scholarly journals Fault Attacks on CCA-secure Lattice KEMs

Author(s):  
Peter Pessl ◽  
Lukas Prokop

NIST’s post-quantum standardization effort very recently entered its final round. This makes studying the implementation-security aspect of the remaining candidates an increasingly important task, as such analyses can aid in the final selection process and enable appropriately secure wider deployment after standardization. However, lattice-based key-encapsulation mechanisms (KEMs), which are prominently represented among the finalists, have thus far received little attention when it comes to fault attacks.Interestingly, many of these KEMs exhibit structural similarities. They can be seen as variants of the encryption scheme of Lyubashevsky, Peikert, and Rosen, and employ the Fujisaki-Okamoto transform (FO) to achieve CCA2 security. The latter involves re-encrypting a decrypted plaintext and testing the ciphertexts for equivalence. This corresponds to the classic countermeasure of computing the inverse operation and hence prevents many fault attacks.In this work, we show that despite this inherent protection, practical fault attacks are still possible. We present an attack that requires a single instruction-skipping fault in the decoding process, which is run as part of the decapsulation. After observing if this fault actually changed the outcome (effective fault) or if the correct result is still returned (ineffective fault), we can set up a linear inequality involving the key coefficients. After gathering enough of these inequalities by faulting many decapsulations, we can solve for the key using a bespoke statistical solving approach. As our attack only requires distinguishing effective from ineffective faults, various detection-based countermeasures, including many forms of double execution, can be bypassed.We apply this attack to Kyber and NewHope, both of which belong to the aforementioned class of schemes. Using fault simulations, we show that, e.g., 6,500 faulty decapsulations are required for full key recovery on Kyber512. To demonstrate practicality, we use clock glitches to attack Kyber running on a Cortex M4. As we argue that other schemes of this class, such as Saber, might also be susceptible, the presented attack clearly shows that one cannot rely on the FO transform’s fault deterrence and that proper countermeasures are still needed.

2017 ◽  
Vol 26 (01) ◽  
pp. 68-71 ◽  
Author(s):  
D. R. Schlegel ◽  
G. Ficheur

Summary Objectives: To summarize recent research and emerging trends in the area of secondary use of healthcare data, and to present the best papers published in this field, selected to appear in the 2017 edition of the IMIA Yearbook. Methods: A literature review of articles published in 2016 and related to secondary use of healthcare data was performed using two bibliographic databases. From this search, 941 papers were identified. The section editors independently reviewed the papers for relevancy and impact, resulting in a consensus list of 14 candidate best papers. External reviewers examined each of the candidate best papers and the final selection was made by the editorial board of the Yearbook. Results: From the 941 retrieved papers, the selection process resulted in four best papers. These papers discuss data quality concerns, issues in preserving privacy of patients in shared datasets, and methods of decision support when consuming large amounts of raw electronic health record (EHR) data. Conclusion: In 2016, a significant effort was put into the development of new systems which aim to avoid significant human understanding and pre-processing of healthcare data, though this is still only an emerging area of research. The value of temporal relationships between data received significant study, as did effective information sharing while preserving patient privacy.


Enrollment is the way toward scanning for planned representatives and animating them to apply for employments in the association. Choice could be defined as the operation by which the organization watches over among the applicants, those people they think would best fulfill the precondition of the exercise, thinking about the present natural situation. In the current quickly changing business condition, associations have to to retort rapidly to prerequisites for individuals. It is therefore vital to set up a well-characterized enlistment policy that can be properly performed in order to get the greatest suits for vacant roles. Choosing an inappropriate competitor or rejecting the right up-and-comer could result in the partnership being exorbitant mistakes.


2018 ◽  
Vol 27 (01) ◽  
pp. 223-226 ◽  
Author(s):  
Jeremy Warner ◽  
Debra Patt ◽  

Objective: To summarize significant research contributions on cancer informatics published in 2017. Methods: An extensive search using PubMed/Medline, Google Scholar, and manual review was conducted to identify the scientific contributions published in 2017 that address topics in cancer informatics. The selection process comprised three steps: (i) 15 candidate best papers were first selected by the two section editors, (ii) external reviewers from internationally renowned research teams reviewed each candidate best paper, and (iii) the final selection of three best papers was conducted by the editorial board of the Yearbook. Results: Results: The three selected best papers present studies addressing many facets of cancer informatics, with immediate applicability in the research and clinical domains. Conclusion: Cancer informatics is a broad and vigorous subfield of biomedical informatics. Strides in knowledge management, crowdsourcing, and visualization are especially notable in 2017.


1989 ◽  
Vol 8 ◽  
pp. 441-442
Author(s):  
E. J. Weiler

AbstractThe Hubble Space Telescope Second Generation Instrument Program is described. The original instrument selection process in 1985 is discussed as well as the NASA plan to make a final selection of an infrared instrument in late 1988.


