首页 > 最新文献

EPiC series in computing最新文献

英文 中文
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations 针对串行加密实现的多层候选筛
Pub Date : 2021-01-01 DOI: 10.29007/d3gt
Changhai Ou, Fan Zhang, Xinping Zhou, Kexin Qiao, Renjun Zhang
The existing multiple-layer candidate sieve exploits collisions to filter the candidates to achieve a much smaller space for easier key recovery, and tries to recover the key ranking at very deep candidate space. However, it leads to enormous computation yet achieves very low success probability. In this paper, we build a novel Simple Multiple-Layer Sieve (SMLS) from Correlation Power Analysis (CPA) and achieve better performance than the existing one. Furthermore, we build two combined sieves named Two-Layer Stacking Sieve (TLSS) and Full-Layer Stacking Sieve (FLSS) since same operations in serial cryptographic implementation generate similar leakage. The experimental results verify their superiority.
现有的多层候选筛利用碰撞来过滤候选,以实现更小的空间,以便更容易地恢复键,并尝试在非常深的候选空间中恢复键的排名。然而,这种方法计算量巨大,成功概率很低。本文利用相关功率分析(CPA)构建了一种新型的简单多层筛(SMLS),并取得了比现有筛更好的性能。此外,由于串行加密实现中相同的操作会产生相似的泄漏,我们构建了两种组合筛,称为双层堆叠筛(TLSS)和全层堆叠筛(FLSS)。实验结果验证了该方法的优越性。
{"title":"Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations","authors":"Changhai Ou, Fan Zhang, Xinping Zhou, Kexin Qiao, Renjun Zhang","doi":"10.29007/d3gt","DOIUrl":"https://doi.org/10.29007/d3gt","url":null,"abstract":"The existing multiple-layer candidate sieve exploits collisions to filter the candidates to achieve a much smaller space for easier key recovery, and tries to recover the key ranking at very deep candidate space. However, it leads to enormous computation yet achieves very low success probability. In this paper, we build a novel Simple Multiple-Layer Sieve (SMLS) from Correlation Power Analysis (CPA) and achieve better performance than the existing one. Furthermore, we build two combined sieves named Two-Layer Stacking Sieve (TLSS) and Full-Layer Stacking Sieve (FLSS) since same operations in serial cryptographic implementation generate similar leakage. The experimental results verify their superiority.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69432027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Finding Best Linear Codes for Side-Channel Protections 寻找最佳的边信道保护线性码
Pub Date : 2021-01-01 DOI: 10.29007/bnrc
Wei Cheng, Yi Liu, S. Guilley, O. Rioul
Side-channel attacks aim at extracting secret keys from cryptographic devices. Ran- domly masking the implementation is a provable way to protect the secrets against this threat. Recently, various masking schemes have converged to the “code-based masking” philosophy. In code-based masking, different codes allow for different levels of side-channel security. In practice, for a given leakage function, it is important to select the code which enables the best resistance, i.e., which forces the attacker to capture and analyze the largest number of side-channel traces.This paper is a first attempt to address the constructive selection of the optimal codes in the context of side-channel countermeasures, in particular for code-based masking when the device leaks information in the Hamming weight leakage model. We show that the problem is related to the weight enumeration of the extended dual of the masking code. We first present mathematical tools to study those weight enumeration polynomials, and then provide an efficient method to search for good codes, based on a lexicographic sorting of the weight enumeration polynomial from lowest to highest degrees.
