scholarly journals Unrolled Cryptography on Silicon

Author(s):  
Thorben Moos

Cryptographic primitives with low-latency performance have gained momentum lately due to an increased demand for real-time applications. Block ciphers such as PRINCE enable data encryption (resp. decryption) within a single clock cycle at a moderately high operating frequency when implemented in a fully-unrolled fashion. Unsurprisingly, many typical environments for unrolled ciphers require protection against physical adversaries as well. Yet, recent works suggest that most common SCA countermeasures are hard to apply to low-latency circuits. Hardware masking, for example, requires register stages to offer resistance, thus adding delay and defeating the purpose of unrolling. On another note, it has been indicated that unrolled primitives without any additional means of protection offer an intrinsic resistance to SCA attacks due to their parallelism, asynchronicity and speed of execution. In this work, we take a closer look at the physical security properties provided by unrolled cryptographic IC implementations. We are able to confirm that the nature of unrolling indeed bears the potential to decrease the susceptibility of cipher implementations significantly when reset methods are applied. With respect to certain adversarial models, e.g., ciphertext-only access, an amazingly high level of protection can be achieved. While this seems to be a great result for cryptographic hardware engineers, there is an attack vector hidden in plain sight which still threatens the security of unrolled implementations remarkably – namely the static power consumption of CMOS-based circuits. We point out that essentially all reasons which make it hard to extract meaningful information from the dynamic behavior of unrolled primitives are not an issue when exploiting the static currents for key recovery. Our evaluation is based on real-silicon measurements of an unrolled PRINCE core in a custom 40nm ASIC. The presented results serve as a neat educational case study to demonstrate the broad differences between dynamic and static power information leakage in the light of technological advancement.

2021 ◽  
pp. 1-13
Author(s):  
Yang GAO ◽  
Xiang GAO

With knowledge perspective of industrial technology, in this paper we propose fast ranking score decision making model based on Fuzzy integrated TOPSIS approach to determine economic growth rate of manufacturing industry in China. This research focuses on driving effects of China’s productive service industry on manufacturing technology innovation. The research results show that the manufacturer service industry takes a high level of information diffusion for the manufacturing industry. It transmits a large amount of diverse information through the unconstrained relationship with the manufacturing industry, thereby forming the economic network with proposed Fuzzy integrated TOPSIS economy ranking (FITER) model and improve the development level of the manufacturing industry. We evaluate the performance of proposed FITER model by comparing ranking score of different manufacturing industry with different existing decision making mode and demonstrate that proposed model represent best ranking score in comparison to existing approach. Result from data analysis motivates driving effect of production services on the technological innovation of manufacturing and sub-sectors. It is found that the innovation and technological advancement in the production industry of services takes drive the overall expansion level of the business industry, as well as make the manufacturing industry the strongest.


2018 ◽  
Vol 62 (5) ◽  
Author(s):  
Rashmi Gupta ◽  
Carolina Rodrigues Felix ◽  
Matthew P. Akerman ◽  
Kate J. Akerman ◽  
Cathryn A. Slabber ◽  
...  

ABSTRACTMycobacterium tuberculosisand the fast-growing speciesMycobacterium abscessusare two important human pathogens causing persistent pulmonary infections that are difficult to cure and require long treatment times. The emergence of drug-resistantM. tuberculosisstrains and the high level of intrinsic resistance ofM. abscessuscall for novel drug scaffolds that effectively target both pathogens. In this study, we evaluated the activity of bis(pyrrolide-imine) gold(III) macrocycles and chelates, originally designed as DNA intercalators capable of targeting human topoisomerase types I and II (Topo1 and Topo2), againstM. abscessusandM. tuberculosis. We identified a total of 5 noncytotoxic compounds active against both mycobacterial pathogens under replicatingin vitroconditions. We chose one of these hits, compound 14, for detailed analysis due to its potent bactericidal mode of inhibition and scalable synthesis. The clinical relevance of this compound was demonstrated by its ability to inhibit a panel of diverseM. tuberculosisandM. abscessusclinical isolates. Prompted by previous data suggesting that compound 14 may target topoisomerase/gyrase enzymes, we demonstrated that it lacked cross-resistance with fluoroquinolones, which target theM. tuberculosisgyrase.In vitroenzyme assays confirmed the potent activity of compound 14 against bacterial topoisomerase 1A (Topo1) enzymes but not gyrase. Novel scaffolds like compound 14 with potent, selective bactericidal activity againstM. tuberculosisandM. abscessusthat act on validated but underexploited targets like Topo1 represent a promising starting point for the development of novel therapeutics for infections by pathogenic mycobacteria.


