scholarly journals Probing Security through Input-Output Separation and Revisited Quasilinear Masking

Author(s):  
Dahmun Goudarzi ◽  
Thomas Prest ◽  
Matthieu Rivain ◽  
Damien Vergnaud

The probing security model is widely used to formally prove the security of masking schemes. Whenever a masked implementation can be proven secure in this model with a reasonable leakage rate, it is also provably secure in a realistic leakage model known as the noisy leakage model. This paper introduces a new framework for the composition of probing-secure circuits. We introduce the security notion of input-output separation (IOS) for a refresh gadget. From this notion, one can easily compose gadgets satisfying the classical probing security notion –which does not ensure composability on its own– to obtain a region probing secure circuit. Such a circuit is secure against an adversary placing up to t probes in each gadget composing the circuit, which ensures a tight reduction to the more realistic noisy leakage model. After introducing the notion and proving our composition theorem, we compare our approach to the composition approaches obtained with the (Strong) Non-Interference (S/NI) notions as well as the Probe-Isolating Non-Interference (PINI) notion. We further show that any uniform SNI gadget achieves the IOS security notion, while the converse is not true. We further describe a refresh gadget achieving the IOS property for any linear sharing with a quasilinear complexity Θ(n log n) and a O(1/ log n) leakage rate (for an n-size sharing). This refresh gadget is a simplified version of the quasilinear SNI refresh gadget proposed by Battistello, Coron, Prouff, and Zeitoun (ePrint 2016). As an application of our composition framework, we revisit the quasilinear-complexity masking scheme of Goudarzi, Joux and Rivain (Asiacrypt 2018). We improve this scheme by generalizing it to any base field (whereas the original proposal only applies to field with nth powers of unity) and by taking advantage of our composition approach. We further patch a flaw in the original security proof and extend it from the random probing model to the stronger region probing model. Finally, we present some application of this extended quasilinear masking scheme to AES and MiMC and compare the obtained performances.

2020 ◽  
Vol 14 (1) ◽  
pp. 172-201
Author(s):  
Suvradip Chakraborty ◽  
Janaka Alawatugoda ◽  
Chandrasekaran Pandu Rangan

AbstractWe present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To this end, we introduce a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE) protocol. We introduce an appropriate security model for LR-NIKE protocols in the bounded memory leakage (BML) settings. We then show a secure construction of the LR-NIKE protocol in the BML setting that achieves an optimal leakage rate, i.e., 1 – o(1). Our construction of LR-NIKE requires a minimal use of a leak-free hardware component. We argue that the use of such a leak-free hardware component seems to be unavoidable in any construction of an LR-NIKE protocol, even in the BML setting. Finally, we show how to construct the aforementioned leakage-resilient primitives from such an LR-NIKE protocol as summarized below. All these primitives also achieve the same (optimal) leakage rate as the underlying LR-NIKE protocol. We show how to construct a leakage-resilient (LR) IND-CCA-2-secure PKE scheme in the BML model generically from a bounded LR-NIKE (BLR-NIKE) protocol. Our construction of LR-IND-CCA-2 secure PKE differs significantly from the state-of-the-art constructions of these primitives, which mainly use hash proof techniques to achieve leakage resilience. Moreover, our transformation preserves the leakage-rate of the underlying BLR-NIKE protocol. We introduce a new leakage model for AKE protocols, in the BML setting, and present a leakage-resilient AKE protocol construction from the LR-NIKE protocol. We introduce the first-ever leakage model for LLKE protocols in the BML setting and the first construction of such a leakage-resilient LLKE from the LR-NIKE protocol.


2020 ◽  
Vol 10 (5) ◽  
pp. 713-720
Author(s):  
Bathula Prasanna Kumar ◽  
Edara Srinivasa Reddy

Passwords tend to be one of the most popular approaches to protect operating systems and user’s data also. Most businesses rely on password protection schemes, and secure passwords are incredibly necessary to them. The proposed model typically aims to impose protection by forcing users to obey protocols to build passwords. For user protection, password has become a prevailing method in terms of exposure to scarce tools. The main problem with password is its consistency or power, i.e. how simple (or how difficult) a third person can be "assumed" to enter the tool that you use while claiming to be you. In operating systems, text-based passwords remain the primary form of authentication, following major improvements in attackers' skills in breaking passwords. The proposed Random Character Utilization with Hashing (RCUH) is used for generation of new passwords by considering user parameters. The proposed model introduces a new framework to design a password by considering nearly 10 parameters from the user and also analyze the time for cracking the generated password to provide the system strength. The proposed model aims to generate an efficient security model for password generation by considering several secret parameters from the user. To break a set of consistency passwords, analysis is also performed on time for password cracking. The tests show a close positive correlation between guessing complexity and password consistency. The proposed model is compared with the traditional password generation and cracking models. The proposed model takes much time in cracking the password that improves the systems security.


2010 ◽  
Vol 97-101 ◽  
pp. 629-633 ◽  
Author(s):  
Bo Qin Gu ◽  
Zhen Guo Sun ◽  
Y.Y. Li ◽  
X.L. Huang ◽  
Jian Feng Zhou ◽  
...  

The time-correlated leakage characteristic of nonmetallic gaskets was analyzed. Considering the effect of the gasket material deterioration on the sealing performance, a time-correlated leakage predication model of nonmetallic gasket sealing connections based on the porous medium theory was proposed. Some tests were performed on compressed non-asbestos fiber gaskets, the leakage behavior was investigated and the coefficients in the leakage model were obtained by regression analysis of experimental data. The predicted leakage rates according to the model were compared with the data reported in some literatures, and the prediction accuracy was also validated. The presented time-correlated leakage model provides an effective way to predict the leakage rate and evaluating the life of gasket sealing connections.


