Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Jingdian Ming ◽  
Yongbin Zhou ◽  
Huizhong Li ◽  
Qian Zhang

AbstractDue to its provable security and remarkable device-independence, masking has been widely accepted as a noteworthy algorithmic-level countermeasure against side-channel attacks. However, relatively high cost of masking severely limits its applicability. Considering the high tackling complexity of non-linear operations, most masked AES implementations focus on the security and cost reduction of masked S-boxes. In this paper, we focus on linear operations, which seems to be underestimated, on the contrary. Specifically, we discover some security flaws and redundant processes in popular first-order masked AES linear operations, and pinpoint the underlying root causes. Then we propose a provably secure and highly efficient masking scheme for AES linear operations. In order to show its practical implications, we replace the linear operations of state-of-the-art first-order AES masking schemes with our proposal, while keeping their original non-linear operations unchanged. We implement four newly combined masking schemes on an Intel Core i7-4790 CPU, and the results show they are roughly 20% faster than those original ones. Then we select one masked implementation named RSMv2 due to its popularity, and investigate its security and efficiency on an AVR ATMega163 processor and four different FPGA devices. The results show that no exploitable first-order side-channel leakages are detected. Moreover, compared with original masked AES implementations, our combined approach is nearly 25% faster on the AVR processor, and at least 70% more efficient on four FPGA devices.


Author(s):  
B. R. Thatch ◽  
A. Myklebust

Abstract Creation of input specifications for synthesis or analysis of spatial mechanisms can be a significant problem. A graphics preprocessor which interactively assists in the definition of spatial mechanism problems is described. New methods of depth cucing and six DOF data entry are presented. To achieve graphics device-independence, the proposed graphics standard PHIGS (Programmer’s Hierarchical Interactive Graphics System) is used. Examples of application are presented including generation of input commands for Integrated Mechanisms Program (IMP) and generation of input for spatial mechanism synthesis routines.


Author(s):  
Matt Germonprez ◽  
Michel Avital ◽  
Nikhil Srinivasan

The multiple and ever-evolving standards that govern mobile computing result in multilayered heterogeneous environments of mobile devices and services. Thus, as mobile computing becomes more prevalent, it is important that designers build systems that support as many unique, in-use, and userdefined characteristics as possible. This study explores the related effects of two existing standardized technologies: hypertext markup language (HTML) and cascading style sheets (CSS). Furthermore, whereas we investigate the impact of the CSS standard in the context of computing in general and mobile computing in particular, we also focus on two emerging roles of this standard: device independence and usability. Our findings suggest that the application of the CSS standard can improve data delivery across independent devices with varied bandwidth and resource availability, thereby providing device independence and improved usability respectively. We demonstrate that through their effect on device independence and usability, CSS plays an important role in the evolution, expansion, and openness of mobile computing.


2021 ◽  
Author(s):  
Gopalan Raghavan

There is a looming threat over current methods of data encryption through advances in quantum computation. Interestingly, this potential threat can be countered through the use of quantum resources such as coherent superposition, entanglement and inherent randomness. These, together with non-clonability of arbitrary quantum states, offer provably secure means of sharing encryption keys between two parties. This physically assured privacy is however provably secure only in theory but not in practice. Device independent approaches seek to provide physically assured privacy of devices of untrusted origin. The quest towards realization of such devices is predicated on conducting loop-hole-free Bell tests which require the use of certified quantum random number generators. The experimental apparatuses for conducting such tests themselves use non-ideal sources, detectors and optical components making such certification extremely difficult. This expository chapter presents a brief overview (not a review) of Device Independence and the conceptual and practical difficulties it entails.


Author(s):  
Christopher Mayer ◽  
Martin Morandell ◽  
Matthias Gira ◽  
Kai Hackbarth ◽  
Martin Petzold ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document