47 research outputs found

    Differential Analysis on Simeck and SIMON with Dynamic Key-guessing Techniques

    Get PDF
    The Simeck family of lightweight block ciphers was proposed in CHES 2015 which combines the good design components from NSA designed ciphers SIMON and SPECK. Dynamic key-guessing techniques were proposed by Wang {\it et al.} to greatly reduce the key space guessed in differential cryptanalysis and work well on SIMON. In this paper, we implement the dynamic key-guessing techniques in a program to automatically give out the data in dynamic key-guessing procedure and thus simplify the security evaluation of SIMON and Simeck like block ciphers regarding differential attacks. We use the differentials from Kölbl {\it et al.}\u27s work and also a differential with lower Hamming weight we find using Mixed Integer Linear Programming method to attack 22-round Simeck32, 28-round Simeck48 and 35-round Simeck64. Besides, we launch the same attack procedure on four members of SIMON family by use of newly proposed differentials in CRYPTO2015 and get new attack results on 22-round SIMON32/64, 24-round SIMON48/96, 28, 29-round SIMON64/96 and 29, 30-round SIMON64/128. As far as we are concerned, our results on SIMON64 are currently the best results

    Towards superior biopolymer gels by enabling interpenetrating network structures:A review on types, applications, and gelation strategies

    Get PDF
    Gels derived from single networks of natural polymers (biopolymers) typically exhibit limited physical properties and thus have seen constrained applications in areas like food and medicine. In contrast, gels founded on a synergy of multiple biopolymers, specifically polysaccharides and proteins, with intricate interpenetrating polymer network (IPN) structures, represent a promising avenue for the creation of novel gel materials with significantly enhanced properties and combined advantages. This review begins with the scrutiny of newly devised IPN gels formed through a medley of polysaccharides and/or proteins, alongside an introduction of their practical applications in the realm of food, medicine, and environmentally friendly solutions. Finally, based on the fact that the IPN gelation process and mechanism are driven by different inducing factors entwined with a diverse amalgamation of polysaccharides and proteins, our survey underscores the potency of physical, chemical, and enzymatic triggers in orchestrating the construction of crosslinked networks within these biomacromolecules. In these mixed systems, each specific inducer aligns with distinct polysaccharides and proteins, culminating in the generation of semi-IPN or fully-IPN gels through the intricate interpenetration between single networks and polymer chains or between two networks, respectively. The resultant IPN gels stand as paragons of excellence, characterized by their homogeneity, dense network structures, superior textural properties (e.g., hardness, elasticity, adhesion, cohesion, and chewability), outstanding water-holding capacity, and heightened thermal stability, along with guaranteed biosafety (e.g., nontoxicity and biocompatibility) and biodegradability. Therefore, a judicious selection of polymer combinations allows for the development of IPN gels with customized functional properties, adept at meeting precise application requirements.</p

    New Collision Attacks on Round-Reduced Keccak

    Get PDF
    In this paper, we focus on collision attacks against Keccak hash function family and some of its variants. Following the framework developed by Dinur et al. at FSE~2012 where 4-round collisions were found by combining 3-round differential trails and 1-round connectors, we extend the connectors one round further hence achieve collision attacks for up to 5 rounds. The extension is possible thanks to the large degree of freedom of the wide internal state. By linearization of all S-boxes of the first round, the problem of finding solutions of 2-round connectors are converted to that of solving a system of linear equations. However, due to the quick freedom reduction from the linearization, the system has solution only when the 3-round differential trails satisfy some additional conditions. We develop a dedicated differential trail search strategy and find such special differentials indeed exist. As a result, the first practical collision attack against 5-round SHAKE128 and two 5-round instances of the Keccak collision challenges are found with real examples. We also give the first results against 5-round Keccak224 and 6-round Keccak collision challenges. It is remarked that the work here is still far from threatening the security of the full 24-round Keccak family

    Exploring the interfacial coupling between graphene and the antiferromagnetic insulator MnPSe3_3

    Full text link
    Interfacial coupling between graphene and other 2D materials can give rise to intriguing physical phenomena. In particular, several theoretical studies predict that the interplay between graphene and an antiferromagnetic insulator could lead to the emergence of quantum anomalous Hall phases. However, such phases have not been observed experimentally yet, and further experimental studies are needed to reveal the interaction between graphene and antiferromagnetic insulators. Here, we report the study in heterostructures composed of graphene and the antiferromagnetic insulator MnPSe3_3. It is found that the MnPSe3_3 has little impact on the quantum Hall phases apart from doping graphene via interfacial charge transfer. However, the magnetic order can contribute indirectly via process like Kondo effect, as evidenced by the observed minimum in the temperature-resistance curve between 20-40 K, far below the N\'eel temperature (70 K)

    Fake Alignment: Are LLMs Really Aligned Well?

