29 research outputs found
Exploring Indoor Health: An In-depth Field Study on the Indoor Air Quality Dynamics
Indoor air pollution, a significant driver of respiratory and cardiovascular
diseases, claims 3.2 million lives yearly, according to the World Health
Organization, highlighting the pressing need to address this global crisis. In
contrast to unconstrained outdoor environments, room structures, floor plans,
ventilation systems, and occupant activities all impact the accumulation and
spread of pollutants. Yet, comprehensive in-the-wild empirical studies
exploring these unique indoor air pollution patterns and scope are lacking. To
address this, we conducted a three-month-long field study involving over 28
indoor spaces to delve into the complexities of indoor air pollution. Our study
was conducted using our custom-built DALTON air quality sensor and monitoring
system, an innovative IoT air quality monitoring solution that considers cost,
sensor type, accuracy, network connectivity, power, and usability. Our study
also revealed that conventional measures, such as the Indoor Air Quality Index
(IAQI), don't fully capture complex indoor air quality dynamics. Hence, we
proposed the Healthy Home Index (HHI), a new metric considering the context and
household activities, offering a more comprehensive understanding of indoor air
quality. Our findings suggest that HHI provides a more accurate air quality
assessment, underscoring the potential for wide-scale deployment of our indoor
air quality monitoring platform.Comment: 15 pages, 19 figure
Differential Fault Analysis of Rectangle-80
We present various differential fault attack schemes for the RECTANGLE-80 and demonstrate how initially we started from a 80-bit fault to a single word fault scheme. This was mainly due to a differential vulnerability in the S-box of RECTANGLE as a result of which the exhaustive search space for the key reduces from to . We have also presented a key schedule attack that is a variant of the single fault scheme, exploiting the same vulnerability and reduces the search space to . The paper concludes with the simulation results for the single word fault scheme followed by countermeasures
Differential Fault Analysis of MICKEY Family of Stream Ciphers
This paper presents differential fault analysis of the
MICKEY family of stream ciphers, one of the winners of eStream
project. The current attacks are of the best performance among
all the attacks against MICKEY ciphers reported till date. The
number of faults required with respect to state size is about
1.5 times the state size. We obtain linear equations to determine
state bits. The fault model required is reasonable. The fault model
is further relaxed without reproducing the faults and allowing
multiple bit faults. In this scenario, more faults are required
when reproduction is not allowed whereas, it has been shown
that the number of faults remains same for multiple bit faults
A Generic Scan Attack on Hardware based eStream Winners
Scan chains, a design for testability (DFT)
feature, are included in most modern-day ICs. But, it
opens a side channel for attacking cryptographic chips.
We propose a methodology by which we can recover
internal states of any stream cipher using scan chains
without knowledge of its design. We consider conven-
tional scan-chain design which is normally not scram-
bled or protected in any other way. In this scenario
the challenge of the adversary is to obtain the corre-
spondence of output of the scan chain and the internal
state registers of the stream cipher. We present a math-
ematical model of the attack and the correspondence
between the scan chain-outputs and the internal state
bits have been proved under this model. We propose an
algorithm that through o-line and on-line simulation
forms bijection between the above mentioned sets and
thus nds the required correspondence. We also give an
estimate of the number of o-line simulations necessary
for nding the correspondence.
The proposed strategy is successfully applied to eS-
tream hardware based nalists MICKEY-128 2.0, Triv-
ium and Grain-128. To the best of our knowledge, this is
the rst scan based attack against full round Grain-128
and only the fourth reported cryptanalysis. This attack
on Trivium is better than that of the published scan-
attack on Trivium. This scan-based attack is also the
rst reported scan based cryptanalysis against MICKEY-
128 2.0
Fault Analysis of Grain Family of Stream Ciphers
In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The earlier fault attacks on Grain work on LFSR whereas our target for fault induction is the NFSR. Our attack requires a small number of faults to be injected; 150 only for Grain v1 and only 312 and 384 for Grain-128 and Grain-128a, respectively. The number of faults are much lesser than the earlier reported fault attacks; 1587 for Grain-128 and 1831 for Grain-128a
Implementation of Energy Saver Circuit using 8051 Microcontroller
In this paper, we have proposed the development of a module based on 8051 microcontroller that allows us to operate a 220V AC lamp with a remote control and regulate the intensity of the lamp as per our needs. The ability to control the intensity of the lamp according to our requirement waives of unwanted wastage of energy thus providing an economic relief and reducing wastage of primary energy sources at this hour of shortage of non-renewable energy sources. Remote control provides an interface to the system that is simple to understand, operate, reliable and durable irrespective of usage and also economical. It adds comfort to our daily life by eliminating unwanted movement to operate the appliances. Remote control facilitates controlling various appliances from a convenient distance. The module is easy to install,convenient to use, energy saving and also cost effective without allowing compensation of efficiency
NOCAS : A Nonlinear Cellular Automata Based Stream Cipher
LFSR and NFSR are the basic building blocks in almost all the state of the art stream ciphers like Trivium and Grain-128. However, a number of attacks are mounted on these type of ciphers. Cellular Automata (CA) has recently been chosen as a suitable structure for crypto-primitives. In this work, a stream cipher is presented based on hybrid CA. The stream cipher takes 128 bit key and 128 bit initialization vector (IV) as input. It is designed to produce random keystream bits and initialization phase is made faster 4 times than that of Grain-128. We also analyze the cryptographic strength of this cipher. Finally, the proposed cipher is shown to be resistant against known existing attacks