scholarly journals Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

Author(s):  
Ralph Ankele ◽  
Christoph Dobraunig ◽  
Jian Guo ◽  
Eran Lambooij ◽  
Gregor Leander ◽  
...  

The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. For instance, results of Kranz, Leander, and Wiemer from FSE 2017 show that the addition of a tweak using a linear tweak schedule does not introduce new linear characteristics. In this paper, we consider – to the best of our knowledge – for the first time the effect of the tweak on zero-correlation linear cryptanalysis for ciphers that have a linear tweak schedule. It turns out that the tweak can often be used to get zero-correlation linear hulls covering more rounds compared to just searching zero-correlation linear hulls on the data-path of a cipher. Moreover, this also implies the existence of integral distinguishers on the same number of rounds. We have applied our technique on round reduced versions of Qarma, Mantis, and Skinny. As a result, we can present – to the best of our knowledge – the best attack (with respect to number of rounds) on a round-reduced variant of Qarma.

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Dawei Zhou ◽  
Huaifeng Chen ◽  
Rui Zong ◽  
Ningning Song

SPARX is a family of ARX-based block ciphers designed according to the long-trail strategy, which has 32-bit ARX-based SBoxes and has provable bounds against single-differential and single-linear cryptanalysis. Since its proposation, some third-party cryptanalysis methods have been presented. As far as we know, the best attacks against SPARX-64 covered 16 (out of 24) rounds. In this paper, we propose zero-correlation linear attacks on SPARX-64. At first, we construct some new zero-correlation linear distinguishers covering 14-round and 15-round SPARX-64. Then, 15,16,17 and 18-round versions can be attacked using multidimensional or multiple zero-correlation linear attack models, under DKP(distinct known plaintexts) settings. These are the best attacks against SPARX-64 up to now, regarding to the number of attacked rounds. Finally, we transform the zero-correlation distinguishers into integral ones using existing methods, which are also longer than the ones proposed by the designers.


Molecules ◽  
2021 ◽  
Vol 26 (11) ◽  
pp. 3192
Author(s):  
Nicolas Giacoletto ◽  
Frédéric Dumur

Over the past several decades, photopolymerization has become an active research field, and the ongoing efforts to develop new photoinitiating systems are supported by the different applications in which this polymerization technique is involved—including dentistry, 3D and 4D printing, adhesives, and laser writing. In the search for new structures, bis-chalcones that combine two chalcones’ moieties within a unique structure were determined as being promising photosensitizers to initiate both the free-radical polymerization of acrylates and the cationic polymerization of epoxides. In this review, an overview of the different bis-chalcones reported to date is provided. Parallel to the mechanistic investigations aiming at elucidating the polymerization mechanisms, bis-chalcones-based photoinitiating systems were used for different applications, which are detailed in this review.


2015 ◽  
Vol 30 (6) ◽  
pp. 1358-1369 ◽  
Author(s):  
Xiao-Li Yu ◽  
Wen-Ling Wu ◽  
Zhen-Qing Shi ◽  
Jian Zhang ◽  
Lei Zhang ◽  
...  

2018 ◽  
Vol 34 (10) ◽  
pp. 885-890 ◽  
Author(s):  
Bertrand Jordan

Senescent cells are involved in many age-related diseases, and the effects of their elimination by “senolytic” drugs is an active research field. A recent paper describes a convenient murine model of induced senescence and uses it to convincingly demonstrate the positive effects of senolytics on performance and lifespan. Clinical studies have already been initiated; this approach hold promise to eventually improve human “healthspan”.


F1000Research ◽  
2021 ◽  
Vol 10 ◽  
pp. 1129
Author(s):  
Marvin Martens ◽  
Rob Stierum ◽  
Emma L. Schymanski ◽  
Chris T. Evelo ◽  
Reza Aalizadeh ◽  
...  

