996 resultados para differential fault attack
Resumo:
Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.
Resumo:
This paper studies the security of the block ciphers ARIA and Camellia against impossible differential cryptanalysis. Our work improves the best impossible differential cryptanalysis of ARIA and Camellia known so far. The designers of ARIA expected no impossible differentials exist for 4-round ARIA. However, we found some nontrivial 4-round impossible differentials, which may lead to a possible attack on 6-round ARIA. Moreover, we found some nontrivial 8-round impossible differentials for Camellia, whereas only 7-round impossible differentials were previously known. By using the 8-round impossible differentials, we presented an attack on 12-round Camellia without FL/FL 1 layers.
Resumo:
Security devices are vulnerable to Differential Power Analysis (DPA) that reveals the key by monitoring the power consumption of the circuits. In this paper, we present the first DPA attack against an FPGA implementation of the Camellia encryption algorithm with all key sizes and evaluate the DPA resistance of the algorithm. The Camellia cryptographic algorithm involves several different key-dependent intermediate operations including S-Box operations. In previous research, it was believed that the Camellia is stronger than AES due to the additional Whitening phase protecting the S-Box operation. However, we propose an attack that bypasses the Whitening phase and targets the S-Box. In this paper, we also discuss a lowcost countermeasure strategy to protect the Pre-whitening / Post-whitening and FL function of Camellia using Dual-rail Precharged Logic and to protect against attacks of the S-Box using Random Delay Insertion. © 2009 IEEE.
Resumo:
Predicting the ecological impacts of damaging invasive species under relevant environmental contexts is a major challenge, for which comparative functional responses (the relationship between resource availability and consumer uptake rate) have great potential. Here, the functional responses of Gammarus pulex, an ecologically damaging invader in freshwaters in Ireland and other islands, were compared with those of a native trophic equivalent Gammarus duebeni celticus. Experiments were conducted at two dissolved oxygen concentrations (80 and 50 % saturation), representative of anthropogenic water quality changes, using two larval prey, blackfly (Simuliidae spp.) and mayfly (Baetis rhodani). Overall, G. pulex had higher Type II functional responses and hence predatory impacts than G. d. celticus and the functional responses of both predators were reduced by lowered oxygen concentration. However, this reduction was of lower magnitude for the invader as compared to the native. Further, the invader functional response at low oxygen was comparable to that of the native at high oxygen. Attack rates of the two predators were similar, with low oxygen reducing these attack rates, but this effect occurred more strongly for blackfly than mayfly prey. Handling times were significantly lower for the invader compared with the native, and significantly higher at low oxygen, however, the effect of lowered oxygen on handling times was minimal for the invader and pronounced for the native. Maximum feeding rates were significantly greater for the invader compared with the native, and significantly reduced at low oxygen, with this effect again lesser for the invader as compared to the native. The greater functional responses of the invader corroborate with its impacts on recipient macroinvertebrate communities when it replaces the native. Further, our experiments predict that the impact of the invader will be less affected than the native under altered oxygen regimes driven by anthropogenic influences.
Resumo:
Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.
Resumo:
Schistosoma mansoni is a well-adapted blood-dwelling parasitic helminth, persisting for decades in its human host despite being continually exposed to potential immune attack. Here, we describe in detail micro-exon genes (MEG) in S. mansoni, some present in multiple copies, which represent a novel molecular system for creating protein variation through the alternate splicing of short (<= 36 bp) symmetric exons organized in tandem. Analysis of three closely related copies of one MEG family allowed us to trace several evolutionary events and propose a mechanism for micro-exon generation and diversification. Microarray experiments show that the majority of MEGs are up-regulated in life cycle stages associated with establishment in the mammalian host after skin penetration. Sequencing of RT-PCR products allowed the description of several alternate splice forms of micro-exon genes, highlighting the potential use of these transcripts to generate a complex pool of protein variants. We obtained direct evidence for the existence of such pools by proteomic analysis of secretions from migrating schistosomula and mature eggs. Whole-mount in situ hybridization and immunolocalization showed that MEG transcripts and proteins were restricted to glands or epithelia exposed to the external environment. The ability of schistosomes to produce a complex pool of variant proteins aligns them with the other major groups of blood parasites, but using a completely different mechanism. We believe that our data open a new chapter in the study of immune evasion by schistosomes, and their ability to generate variant proteins could represent a significant obstacle to vaccine development.