    Full text link
    The growing awareness of safety concerns in large language models (LLMs) has sparked considerable interest in the evaluation of safety within current research endeavors. This study investigates an interesting issue pertaining to the evaluation of LLMs, namely the substantial discrepancy in performance between multiple-choice questions and open-ended questions. Inspired by research on jailbreak attack patterns, we argue this is caused by mismatched generalization. That is, the LLM does not have a comprehensive understanding of the complex concept of safety. Instead, it only remembers what to answer for open-ended safety questions, which makes it unable to solve other forms of safety tests. We refer to this phenomenon as fake alignment and construct a comparative benchmark to empirically verify its existence in LLMs. Such fake alignment renders previous evaluation protocols unreliable. To address this, we introduce the Fake alIgNment Evaluation (FINE) framework and two novel metrics--Consistency Score (CS) and Consistent Safety Score (CSS), which jointly assess two complementary forms of evaluation to quantify fake alignment and obtain corrected performance estimates. Applying FINE to 14 widely-used LLMs reveals several models with purported safety are poorly aligned in practice. Our work highlights potential limitations in prevailing alignment methodologies

    SNR-Centric Power Trace Extractors for Side-Channel Attacks

    Get PDF
    The existing power trace extractors consider the case that the number of power traces owned by the attacker is sufficient to guarantee his successful attacks, and the goal of power trace extraction is to lower the complexity rather than increase the success rates. Although having strict theoretical proofs, they are too simple and leakage characteristics of POIs have not been thoroughly analyzed. They only maximize the variance of data-dependent power consumption component and ignore the noise component, which results in very limited SNR to improve and seriously affects the performance of extractors. In this paper, we provide a rigorous theoretical analysis of SNR of power traces, and propose a novel SNR-centric extractor, named Shortest Distance First (SDF), to extract power traces with smallest the estimated noise by taking advantage of known plaintexts. In addition, to maximize the variance of the exploitable component while minimizing the noise, we refer to the SNR estimation model and propose another novel extractor named Maximizing Estimated SNR First (MESF). Finally, we further propose an advanced extractor called Mean optimized MESF (MMESF) that exploits the mean power consumption of each plaintext byte value to more accurately and reasonably estimate the data-dependent power consumption of the corresponding samples. Experiments on both simulated power traces and measurements from an ATmega328p micro-controller demonstrate the superiority of our new extractors

    Invariant Subspace Attack Against Full Midori64

    Get PDF
    In this paper, we present an invariant subspace attack against block cipher Midori64 which has recently been proposed by Banik et al. at Asiacrypt 2015 to achieve low energy consumption. We show that when each nibble of the key has the value 0 or 1 and each nibble of the plaintext has the value 8 or 9, each nibble of the ciphertext also has the value 8 or 9 with probability one regardless of the number of rounds applied. This fact indicates that Midori64 has a class of 2322^{32} weak keys that can be distinguished with a single query. It also indicates that the number of keys generated uniformly at random for Midori64 must not exceed 2962^{96}, i.e., the pseudorandom-permutation security of Midori64 is only up to 96 bits instead of 128 bits. Interestingly, given the information that the key is from the 2322^{32} weak key subspace, key recovery can be performed within time complexity 2162^{16} and data complexity 212^1. We have confirmed the correctness of the analysis by implementing the attack. At the current stage, our attacks do not apply to Midori128

    Female chromosome X mosaicism is age-related and preferentially affects the inactivated X chromosome

    Get PDF
    To investigate large structural clonal mosaicism of chromosome X, we analysed the SNP microarray intensity data of 38,303 women from cancer genome-wide association studies (20,878 cases and 17,425 controls) and detected 124 mosaic X events >2 Mb in 97 (0.25%) women. Here we show rates for X-chromosome mosaicism are four times higher than mean autosomal rates; X mosaic events more often include the entire chromosome and participants with X events more likely harbour autosomal mosaic events. X mosaicism frequency increases with age (0.11% in 50-year olds; 0.45% in 75-year olds), as reported for Y and autosomes. Methylation array analyses of 33 women with X mosaicism indicate events preferentially involve the inactive X chromosome. Our results provide further evidence that the sex chromosomes undergo mosaic events more frequently than autosomes, which could have implications for understanding the underlying mechanisms of mosaic events and their possible contribution to risk for chronic diseases

    Female chromosome X mosaicism is age-related and preferentially affects the inactivated X chromosome

    Get PDF
    To investigate large structural clonal mosaicism of chromosome X, we analysed the SNP microarray intensity data of 38,303 women from cancer genome-wide association studies (20,878 cases and 17,425 controls) and detected 124 mosaic X events42Mb in 97 (0.25%) women. Here we show rates for X-chromosome mosaicism are four times higher than mean autosomal rates; X mosaic events more often include the entire chromosome and participants with X events more likely harbour autosomal mosaic events. X mosaicism frequency increases with age (0.11% in 50-year olds; 0.45% in 75-year olds), as reported for Y and autosomes. Methylation array analyses of 33 women with X mosaicism indicate events preferentially involve the inactive X chromosome. Our results provide further evidence that the sex chromosomes undergo mosaic events more frequently than autosomes, which could have implications for understanding the underlying mechanisms of mosaic events and their possible contribution to risk for chronic diseases
    corecore