1997 ◽  
Vol 41 (10) ◽  
pp. 2270-2273 ◽  
Author(s):  
F Alcaide ◽  
G E Pfyffer ◽  
A Telenti

The mycobacterial embCAB operon encodes arabinosyl transferases, putative targets of the antimycobacterial agent ethambutol (EMB). Mutations in embB lead to resistance to EMB in Mycobacterium tuberculosis. The basis for natural, intrinsic resistance to EMB in nontuberculous mycobacteria (NTM) is not known; neither is the practical implication of resistance to EMB in the absence of embB mutations in M. tuberculosis well understood. The conserved embB resistance-determining region (ERDR) of a collection of 13 strains of NTM and 12 EMB-resistant strains of M. tuberculosis was investigated. Genotypes were correlated with drug susceptibility phenotypes. High-level natural resistance to EMB (MIC, . or =64 microg/ml) was associated with a variant amino acid motif in the ERDR of M. abscessus, M. chelonae, and M. leprae. Transfer of the M. abscessus emb allele to M. smegmatis resulted in a 500-fold increase in the MICs. In M. tuberculosis, embB mutations were associated with MICs of > or =20 microg/ml while resistance not associated with an ERDR mutation generally resulted in MICs of < or =10 microg/ml. These data further support the notion that the emb region determines intrinsic and acquired resistance to EMB and might help in the reassessment of the current recommendations for the screening and treatment of infections with EMB-resistant M. tuberculosis and NTM.


Now-a-days data plays a key role in Information Technology and while coming to privacy of that data it has become a considerable issue to maintain data security at high level. Large amounts of data generated through devices are considered as a major obstacle and also tough to handle in real time scenarios. To meetwith consistent performance applications at present abandon encryptions techniquesbecausethe time for the execution and the completion of encryption techniques plays a key role during processing and transmissions of data. In this paper our moto is to secure data and proposed a new technique called Dynamic Data Encryption Strategy (DDES)which selectively encrypts data and uses some algorithms which provides a perfect encryption strategy for the data packages under some timing constraints. By this method we can achieve data privacy and security for big-data in mobile cloud-computing by using an encryption strategy respective to their requirements during execution time.


Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6909
Author(s):  
Francisco Eugenio Potestad-Ordóñez ◽  
Manuel Valencia-Barrero ◽  
Carmen Baena-Oliva ◽  
Pilar Parra-Fernández ◽  
Carlos Jesús Jiménez-Fernández

One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs. Trivium stream cipher is one of the lightweight ciphers designed for security applications in the Internet of things (IoT). In this paper, we present a complete setup to attack ASIC implementations of Trivium which allows recovering the secret keys using the active non-invasive technique attack of clock manipulation, combined with Differential Fault Analysis (DFA) cryptanalysis. The attack system is able to inject effective transient faults into the Trivium in a clock cycle and sample the faulty output. Then, the internal state of the Trivium is recovered using the DFA cryptanalysis through the comparison between the correct and the faulty outputs. Finally, a backward version of Trivium was also designed to go back and get the secret keys from the initial internal states. The key recovery has been verified with numerous simulations data attacks and used with the experimental data obtained from the Application Specific Integrated Circuit (ASIC) Trivium. The secret key of the Trivium were recovered experimentally in 100% of the attempts, considering a real scenario and minimum assumptions.


2015 ◽  
Vol 2015 ◽  
pp. 1-13 ◽  
Author(s):  
Alireza Monemi ◽  
Chia Yee Ooi ◽  
Muhammad Nadzir Marsono

Network-on-Chip (NoC) is fast emerging as an on-chip communication alternative for many-core System-on-Chips (SoCs). However, designing a high performance low latency NoC with low area overhead has remained a challenge. In this paper, we present a two-clock-cycle latency NoC microarchitecture. An efficient request masking technique is proposed to combine virtual channel (VC) allocation with switch allocation nonspeculatively. Our proposed NoC architecture is optimized in terms of area overhead, operating frequency, and quality-of-service (QoS). We evaluate our NoC against CONNECT, an open source low latency NoC design targeted for field-programmable gate array (FPGA). The experimental results on several FPGA devices show that our NoC router outperforms CONNECT with 50% reduction of logic cells (LCs) utilization, while it works with 100% and 35%~20% higher operating frequency compared to the one- and two-clock-cycle latency CONNECT NoC routers, respectively. Moreover, the proposed NoC router achieves 2.3 times better performance compared to CONNECT.


