-02-15) de la Universitat Politecnica de Valencia. A. B., F. C., and J. S.-D. acknowledge the support by the Ministerio de Economia y Competitividad of the Spanish government and the European Union Fondo Europeo de Desarrollo Regional (FEDER) through Project No. TEC2014-53088-C3-1-R. The authors are thankful to Michael R. Haberman for fruitful discussion regarding possible applications of the periodic chain of a perforated shell in the processing of acoustic signals.Bozhko, A.; Sánchez-Dehesa Moreno-Cid, J.; Cervera Moreno, FS.; Krokhin, A. (2017). Redirection and Splitting of Sound Waves by a Periodic Chain of Thin Perforated Cylindrical Shells. Physical Review Applied. 7(6):064034-1-064034-13. doi:10.1103/PhysRevApplied.7.064034S064034-1064034-137
Misuse-resistant MGM2 mode
We introduce a modification of the Russian standardized AEAD MGM mode — an MGM2 mode, for which a nonce is not encrypted anymore before using it as an initial counter value. For the new mode we provide security bounds regarding security notions in the nonce-misuse setting (MRAE-integrity and CPA-resilience). The obtained bounds are even better than the bounds obtained for the original MGM mode regarding standard security notions
sMGM: parameterizable AEAD-mode
The paper introduces a new AEAD-mode called sMGM (strong Multilinear Galois Mode). The proposed construction can be treated as an extension of the Russian standardized MGM mode and its modification MGM2 mode presented at the CTCrypt\u2721 conference. The distinctive feature of the new mode is that it provides an interface allowing one to choose specific security properties required for a certain application case. Namely, the mode has additional parameters allowing to switch on/off misuse-resistance or re-keying mechanisms.
The sMGM mode consists of two main building blocks that are a CTR-style gamma generation function with incorporated re-keying and a multilinear function that lies in the core of the original MGM mode. Different ways of using these functions lead to achieving different sets of security properties. Such an approach to constructing parameterizable AEAD-mode allows for reducing the code size which can be crucial for constrained devices.
We provide security bounds for the proposed mode. We focus on proving the misuse-resistance of the sMGM mode, since the standard security properties were already analyzed during the development of the original MGM and MGM2 modes
Oxidation of Nb(110): atomic structure of the NbO layer and its influence on further oxidation.
NbO terminated Nb(110) and its oxidation are examined by scanning tunneling microscopy and spectroscopy (STS). The oxide structures are strongly influenced by the structural and electronic properties of the underlying NbO substrate. The NbO is terminated by one-dimensional few-nanometer nanocrystals, which form an ordered pattern. High-resolution STS measurements reveal that the nanocrystals and the regions between the nanocrystals exhibit different electronic characters. Low-dosage oxidation, sufficient for sub-monolayer coverage of the NbO, with subsequent UHV annealing results in the formation of resolved sub-nanometer clusters, positioned in-between the nanocrystals. Higher dosage oxidation results in the formation of a closed Nb2O5-y layer, which is confirmed by X-ray photoelectron spectroscopy measurements. The pentoxide is amorphous at the atomic-scale. However, large scale (tens of nanometers) structures are observed with their symmetry matching that of the underlying nanocrystals
Redirection of sound in straight fluid channel with elastic boundaries
A fluid channel clad between two solid plates is an acoustic waveguide where excitation of elastic waves at the channel boundaries has been usually neglected. This work develops a rigorous theory of scattering of sound by a finite-length fluid channel which takes into account excitation of elastic eigenmodes of two plates acoustically coupled through a fluid channel. The theory predicts an evidently contradictory result that the transmission and reflection coefficients of a nondissipative channel do not sum up to one. Moreover, they both exhibit deep minima at the same series of frequencies. It is shown that conservation of acoustic energy occurs due to redirection of sound, since part of the acoustic flux escapes into the solid plates. This scattering becomes possible because the uniform flatness of the boundaries of a straight channel is broken by vibrations. Theoretical predictions are supported by the experiments with ultrasound transmission through a narrow slit obtained between two brass or aluminum plates submerged in water. Measured transmission spectra exhibit deep minima exactly at the frequencies where the theory predicts strong redirection of sound.This study is supported by the Office of Naval Research (USA) under Contract No. N00014-12-1-0216. A.K. acknowledges support from the program "Plan de Movilidad e Internalizacion Academica VLC/CAMPUS."Bozhko, A.; Garcia Chocano, VM.; Sánchez-Dehesa Moreno-Cid, J.; Krokhin, A. (2015). Redirection of sound in straight fluid channel with elastic boundaries. Physical review B: Condensed matter and materials physics. 91(9):094303-094303. doi:10.1103/PhysRevB.91.094303S09430309430391