Resumo:
The Precambrian crystalline basement of southeast Brazil is affected by many Phanerozoic reactivations of shear zones that developed during the end of the Neoproterozoic in the Brasiliano orogeny. These reactivations with specific tectonic events, a multidisciplinary study was done, involving geology, paleostress, and structural analysis of faults, associated with apatite fission track methods along the northeastern border of the Parana basin in southeast Brazil.The results show that the study area consists of three main tectonic domains, which record different episodes of uplift and reactivation of faults. These faults were brittle in character and resulted in multiple generations of fault products as pseudotachylytes and ultracataclasites, foliated cataclasites and fault gouges.Based on geological evidence and fission track data, an uplift of basement rocks and related tectonic subsidence with consequent deposition in the Parana basin were modeled.The reactivations of the basement record successive uplift events during the Phanerozoic dated via corrected fission track ages, at 387 +/- 50 Ma (Ordovician); 193 +/- 19 Ma (Triassic); 142 +/- 18 Ma (Jurassic), 126 +/- 11 Ma (Early Cretaceous); 89 +/- 10 Ma (Late Cretaceous) and 69 +/- 10 Ma (Late Cretaceous). These results indicate differential uplift of tectonic domains of basement units, probably related to Parana basin subsidence. Six major sedimentary units (supersequences) that have been deposited with their bounding unconformities, seem to have a close relationship with the orogenic events during the evolution of southwestern Gondwana. (c) 2005 Elsevier Ltd. All rights reserved.
Resumo:
A 55-year-old man was attacked by a Brazilian tapir (Tapirus terrestris) after surprising and stabbing the animal in his corn plantation. The victim received deep bites in the thighs, neck, and cervical areas, resulting in severe hemorrhage and death. This is the first report of a tapir incident resulting in death and is of interest because of the severity of the contusions and lacerations caused by the provoked animal.
Resumo:
Transformer protection is one of the most challenging applications within the power system protective relay field. Transformers with a capacity rating exceeding 10 MVA are usually protected using differential current relays. Transformers are an aging and vulnerable bottleneck in the present power grid; therefore, quick fault detection and corresponding transformer de-energization is the key element in minimizing transformer damage. Present differential current relays are based on digital signal processing (DSP). They combine DSP phasor estimation and protective-logic-based decision making. The limitations of existing DSP-based differential current relays must be identified to determine the best protection options for sensitive and quick fault detection. The development, implementation, and evaluation of a DSP differential current relay is detailed. The overall goal is to make fault detection faster without compromising secure and safe transformer operation. A detailed background on the DSP differential current relay is provided. Then different DSP phasor estimation filters are implemented and evaluated based on their ability to extract desired frequency components from the measured current signal quickly and accurately. The main focus of the phasor estimation evaluation is to identify the difference between using non-recursive and recursive filtering methods. Then the protective logic of the DSP differential current relay is implemented and required settings made in accordance with transformer application. Finally, the DSP differential current relay will be evaluated using available transformer models within the ATP simulation environment. Recursive filtering methods were found to have significant advantage over non-recursive filtering methods when evaluated individually and when applied in the DSP differential relay. Recursive filtering methods can be up to 50% faster than non-recursive methods, but can cause false trip due to overshoot if the only objective is speed. The relay sensitivity is however independent of filtering method and depends on the settings of the relay’s differential characteristics (pickup threshold and percent slope).
Resumo:
The generator differential protection is one of the most important electrical protections of synchronous generator stator windings. Its operation principle is based on the comparison of the input current and output current at each phase winding. Unwanted trip commands are usually caused by CT saturation, wrong CT selection, or the fact that they may come from different manufacturers. In generators grounded through high impedance, only phase-to-phase or three-phase faults can be detected by the differential protection. This kind of fault causes differential current to flow in, at least, two phases of the winding. Several cases of unwanted trip commands caused by the appearance of differential current in only one phase of the generator have been reported. In this paper multi-phase criterion is proposed for generator differential protection algorithm when applied to high impedance grounded generators.
Resumo:
In a previous examination using natural all-RNA substrates that contained either a 5′-oxy or 5′-thio leaving group at the cleavage site, we demonstrated that (i) the attack by the 2′-oxygen at C17 on the phosphorus atom is the rate-limiting step only for the substrate that contains a 5′-thio group (R11S) and (ii) the departure of the 5′ leaving group is the rate-limiting step for the natural all-RNA substrate (R11O) in both nonenzymatic and hammerhead ribozyme-catalyzed reactions; the energy diagrams for these reactions were provided in our previous publication. In this report we found that the rate of cleavage of R11O by a hammerhead ribozyme was enhanced 14-fold when Mg2+ ions were replaced by Mn2+ ions, whereas the rate of cleavage of R11S was enhanced only 2.2-fold when Mg2+ ions were replaced by Mn2+ ions. This result appears to be exactly the opposite of that predicted from the direct coordination of the metal ion with the leaving 5′-oxygen, because a switch in metal ion specificity was not observed with the 5′-thio substrate. However, our quantitative analyses based on the previously provided energy diagram indicate that this result is in accord with the double-metal-ion mechanism of catalysis.