侧信道攻击的目的是从加密设备中提取密钥。随机屏蔽实现是一种可证明的保护秘密免受这种威胁的方法。最近,各种掩蔽方案都融合到“基于代码的掩蔽”理念中。在基于代码的掩码中,不同的代码允许不同级别的侧信道安全。在实践中,对于给定的泄漏函数,重要的是选择能够实现最佳抵抗的代码,即迫使攻击者捕获和分析最多数量的侧信道走线。本文首次尝试解决边信道对抗中最优码的建设性选择问题,特别是在汉明权重泄漏模型中设备泄漏信息时基于码的掩蔽问题。我们证明了这个问题与掩码的扩展对偶的权值枚举有关。我们首先提出了研究这些权重枚举多项式的数学工具,然后提供了一种有效的方法来搜索好的代码,该方法基于对权重枚举多项式从最低到最高度的字典排序。
{"title":"Towards Finding Best Linear Codes for Side-Channel Protections","authors":"Wei Cheng, Yi Liu, S. Guilley, O. Rioul","doi":"10.29007/bnrc","DOIUrl":"https://doi.org/10.29007/bnrc","url":null,"abstract":"Side-channel attacks aim at extracting secret keys from cryptographic devices. Ran- domly masking the implementation is a provable way to protect the secrets against this threat. Recently, various masking schemes have converged to the “code-based masking” philosophy. In code-based masking, different codes allow for different levels of side-channel security. In practice, for a given leakage function, it is important to select the code which enables the best resistance, i.e., which forces the attacker to capture and analyze the largest number of side-channel traces.This paper is a first attempt to address the constructive selection of the optimal codes in the context of side-channel countermeasures, in particular for code-based masking when the device leaks information in the Hamming weight leakage model. We show that the problem is related to the weight enumeration of the extended dual of the masking code. We first present mathematical tools to study those weight enumeration polynomials, and then provide an efficient method to search for good codes, based on a lexicographic sorting of the weight enumeration polynomial from lowest to highest degrees.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69430467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Locality Based Cache Side-channel Attack Detection 基于局部性的缓存侧通道攻击检测
Pub Date : 2021-01-01 DOI: 10.29007/vbqt
Limin Wang, Lei Bu, Fu Song
Cryptographic algorithms are fundamental to security. However, it has been shown that secret information could be effectively extracted through monitoring and analyzing the cache side-channel information (i.e., hit and miss) of cryptographic implementations. To mitigate such attacks, a large number of detection-based defenses have been proposed. To the best of our knowledge, almost all of them are achieved by collecting and analyzing hardware performance counter (HPC) data. But these low-level HPC data usually lacks semantic information and is easy to be interfered, which makes it difficult to determine the attack type by analyzing the HPC information only.Actually, the behavior of a cache attack is localized. In certain attack-related steps, the data accesses of cache memory blocks are intensive, while such behavior can be distributed sparsely among different attack steps. Based on this observation, in this paper, we pro- pose the locality-based cache side-channel attack detection method, which combines the low-level HPC running data with the high-level control flow graph (CFG) of the program to achieve locality-guided attack pattern extraction. Then we can use GNN graph clas- sification technology to learn such attack pattern and detect malicious attack programs. The experiments with a corpus of 1200 benchmarks show that our approach can achieve 99.44% accuracy and 99.47% F1-Score with a low performance overhead.
密码算法是安全的基础。然而,研究表明,通过监控和分析加密实现的缓存侧信道信息(即命中和未命中),可以有效地提取秘密信息。为了减轻这种攻击,已经提出了大量基于检测的防御措施。据我们所知,几乎所有这些都是通过收集和分析硬件性能计数器(HPC)数据来实现的。但是这些低级的高性能计算数据通常缺乏语义信息,容易被干扰,这使得仅通过分析高性能计算信息来确定攻击类型变得困难。实际上,缓存攻击的行为是局部的。在某些与攻击相关的步骤中,缓存块的数据访问是密集的,而这种行为可以稀疏地分布在不同的攻击步骤中。基于此,本文提出了基于位置的缓存侧信道攻击检测方法,该方法将低级HPC运行数据与程序的高级控制流图(CFG)相结合,实现位置引导的攻击模式提取。然后利用GNN图分类技术学习这种攻击模式,检测出恶意攻击程序。在1200个基准语料库上的实验表明,我们的方法在较低的性能开销下可以达到99.44%的准确率和99.47%的F1-Score。
{"title":"Locality Based Cache Side-channel Attack Detection","authors":"Limin Wang, Lei Bu, Fu Song","doi":"10.29007/vbqt","DOIUrl":"https://doi.org/10.29007/vbqt","url":null,"abstract":"Cryptographic algorithms are fundamental to security. However, it has been shown that secret information could be effectively extracted through monitoring and analyzing the cache side-channel information (i.e., hit and miss) of cryptographic implementations. To mitigate such attacks, a large number of detection-based defenses have been proposed. To the best of our knowledge, almost all of them are achieved by collecting and analyzing hardware performance counter (HPC) data. But these low-level HPC data usually lacks semantic information and is easy to be interfered, which makes it difficult to determine the attack type by analyzing the HPC information only.Actually, the behavior of a cache attack is localized. In certain attack-related steps, the data accesses of cache memory blocks are intensive, while such behavior can be distributed sparsely among different attack steps. Based on this observation, in this paper, we pro- pose the locality-based cache side-channel attack detection method, which combines the low-level HPC running data with the high-level control flow graph (CFG) of the program to achieve locality-guided attack pattern extraction. Then we can use GNN graph clas- sification technology to learn such attack pattern and detect malicious attack programs. The experiments with a corpus of 1200 benchmarks show that our approach can achieve 99.44% accuracy and 99.47% F1-Score with a low performance overhead.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69451562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
