475 research outputs found

    Blockchain as cryptanalytic tool

    Get PDF
    One approach for blockchain based applications to provide a proof-of-work is the computation of hash-values. In our opinion these computations are a waste of energy. It would be highly desirable to find an alternative method that generates useful output. We show how to substitute hashing by performing multiplications on Elliptic Curves in order to find distinguished points that can then be used to solve the discrete logarithm problem on a chosen curve. Today\u27s digital infrastructures rely on only a few curves. We argue that the advent of blockchain based technologies makes the use of only few standardised curves questionable. In principle all cryptanalytic algorithms that use Rabin\u27s idea of distinguished points can be used in blockchain based attacks. Similar ideas can be used for the number field sieve

    Twist Insecurity

    Get PDF
    Several authors suggest that the use of twist secure Elliptic Curves automatically leads to secure implementations. We argue that even for twist secure curves a point validation has to be performed. We illustrate this with examples where the security of EC-algorithms is strongly degraded, even for twist secure curves. We show that the usual blindig countermeasures against SCA are insufficient (actually they introduce weaknesses) if no point validation is performed, or if an attacker has access to certain intermediate points. In this case the overall security of the system is reduced to the length of the blinding parameter. We emphazise that our methods work even in the case of a very high identification error rate during the SCA-phase

    Requirements for Standard Elliptic Curves

    Get PDF
    Currently, the Internet Research Task Force (IRTF) discusses requirements for new elliptic curves to be standardized in TLS and other internet protocols. This position paper discusses the view of the members of the ECC Brainpool on these requirements, in particular with respect to hardware implementations

    Attacking Deterministic Signature Schemes using Fault Attacks

    Get PDF
    Many digital signature schemes rely on random numbers that are unique and non-predictable per signature. Failures of random number generators may have catastrophic effects such as compromising private signature keys. In recent years, many widely-used cryptographic technologies adopted deterministic signature schemes because they are presumed to be safer to implement. In this paper, we analyze the security of deterministic ECDSA and EdDSA signature schemes and show that the elimination of random number generators in these schemes enables new kinds of fault attacks. We formalize these attacks and introduce practical attack scenarios against EdDSA using the Rowhammer fault attack. EdDSA is used in many widely used protocols such as TLS, SSH and IPSec, and we show that these protocols are not vulnerable to our attack. We formalize the necessary requirements of protocols using these deterministic signature schemes to be vulnerable, and discuss mitigation strategies and their effect on fault attacks against deterministic signature schemes

    Accelerated neuritogenesis and maturation of primary spinal motor neurons in response to nanofibers

    Full text link
    Neuritogenesis, neuronal polarity formation, and maturation of axons and dendrites are strongly influenced by both biochemical and topographical extracellular components. The aim of this study was to elucidate the effects of polylactic acid electrospun fiber topography on primary motor neuron development, because regeneration of motor axons is extremely limited in the central nervous system and could potentially benefit from the implementation of a synthetic scaffold to encourage regrowth. In this analysis, we found that both aligned and randomly oriented submicron fibers significantly accelerated the processes of neuritogenesis and polarity formation of individual cultured motor neurons compared to flat polymer films and glass controls, likely due to restricted lamellipodia formation observed on fibers. In contrast, dendritic maturation and soma spreading were inhibited on fiber substrates after 2 days in vitro . This study is the first to examine the effects of electrospun fiber topography on motor neuron neuritogenesis and polarity formation. Aligned nanofibers were shown to affect the directionality and timing of motor neuron development, providing further evidence for the effective use of electrospun scaffolds in neural regeneration applications. © 2010 Wiley Periodicals, Inc. Develop Neurobiol 70: 589–603, 2010Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/77438/1/20792_ftp.pd

    Regulation of mammary gland branching morphogenesis by the extracellular matrix and its remodeling enzymes.

    Get PDF
    A considerable body of research indicates that mammary gland branching morphogenesis is dependent, in part, on the extracellular matrix (ECM), ECM-receptors, such as integrins and other ECM receptors, and ECM-degrading enzymes, including matrix metalloproteinases (MMPs) and their inhibitors, tissue inhibitors of metalloproteinases (TIMPs). There is some evidence that these ECM cues affect one or more of the following processes: cell survival, polarity, proliferation, differentiation, adhesion, and migration. Both three-dimensional culture models and genetic manipulations of the mouse mammary gland have been used to study the signaling pathways that affect these processes. However, the precise mechanisms of ECM-directed mammary morphogenesis are not well understood. Mammary morphogenesis involves epithelial 'invasion' of adipose tissue, a process akin to invasion by breast cancer cells, although the former is a highly regulated developmental process. How these morphogenic pathways are integrated in the normal gland and how they become dysregulated and subverted in the progression of breast cancer also remain largely unanswered questions

    The more things change ... the more things change: developmental plasticity of tumor-initiating mammary epithelial cells

    Get PDF
    In our haste to find and eliminate breast cancer stem cells, it appears as though we may have missed something. Contrary to current thought, a recent paper by Meyer and colleagues demonstrates developmental plasticity of breast cancer cells with respect to the CD24 cell surface marker, such that CD44pos; CD24pos and CD44pos; CD24low/- cells are able to give rise to one another in an activin/nodal-dependent manner, and that cells derived from single cells of either phenotype are capable of forming tumors as xenografts. If confirmed clinically, these data imply that simply targeting the CD44pos; CD24low/- breast cancer stem cell for breast cancer treatment may be destined to fail unless this plasticity is taken into account and prevented
    • …
    corecore