1992 ◽  
Vol 114 (4) ◽  
pp. 339-344 ◽  
Author(s):  
G. A. Bennett

The design approach and results from a series of analyses used to select a miniature high-temperature multi-watt refrigerator for thermally protecting downhole instruments are described. Thirty-one systems from nine physical or chemical processes were investigated and compared against the design criteria and constraints. Preliminary thermodynamic analyses and the results of a search for high-temperature components and refrigerants eliminated all but three processes and seven systems. These seven systems were re-evaluated based on a set of proposed design changes that reflect natural evolution from a prototype to commercial system application. Final selection considered refrigerator interactions with the geothermal logging system to define failure modes, ensure compatibility, and allow adaptability to changing conditions. The selected refrigerator design permits reliable, long-term active cooling of downhole instruments in hot wells. The consistent design, systematic analysis and unbiased selection process represent a new body of research results that provide potential for substantial advances in downhole thermal protection technology.


2020 ◽  
Vol 29 (01) ◽  
pp. 243-246 ◽  
Author(s):  
Jeremy L. Warner ◽  
Debra Patt ◽  

Objective: To summarize significant research contributions on cancer informatics published in 2019. Methods: An extensive search using PubMed/Medline and manual review was conducted to identify the scientific contributions published in 2019 that address topics in cancer informatics. The selection process comprised three steps: (i) 15 candidate best papers were first selected by the two section editors, (ii) external reviewers from internationally renowned research teams reviewed each candidate best paper, and (iii) the final selection of two best papers was conducted by the editorial committee of the Yearbook. Results: The two selected best papers demonstrate the clinical utility of deep learning in two important cancer domains: radiology and pathology. Conclusion: Cancer informatics is a broad and vigorous subfield of biomedical informatics. Applications of new and emerging computational technologies are especially notable in 2019.


2020 ◽  
Vol 29 (01) ◽  
pp. 077-080
Author(s):  
Carolyn Petersen ◽  
Vignesh Subbian ◽  

Summary Objective: To summarize significant research contributions on ethics in medical informatics published in 2019. Methods: An extensive search using PubMed/Medline was conducted to identify the scientific contributions published in 2019 that address ethics issues in medical informatics. The selection process comprised three steps: 1) 15 candidate best papers were first selected by the two section editors; 2) external reviewers from internationally renowned research teams reviewed each candidate best paper; and 3) the final selection of three best papers was conducted by the editorial committee of the Yearbook. Results: The three selected best papers explore timely issues of concern to the community and demonstrate how ethics considerations influence applied informatics. Conclusion: With regard to ethics in informatics, data sharing and privacy remain primary areas of concern. Ethics issues related to the development and implementation of artificial intelligence is an emerging topic of interest.


1986 ◽  
Vol 29 (4) ◽  
pp. 19-22
Author(s):  
Suzanne Keilson

Large aerospace assemblies, such as the Optical Telescope Assembly (OTA) for the Hubble Space Telescope built by Perkin-Elmer, present a unique challenge to anyone evaluating clean room products for use on these programs. Very stringent requirements for molecular and particulate contamination control are often not taken into account by the manufacturers of clean room products. The realization that extractables of plastic products pose a serious contamination threat to optical assemblies is gaining wider recognition, but even so-called "solvent compatible" products may not meet the requirements of all sensitive payloads. A process is described for evaluating, selecting and monitoring products in the most widespread use—garments, gloves, and wipers. Notwithstanding well-trained, conscientious personnel, items such as garments, gloves and wipers can be used in such a variety of ways that their tolerance for misuse without untoward consequences must be considered. The final selection process must therefore consider both compatibility and durability and, as was discovered, a unique choice is not always possible for all applications.


2015 ◽  
Vol 03 (01) ◽  
pp. 63-87 ◽  
Author(s):  
Fei Wang ◽  
Peidong Liu ◽  
Shiyu Zhao ◽  
Ben M. Chen ◽  
Swee King Phang ◽  
...  

This paper presents an intelligent and robust guidance, navigation and control solution for a rotary-wing UAV to carry out an autonomous cargo transportation mission between two moving platforms. Different from the conventional GPS/INS-only navigation scheme, this solution also integrates sophisticated Lidar and vision systems capable of precisely locating cargo loading and unloading positions. Besides, another complementary GPS/INS system is set up on the moving platforms with communication to the unmanned helicopter so that the controlled UAV is able to follow the dynamic platforms with good tracking performance. The whole system has been successfully implemented, and with its superb performance the Unmanned Systems Research Group from the National University of Singapore won the first place in the final round of the rotary-wing category competition of the 2nd AVIC Cup — International UAV Innovation Grand Prix 2013.


2009 ◽  

The fourth edition of the Osdotta seminar, was held in Turin from 10-13 September 2008. The Seminar, set up as a moment of reflection about the tendencies that characterize the internal research of the Technology of Architecture, expanded its area of interest, opening up to different and wider horizons for new objectives of research. The program of the three days of meetings developed, as in the preceding editions, with an organic series of thematic tables merging in the final round table that hosted the discussions and the verification of the three external valuators.


Sign in / Sign up

Export Citation Format

Share Document