XMSS-based Chain of Trust 基于xmlss的信任链
Pub Date : 2021-01-01 DOI: 10.29007/2fv1
Soundes Marzougui, Jean-Pierre Seifert
Given that large-scale quantum computers can eventually compute discrete logarithm and integer factorization in polynomial time [44], all asymmetric cryptographic schemes will break down. Hence, replacing them becomes mandatory. For this purpose, the Na- tional Institute of Standards and Technology (NIST) initiated a standardization process for post-quantum schemes. These schemes are supposed to substitute classical cryptography in different use-cases, such as client-server authentication during the TLS handshake. How- ever, their signatures, public key sizes, and signature verification time impose difficulty, especially for resource-constrained devices. In this paper, we improve the TLS hand- shake performance relying on post-quantum signatures by combining the XMSS and the Dilithium signature schemes along the chain of certificates. We provide proof-of-concept implementation of our solution by integrating the two signature schemes in the WolfSSL library. Moreover, we evaluate the performance of our solution and establish that it re- duces the signature verification time considerably and minimizes the size of the chain of trust. We provide a security proof of the proposed chain of trust which is relies on the security of the XMSS scheme.
考虑到大规模量子计算机最终可以在多项式时间[44]内计算离散对数和整数分解,所有非对称密码方案都将崩溃。因此,必须更换它们。为此,国家标准与技术研究所(NIST)启动了后量子方案的标准化过程。这些方案应该在不同的用例中替代经典加密,例如在TLS握手期间的客户机-服务器身份验证。然而,它们的签名、公钥大小和签名验证时间带来了困难,特别是对于资源受限的设备。本文通过在证书链上结合XMSS和Dilithium签名方案,改进了依赖后量子签名的TLS握手性能。我们通过在WolfSSL库中集成两个签名方案来提供我们解决方案的概念验证实现。此外,我们评估了我们的解决方案的性能,并确定它大大减少了签名验证时间,并最小化了信任链的大小。我们提供了基于XMSS方案安全性的信任链的安全性证明。
{"title":"XMSS-based Chain of Trust","authors":"Soundes Marzougui, Jean-Pierre Seifert","doi":"10.29007/2fv1","DOIUrl":"https://doi.org/10.29007/2fv1","url":null,"abstract":"Given that large-scale quantum computers can eventually compute discrete logarithm and integer factorization in polynomial time [44], all asymmetric cryptographic schemes will break down. Hence, replacing them becomes mandatory. For this purpose, the Na- tional Institute of Standards and Technology (NIST) initiated a standardization process for post-quantum schemes. These schemes are supposed to substitute classical cryptography in different use-cases, such as client-server authentication during the TLS handshake. How- ever, their signatures, public key sizes, and signature verification time impose difficulty, especially for resource-constrained devices. In this paper, we improve the TLS hand- shake performance relying on post-quantum signatures by combining the XMSS and the Dilithium signature schemes along the chain of certificates. We provide proof-of-concept implementation of our solution by integrating the two signature schemes in the WolfSSL library. Moreover, we evaluate the performance of our solution and establish that it re- duces the signature verification time considerably and minimizes the size of the chain of trust. We provide a security proof of the proposed chain of trust which is relies on the security of the XMSS scheme.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69420960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Look at Codon Usage and Protein Expression. 密码子使用和蛋白质表达的新视角。
Pub Date : 2019-03-18 DOI: 10.29007/d4tz
Gabriel Wright, A. Rodríguez, P. Clark, S. Emrich
%MinMax, a model of intra-gene translational elongation rate, relies on codon usage frequencies. Historically, %MinMax has used tables that measure codon usage bias for all genes in an organism, such as those found at HIVE-CUT. In this paper, we provide evidence that codon usage bias based on all genes is insufficient to accurately measure absolute translation rate. We show that alternative "High-ϕ" codon usage tables, generated by another model (ROC-SEMPPR), are a promising alternative. By creating a hybrid model, future codon usage analyses and their applications (e.g., codon harmonization) are likely to more accurately measure the "tempo" of translation elongation. We also suggest a High-ϕ alternative to the Codon Adaptation Index (CAI), a classic metric of codon usage bias based on highly expressed genes. Significantly, our new alternative is equally well correlated with empirical data as traditional CAI without using experimentally determined expression counts as input.