Toxicology has been an active research field for many decades, with academic, industrial and government involvement. Modern omics and computational approaches are changing the field, from merely disease-specific observational models into target-specific predictive models. Traditionally, toxicology has strong links with other fields such as biology, chemistry, pharmacology and medicine. With the rise of synthetic and new engineered materials, alongside ongoing prioritisation needs in chemical risk assessment for existing chemicals, early predictive evaluations are becoming of utmost importance to both scientific and regulatory purposes. ELIXIR is an intergovernmental organisation that brings together life science resources from across Europe. To coordinate the linkage of various life science efforts around modern predictive toxicology, the establishment of a new ELIXIR Community is seen as instrumental. In the past few years, joint efforts, building on incidental overlap, have been piloted in the context of ELIXIR. For example, the EU-ToxRisk, diXa, HeCaToS, transQST, and the nanotoxicology community have worked with the ELIXIR TeSS, Bioschemas, and Compute Platforms and activities. In 2018, a core group of interested parties wrote a proposal, outlining a sketch of what this new ELIXIR Toxicology Community would look like. A recent workshop (held September 30th to October 1st, 2020) extended this into an ELIXIR Toxicology roadmap and a shortlist of limited investment-high gain collaborations to give body to this new community. This Whitepaper outlines the results of these efforts and defines our vision of the ELIXIR Toxicology Community and how it complements other ELIXIR activities.


2017 ◽  
Author(s):  
Sankhanil Dey ◽  
Ranjan Ghosh

US defence sponsored the DES program in 1974 and released it in 1977. It remained as a well-known and well accepted block cipher until 1998. Thirty-two 4-bit DES S-Boxes are grouped in eight each with four and are put in public domain without any mention of their design methodology. S-Boxes, 4-bit, 8-bit or 32-bit, find a permanent seat in all future block ciphers. In this paper, while looking into the design methodology of DES S-Boxes, we find that S-Boxes have 128 balanced and non-linear Boolean Functions, of which 102 used once, while 13 used twice and 92 of 102 satisfy the Boolean Function-level Strict Avalanche Criterion. All the S-Boxes satisfy the Bit Independence Criterion. Their Differential Cryptanalysis exhibits better results than the Linear Cryptanalysis. However, no S-Boxes satisfy the S-Box-level SAC analyses. It seems that the designer emphasized satisfaction of Boolean-Function-level SAC and S-Box-level BIC and DC, not the S-Box-level LC and SAC.


Author(s):  
Elena Morotti ◽  
Davide Evangelista ◽  
Elena Loli Piccolomini

Deep Learning is developing interesting tools which are of great interest for inverse imaging applications. In this work, we consider a medical imaging reconstruction task from subsampled measurements, which is an active research field where Convolutional Neural Networks have already revealed their great potential. However, the commonly used architectures are very deep and, hence, prone to overfitting and unfeasible for clinical usages. Inspired by the ideas of the green-AI literature, we here propose a shallow neural network to perform an efficient Learned Post-Processing on images roughly reconstructed by the filtered backprojection algorithm. The results obtained on images from the training set and on unseen images, using both the non-expensive network and the widely used very deep ResUNet show that the proposed network computes images of comparable or higher quality in about one fourth of time.