Coatings ◽  
2020 ◽  
Vol 11 (1) ◽  
pp. 20
Author(s):  
Xingya Ni ◽  
Chenbo Ma ◽  
Jianjun Sun ◽  
Yuyan Zhang ◽  
Qiuping Yu

A theoretical model for calculating the leakage rate of contact mechanical seals based on the fractal theory of the porous media, which can consider the real seal contact interface and objectively reflect the flow of the interfacial fluid from a microscopic perspective, is established. In order to obtain the microstructural parameters of the porous media included in the leakage model, such as the fractal dimension and the maximum pore diameter, the real seal contact interface obtained from experiments is reconstructed, a contact model between the dynamic and static rings is proposed, and then the calculation methods for the interface characteristic parameters are provided. Numerical simulation results show that as the contact pressure increases from 0.05 to 0.5 MPa, the interface porosity and the maximum pore diameter decreases gradually. Furthermore, the fractal dimension of the pore area increases and the leakage rate of the interface decreases from 0.48 to 0.33 mL/h. The proposed method provides a novel way of calculating the leakage rate of contact mechanical seals.


Coatings ◽  
2021 ◽  
Vol 11 (11) ◽  
pp. 1338
Author(s):  
Guangyao Bei ◽  
Chenbo Ma ◽  
Jianjun Sun ◽  
Xingya Ni ◽  
Yafei Ma

The fluid leakage channel found in contact mechanical seals belongs to the microchannel category. Thus, upon further inspection, the influence of surface wettability and other factors neglected in previous studies becomes obvious. The porous leakage model of contact mechanical seals considering the surface wettability presented in this paper was based on the Cassie model and slip theory. The variations of the microchannel slip length and the velocity under various wettability conditions were studied and the relationship between the slip length and the apparent contact angle was established. Moreover, using porous media theory, the theoretical model of the leakage rate in contact mechanical seals considers the surface wettability depending on various parameters. The observed parameters included the surface contact angle, sealing medium pressure, viscosity coefficient, fractal dimension, and maximum pore diameter. The simulation results obtained using the proposed model have shown that the leakage rate increases with the increase of the apparent contact angle. Particularly when the contact pressure is small, the influence of the surface wettability is more significant. Furthermore, the leakage rate results obtained via the proposed model were compared to those of existing models. The comparison confirmed that the proposed model is applicable and that the necessity of considering wettability significantly affects the leakage rate calculation accuracy. The proposed model lays a foundation for further improving the calculation accuracy, making it easier for both the researchers and practitioners to suppress the leakage in contact mechanical seals.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Yi-Fan Tseng ◽  
Chun-I Fan

Multireceiver identity-based encryption is a cryptographic primitive, which allows a sender to encrypt a message for multiple receivers efficiently and securely. In some applications, the receivers may not want their identities to be revealed. Motivated by this issue, in 2010, Fan et al. first proposed the concept of anonymous multireceiver identity-based encryption (AMRIBE). Since then, lots of literature studies in this field have been proposed. After surveying the existing works, however, we found that most of them fail to achieve provable anonymity with tight reduction. A security proof with tight reduction means better quality of security and better efficiency of implementation. In this paper, we focus on solving the open problem in this field that is to achieve the ANON-IND-CCA security with tight reduction by giving an AMRIBE scheme. The proposed scheme is proven to be IND-MID-CCA and ANON-MID-CCA secure with tight reduction under a variant of the DBDH assumption. To the best of our knowledge, this is the first scheme proven with tight reducible full CCA security in the standard model.


The water balance is an accounting of the inputs and outputs of water. The water balance of a place, whether it is an agricultural field, watershed, or continent, can be determined by calculating the input, output, and storage changes of water at the Earth's surface. The assessment also takes into account the existing supply of stocks and future appropriation of these stocks. Water inputs are brought by precipitation. Outputs are from the combination of evaporation and the transpiration of plants, called evapotranspiration. Both quantities are estimated in terms of the amount of water per surface unit, but they are generally translated into water heights, the most currently used unit being the millimeter. Usually, the planning and implementation of water use is undertaken in silos with little or no interaction between and across sectors. This leads to frequent water scarcity and water pollution. About 30% of people in India live in cities that are expected to double in population by 2050. With a growing economy and changing lifestyles the pressure on already strained water resources is increasing. The government has shown an interest in Integrated Urban Water Management (IUWM) as a new framework and approach for thenation.


2013 ◽  
Vol 310 ◽  
pp. 280-286 ◽  
Author(s):  
Xin Hua Wang ◽  
Li Mei Wang ◽  
Gang Zheng ◽  
Shu Wen Sun ◽  
Rong Zun Yang

Based on the oil flowing state and the state equation of the long distance pipeline, the calculation method of leakage rate is analyzed when the pipeline leakage occurs. First, the leakage models of long-distance oil pipeline are established by FLUENT simulation, and the simulated results are close to the computed results, which prove the reliability of the simulation method, Then, through FLUENT simulating, the division of the models of the orifice leak, the macroporous leak and the pipe leak by the ratio of the leak-hole’s equivalent diameter to the pipe diameter is presented. Finally, the influence laws of the leak rates affected by the pipe diameter, the leak-hole’s equivalent diameter and the oil flow rate are investigated.


Sign in / Sign up

Export Citation Format

Share Document