191 research outputs found
Repeating Spatial Activations in Human Entorhinal Cortex
SummaryThe ability to remember and navigate spatial environments is critical for everyday life. A primary mechanism by which the brain represents space is through hippocampal place cells, which indicate when an animal is at a particular location [1]. An important issue is understanding how the hippocampal place-cell network represents specific properties of the environment, such as signifying that a particular position is near a doorway or that another position is near the end of a corridor. The entorhinal cortex (EC), as the main input to the hippocampus, may play a key role in coding these properties because it contains neurons that activate at multiple related positions per environment [2–6]. We examined the diversity of spatial coding across the human medial temporal lobe by recording neuronal activity during virtual navigation of an environment containing four similar paths. Neurosurgical patients performed this task as we recorded from implanted microelectrodes, allowing us to compare the human neuronal representation of space with that of animals. EC neurons activated in a repeating manner across the environment, with individual cells spiking at the same relative location across multiple paths. This finding indicates that EC cells represent non-specific information about location relative to an environment’s geometry, unlike hippocampal place cells, which activate at particular random locations. Given that spatial navigation is considered to be a model of how the brain supports non-spatial episodic memory [7–10], these findings suggest that EC neuronal activity is used by the hippocampus to represent the properties of different memory episodes [2, 11]
Collusive Bidding in the Market for Corporate Control
Part I of this article examines the historical evolution of antitrust laws, specifically as they have been applied to the market for corporate control. Part II examines the current judicial opinions advanced which reject the application of antitrust laws to the market for corporate control, including the supposed nonapplicability of antitrust laws to the sale of stock and the implied revocation of the antitrust laws by virtue of the enaction of the Williams Act. Part III addresses the inability of the Securities and Exchange Commission to regulate the market for corporate control via the Williams Act in that there is no inherent conflict between the Commission\u27s disclosure requirements and the policy of antitrust laws. Part IV analyzes the quantitative economic effects of the diminution of competition in the market for corporate control and examine its aggregate effect on shareholders
Factoring as a Service
The difficulty of integer factorization is fundamental to modern cryptographic security using RSA encryption and signatures. Although a 512-bit RSA modulus was first factored in 1999, 512-bit RSA remains surprisingly common in practice across many cryptographic protocols. Popular understanding of the difficulty of 512-bit factorization does not seem to have kept pace with developments in computing power. In this paper, we optimize the CADO-NFS and Msieve implementations of the number field sieve for use on the Amazon Elastic Compute Cloud platform, allowing a non-expert to factor 512-bit RSA public keys in under four hours for \$75. We go on to survey the RSA key sizes used in popular protocols, finding hundreds or thousands of deployed 512-bit RSA keys in DNSSEC, HTTPS, IMAP, POP3, SMTP, DKIM, SSH, and PGP
Recommended from our members
Observation-based modeling of ozone chemistry in the Seoul metropolitan area during the Korea-United States Air Quality Study (KORUS-AQ)
The Seoul Metropolitan Area (SMA) has a population of 24 million and frequently experiences unhealthy levels of ozone (O3). In this work, measurements taken during the Korea-United States Air Quality Study (KORUS-AQ, 2016) are used to explore regional gradients in O3 and its chemical precursors, and an observationally-constrained 0-D photochemical box model is used to quantify key aspects of O3 production including its sensitivity to precursor gases. Box model performance was evaluated by comparing modeled concentrations of select secondary species to airborne measurements. These comparisons indicate that the steady state assumption used in 0-D box models cannot describe select intermediate species, highlighting the importance of having a broad suite of trace gases as model constraints. When fully constrained, aggregated statistics of modeled O3 production rates agreed with observed changes in O3, indicating that the box model was able to represent the majority of O3 chemistry.
Comparison of airborne observations between urban Seoul and a downwind receptor site reveal a positive gradient in O3 coinciding with a negative gradient in NOx, no gradient in CH2O, and a slight positive gradient in modeled rates of O3 production. Together, these observations indicate a radical-limited (VOC-limited) O3 production environment in the SMA. Zero-out simulations identified C7+ aromatics as the dominant VOC contributors to O3 production, with isoprene and anthropogenic alkenes making smaller but appreciable contributions. Simulations of model sensitivity to decreases in NOx produced results that were not spatially uniform, with large increases in O3 production predicted for urban Seoul and decreases in O3 production predicted for far-outlying areas. The policy implications of this work are clear: Effective O3 mitigation strategies in the SMA must focus on reducing local emissions of C7+ aromatics, while reductions in NOx emissions may increase O3 in some areas but generally decrease the regional extent of O3 exposure
Prime and Prejudice:Primality Testing Under Adversarial Conditions
This work provides a systematic analysis of primality testing under adversarial conditions, where the numbers being tested for primality are not generated randomly, but instead provided by a possibly malicious party. Such a situation can arise in secure messaging protocols where a server supplies Diffie-Hellman parameters to the peers, or in a secure communications protocol like TLS where a developer can insert such a number to be able to later passively spy on client-server data. We study a broad range of cryptographic libraries and assess their performance in this adversarial setting. As examples of our findings, we are able to construct 2048-bit composites that are declared prime with probability by OpenSSL\u27s primality testing in its default configuration; the advertised performance is . We can also construct 1024-bit composites that always pass the primality testing routine in GNU GMP when configured with the recommended minimum number of rounds. And, for a number of libraries (Cryptlib, LibTomCrypt, JavaScript Big Number, WolfSSL), we can construct composites that always pass the supplied primality tests. We explore the implications of these security failures in applications, focusing on the construction of malicious Diffie-Hellman parameters. We show that, unless careful primality testing is performed, an adversary can supply parameters which on the surface look secure, but where the discrete logarithm problem in the subgroup of order generated by is easy. We close by making recommendations for users and developers. In particular, we promote the Baillie-PSW primality test which is both efficient and conjectured to be robust even in the adversarial setting for numbers up to a few thousand bits
Measuring small subgroup attacks against Diffie-Hellman
Several recent standards, including NIST SP 800- 56A and RFC 5114, advocate the use of “DSA” parameters for Diffie-Hellman key exchange. While it is possible to use such parameters securely, additional validation checks are necessary to prevent well-known and potentially devastating attacks. In this paper, we observe that many Diffie-Hellman implementations do not properly validate key exchange inputs. Combined with other protocol properties and implementation choices, this can radically decrease security. We measure the prevalence of these parameter choices in the wild for HTTPS, POP3S, SMTP with STARTTLS, SSH, IKEv1, and IKEv2, finding millions of hosts using DSA and other non-“safe” primes for Diffie-Hellman key exchange, many of them in combination with potentially vulnerable behaviors. We examine over 20 open-source cryptographic libraries and applications and observe that until January 2016, not a single one validated subgroup orders by default. We found feasible full or partial key recovery vulnerabilities in OpenSSL, the Exim mail server, the Unbound DNS client, and Amazon’s load balancer, as well as susceptibility to weaker attacks in many other applications
- …