Kavkaz-forum ◽  
2020 ◽  
Author(s):  
Л.Б. ДЗАПАРОВА

Проблемы теории и практики художественного перевода как феномена межкультурной коммуникации в наше время актуализируются в современной филологической науке. Расширяется исследовательское поле в этой области научного знания для переводоведов и всех, кто интересуется проблемами диалога культур. Выбор темы исследования обусловлен и прошедшим в этом году 95-летим юбилеем известного осетинского поэта, драматурга, литературоведа Нафи Григорьевича Джусойты. В статье рассматривается вклад народного писателя Осетии в теоретическое осмысление проблем художественного перевода; впер­вые анализируется одно из самых сложных для перевода стихотворений А.С. Пушкина «Пророк» в интерпретации Н. Джусойты. В частности, автором в статье представлен анализ опубликованных Джусойты на страницах центральных литературных журналов дискуссионных работ по наиболее актуальным проблемам переводоведения. В них Джусойты фокусирует внимание на вопросах верности перевода оригиналу, повышения качества подстрочников, новаторства и модер­низации классических произведений; обуславливает важность переводческого чтения в процессе постижения оригинала; определяет специфику поэтического перевода; выступает против украшательства в переводе, демонстрации на всесоюзном уровне слабых оригиналов и несовершенных переводов. В целом, Джусойты, полемизируя с известными теоретиками, предлагает свою концепцию перевода, начиная от выбора произведения и до конечного результата – текста на другом языке. Перед нами круг проблем, которые до сих пор волнуют специалистов по художественно­му переводу. Автором статьи также представлен сравнительно-сопоставительный анализ стихотворения А. Пушкина в оригинале и в переводческой интерпретации Н.Г. Джусойты. Сличение текстов на смысловом уровне показало стремление Джусойты найти художественные средства, которые помогают раскрыть основной образ. Но не везде раскрыт двуплановый смысл, запечатленный в лексических единицах исходного языка. The problems of the theory and practice of literary translation as a phenomenon of intercultural communication are still actualized in modern philological science. The research field in this area of scientific knowledge is expanding for translators and those interested in the problems of the dialogue of cultures. The choice of the research topic was also conditioned by the 95th anniversary of the famous Ossetian poet, playwright, literary critic Nafi Grigorievich Jusoyty, celebrated this year. The article examines the contribution of the people’s writer of Ossetia to the theoretical understanding of the problems of literary translation; for the first time one of the most difficult poems for translation by A.S. Pushkin’s «Prophet» in the interpretation of N. Jusoyty is reviewed. In particular, the author in the article presents an analysis of the discussion papers published by Jusoyty on the pages of central literary journals on the most pressing problems of translation studies. In them, Jusoyty focuses on the issues of closeness to the original, improving the quality of interlinear translations, innovation and modernization of classical works; determines the importance of translation reading in the process of comprehending the original; determines the specifics of poetic translation; opposes embellishment in translation, the demonstration of weak originals and imperfect translations at the all-Union level. In general, Jusoyty, arguing with well-known theorists, offers his own concept of translation, starting from the choice of a work and up to the final result – a text in another language. We are faced with a range of problems that still concern specialists in literary translation. The author of the article also presents a comparative analysis of A. Pushkin’s poem in the original and in t/he translation interpretation of N.G. Jusoyty. Comparison of the texts at the semantic level showed Jusoyty’s desire to find close artistic means that help to reveal the main image. But not everywhere is disclosed the two-dimensional meaning embodied in the lexical units of the source language.


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Wenqin Cao ◽  
Wentao Zhang

AbstractFor block ciphers, Bogdanov et al. found that there are some linear approximations satisfying that their biases are deterministically invariant under key difference. This property is called key difference invariant bias. Based on this property, Bogdanov et al. proposed a related-key statistical distinguisher and turned it into key-recovery attacks on LBlock and TWINE-128. In this paper, we propose a new related-key model by combining multidimensional linear cryptanalysis with key difference invariant bias. The main theoretical advantage is that our new model does not depend on statistical independence of linear approximations. We demonstrate our cryptanalysis technique by performing key recovery attacks on LBlock and TWINE-128. By using the relations of the involved round keys to reduce the number of guessed subkey bits. Moreover, the partial-compression technique is used to reduce the time complexity. We can recover the master key of LBlock up to 25 rounds with about 260.4 distinct known plaintexts, 278.85 time complexity and 261 bytes of memory requirements. Our attack can recover the master key of TWINE-128 up to 28 rounds with about 261.5 distinct known plaintexts, 2126.15 time complexity and 261 bytes of memory requirements. The results are the currently best ones on cryptanalysis of LBlock and TWINE-128.


1997 ◽  
Vol 80 (3) ◽  
pp. 883-898 ◽  
Author(s):  
Katherine L. Frohlich ◽  
Louise Fournier

This paper examined the psychometric properties of the Interpersonal Relationship Inventory with a sample of homeless men who were first-time shelter users. The measure, based on social exchange theory and equity theory, has two subscales, one for support and the other for conflict. As yet, few measurements have been developed to assess conflict from within social networks. As part of a larger longitudinal study a sample of 166 first-time shelter users was administered the inventory. A student sample also filled out the inventory for comparison purposes. Internal consistency for both subscales was good, .90 for Support and .83 for Conflict. Weak interitem correlations were prevalent among many items in the Conflict subscale. A nearly zero correlation was found between scores on the Support and Conflict subscales, suggesting independence. An exploratory factor analysis using varimax rotation confirmed a dual factor structure. Analyses of variance and Scheffé contrast tests detected no statistically significant differences between age groups on either the Support or the Conflict subscales. A multiple regression analysis indicated that, when controlling for age, scores on the Support scale discriminated the homeless and student samples, while scores on the Conflict subscale do not. The Support subscale indicates excellent psychometric qualities, while the Conflict subscale should be refined.


Sign in / Sign up

Export Citation Format

Share Document