2014 ◽  
Vol 58 (12) ◽  
pp. 7424-7429 ◽  
Author(s):  
Silvia Buroni ◽  
Nele Matthijs ◽  
Francesca Spadaro ◽  
Heleen Van Acker ◽  
Viola C. Scoffone ◽  
...  

ABSTRACTBurkholderia cenocepaciais notorious for causing respiratory tract infections in people with cystic fibrosis. Infections with this organism are particularly difficult to treat due to its high level of intrinsic resistance to most antibiotics. Multidrug resistance inB. cenocepaciacan be ascribed to different mechanisms, including the activity of efflux pumps and biofilm formation. In the present study, the effects of deletion of the 16 operons encoding resistance-nodulation-cell division (RND)-type efflux pumps inB. cenocepaciastrain J2315 were investigated by determining the MICs of various antibiotics and by investigating the antibiofilm effect of these antibiotics. Finally, the expression levels of selected RND genes in treated and untreated cultures were investigated using reverse transcriptase quantitative PCR (RT-qPCR). Our data indicate that the RND-3 and RND-4 efflux pumps are important for resistance to various antimicrobial drugs (including tobramycin and ciprofloxacin) in planktonicB. cenocepaciaJ2315 populations, while the RND-3, RND-8, and RND-9 efflux systems protect biofilm-grown cells against tobramycin. The RND-8 and RND-9 efflux pumps are not involved in ciprofloxacin resistance. Results from the RT-qPCR experiments on the wild-type strainB. cenocepaciaJ2315 suggest that there is little regulation at the level of mRNA expression for these efflux pumps under the conditions tested.


Author(s):  
MING-SHENG LIU ◽  
HUI LIU ◽  
JIAN-WU ZHENG

The smart card is being used all over the world, because of its power to store data securely and execute calculations confidentially. This paper proposes an easy way to implement the strategy which can guarantee data integrity and privacy in the transmission path between the terminal application of the smart card and the smart card. This strategy consists of cryptographic functions of message and methods for transmitting APDU and managing secret keys. Some cryptographic functions of message are defined and developed for transmitting APDU confidentially. These cryptographic functions can keep the byte length of input and output messages identical. This strategy for transmitting APDU points out how to call cryptographic functions to encode or decode the data body of APDU, and how to construct a modified APDU message structure according to the original APDU message structure, which will be sent to its intended recipient instead of the original APDU message structure. With the proper secret keys, the authorized party can recover this modified APDU to its corresponding original APDU properly, without any information leakage. The transfer of secret keys to other parties is the most difficult aspect of secure APDU transmission, whereas data encryption/decryption is relatively straightforward. Two distinct strategies for managing secret keys, namely the static and the dynamic are introduced and compared. The dynamic strategy is preferred for a terminal application and smart card which do not need to authenticate each other. The implementation of this dynamic strategy has been detailed.


2021 ◽  
Vol 13 (22) ◽  
pp. 12535
Author(s):  
Mokhele Edmond Moeletsi

There are major concerns globally on the increasing population of internal combustion engine (ICE) vehicles and their environmental impact. The initiatives for the advancement of alternative propulsion systems, such as electric motors, have great opportunities, but are marked by a number of challenges that require major changes in policies and serious investment on the technologies in order to make them viable alternative mobility sources around the world. South Africa has struggled a lot in adopting electric vehicles among all the emerging countries. This is mostly attributed to a non-conducive environment for electric vehicle adoption. This study administered a survey consisting of Likert-scale questions in the Gauteng Province to gather information on people’s views on some of the major concerns around electric vehicle technology. The survey results demonstrated that Gauteng residents perceive electric vehicle price as the main constraint towards adoption of the technology and introduction of government policy towards addressing this challenge would be helpful. Some of the suggested interventions, such as the rollout of purchasing subsidies and tax rebates, received a high level of satisfaction among the respondents. Future initiatives that tackle issues of charging infrastructure network also received high satisfaction. Thus, there is a need for all stakeholders in the South African automotive industry to improve the enabling environment for the adoption of electric vehicles.


Sign in / Sign up

Export Citation Format

Share Document