Resumo:
Grand fir (Abies grandis Lindl.) has been developed as a model system for the study of wound-induced oleoresinosis in conifers as a response to insect attack. Oleoresin is a roughly equal mixture of turpentine (85% monoterpenes [C10] and 15% sesquiterpenes [C15]) and rosin (diterpene [C20] resin acids) that acts to seal wounds and is toxic to both invading insects and their pathogenic fungal symbionts. The dynamic regulation of wound-induced oleoresin formation was studied over 29 d at the enzyme level by in vitro assay of the three classes of synthases directly responsible for the formation of monoterpenes, sesquiterpenes, and diterpenes from the corresponding C10, C15, and C20 prenyl diphosphate precursors, and at the gene level by RNA-blot hybridization using terpene synthase class-directed DNA probes. In overall appearance, the shapes of the time-course curves for all classes of synthase activities are similar, suggesting coordinate formation of all of the terpenoid types. However, closer inspection indicates that the monoterpene synthases arise earlier, as shown by an abbreviated time course over 6 to 48 h. RNA-blot analyses indicated that the genes for all three classes of enzymes are transcriptionally activated in response to wounding, with the monoterpene synthases up-regulated first (transcripts detectable 2 h after wounding), in agreement with the results of cell-free assays of monoterpene synthase activity, followed by the coordinately regulated sesquiterpene synthases and diterpene synthases (transcription beginning on d 3–4). The differential timing in the production of oleoresin components of this defense response is consistent with the immediate formation of monoterpenes to act as insect toxins and their later generation at solvent levels for the mobilization of resin acids responsible for wound sealing.
Resumo:
Coronatine is a phytotoxin produced by some plant-pathogenic bacteria. It has been shown that coronatine mimics the action of methyl jasmonate (MeJA) in plants. MeJA is a plant-signaling molecule involved in stress responses such as wounding and pathogen attack. In Arabidopsis thaliana, MeJA is essential for pollen grain development. The coi1 (for coronatine-insensitive) mutant of Arabidopsis, which is insensitive to coronatine and MeJA, produces sterile male flowers and shows an altered response to wounding. When the differential display technique was used, a message that was rapidly induced by coronatine in wild-type plants but not in coi1 was identified and the corresponding cDNA was cloned. The coronatine-induced gene ATHCOR1 (for A. thaliana coronatine-induced) is expressed in seedlings, mature leaves, flowers, and siliques but was not detected in roots. The expression of this gene was dramatically reduced in coi1 plants, indicating that COI1 affects its expression. ATHCOR1 was rapidly induced by MeJA and wounding in wild-type plants. The sequence of ATHCOR1 shows no strong homology to known proteins. However, the predicted polypeptide contains a conserved amino acid sequence present in several bacterial, animal, and plant hydrolases and includes a potential ATP/GTP-binding-site motif (P-loop).
Resumo:
This study identifies lineaments that indicate fault activity and strengthens previous interpretations of structures within the eastern extent of the Seattle Fault zone in Bellevue, WA. My investigation has compiled geotechnical subsurface data, high-resolution LiDAR imagery, and ground-penetrating radar to produce strip log sections transecting identified lineaments and depth-to-bedrock maps exposing fault structure. My work incorporates field investigation, multiple publicly available datasets, and subsurface modeling. My results include a map showing twenty-eight identified surface lineaments, five strip-log sections, and interpolated depth-to-bedrock and minimum-depth-to-bedrock maps. Several lineaments identified in the minimum-depth-to-bedrock raster are parallel to the Seattle Fault zone and suggest the presence of small splay faults beneath east Bellevue. These results strengthen previous interpretations of seismic profile data located in the study area. Another lineament identified in the minimum-depth-to-bedrock raster suggest an unmapped tear fault accommodating differential offset along fault strike between Mercer Island and Bellevue. This work also demonstrates the utility of publicly available datasets such as geotechnical subsurface explorations and LiDAR imagery in supplementing geologic investigations in the eastern extent of the Seattle Fault zone.
Resumo:
OBJECTIVE: The discipline of clinical neuropsychiatry currently provides specialised services for a number of conditions that cross the traditional boundaries of neurology and psychiatry, including non-epileptic attack disorder. Neurophysiological investigations have an important role within neuropsychiatry services, with video-electroencephalography (EEG) telemetry being the gold standard investigation for the differential diagnosis between epileptic seizures and non-epileptic attacks. This article reviews existing evidence on best practices for neurophysiology investigations, with focus on safety measures for video-EEG telemetry. METHODS: We conducted a systematic literature review using the PubMed database in order to identify the scientific literature on the best practices when using neurophysiological investigations in patients with suspected epileptic seizures or non-epileptic attacks. RESULTS: Specific measures need to be implemented for video-EEG telemetry to be safely and effectively carried out by neuropsychiatry services. A confirmed diagnosis of non-epileptic attack disorder following video-EEG telemetry carried out within neuropsychiatry units has the inherent advantage of allowing diagnosis communication and implementation of treatment strategies in a timely fashion, potentially improving clinical outcomes and cost-effectiveness significantly. CONCLUSION: The identified recommendations set the stage for the development of standardised guidelines to enable neuropsychiatry services to implement streamlined and evidence-based care pathways.