%基因内翻译延伸率模型MinMax依赖于密码子使用频率。从历史上看,%MinMax使用了测量生物体中所有基因密码子使用偏差的表格,例如在HIVE-CUT中发现的表格。在本文中,我们提供的证据表明,基于所有基因的密码子使用偏差不足以准确测量绝对翻译率。我们表明,由另一个模型(ROC-SEMPPR)生成的替代“高”密码子使用表是一个很有前途的替代方案。通过创建一个混合模型,未来的密码子使用分析及其应用(例如密码子协调)可能会更准确地测量翻译延伸的“节奏”。我们还提出了密码子适应指数(CAI)的高-ξ替代方案,这是一种基于高表达基因的密码子使用偏差的经典指标。值得注意的是,我们的新替代方案与经验数据的相关性与传统CAI一样好,而不使用实验确定的表达式计数作为输入。
{"title":"A New Look at Codon Usage and Protein Expression.","authors":"Gabriel Wright, A. Rodríguez, P. Clark, S. Emrich","doi":"10.29007/d4tz","DOIUrl":"https://doi.org/10.29007/d4tz","url":null,"abstract":"%MinMax, a model of intra-gene translational elongation rate, relies on codon usage frequencies. Historically, %MinMax has used tables that measure codon usage bias for all genes in an organism, such as those found at HIVE-CUT. In this paper, we provide evidence that codon usage bias based on all genes is insufficient to accurately measure absolute translation rate. We show that alternative \"High-ϕ\" codon usage tables, generated by another model (ROC-SEMPPR), are a promising alternative. By creating a hybrid model, future codon usage analyses and their applications (e.g., codon harmonization) are likely to more accurately measure the \"tempo\" of translation elongation. We also suggest a High-ϕ alternative to the Codon Adaptation Index (CAI), a classic metric of codon usage bias based on highly expressed genes. Significantly, our new alternative is equally well correlated with empirical data as traditional CAI without using experimentally determined expression counts as input.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"60 1","pages":"104-112"},"PeriodicalIF":0.0,"publicationDate":"2019-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48325259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blackbox Testing on the ReVAMP Results of The DutaTani Agricultural Information System 杜塔塔尼农业信息系统改造结果的黑盒测试
Pub Date : 1900-01-01 DOI: 10.29007/1sx8
Lukas Chrisantyo, Argo Wibowo, Maria Nila Anggiarini, Antonius Rachmat Chrismanto
Information technology continues to evolve unceasingly. In line with the evolvement, agricultural sciences also transform the sense of technology utilization in its information systems to improve its quality and service. The Government of Indonesia strongly supports the use of information system technology in agriculture. DutaTani research team has consistently developed Agricultural Information System (AIS) technology since 2016 to achieve precision agriculture. These developments must be followed by continuous improvement of information systems carried out sustainably following changes and developments in the technology used. Testing is sorely needed in the system repair phase so that changes or improvements do not cause conflicts or problems in any pre-existing functions. The number of technologies that are tried to be applied in the repair phase tends to cause high system failures when they are tested on users. Based on these problems, this study aims to implement Blackbox testing to increase the system's success rate before general users utilize it. Blackbox testing is considered capable of bridging the development team and random respondents representing general users later. This research also added iterations to increase the success rate of the system. Respondents are invited to use the system through several main scenarios, but they have to fill in the input with variables that they have never filled in before. Through several iterations and following a test scenario created by an independent test team with ten random respondents, this study increased the system's success rate by 11.79%.
信息技术不断发展。与此同时,农业科学也在转变其信息系统中的技术利用意识,以提高其质量和服务水平。印度尼西亚政府大力支持在农业中使用信息系统技术。杜塔塔尼研究团队从2016年开始持续开发农业信息系统(AIS)技术,以实现精准农业。在这些发展之后,必须根据所使用技术的变化和发展持续不断地改进信息系统。在系统修复阶段非常需要测试,以便更改或改进不会在任何预先存在的功能中引起冲突或问题。试图在修复阶段应用的技术数量往往会在对用户进行测试时导致高系统故障。基于这些问题,本研究旨在实现黑盒测试,以提高系统在普通用户使用之前的成功率。黑盒测试被认为能够连接开发团队和代表一般用户的随机回答者。本研究还增加了迭代,以提高系统的成功率。受访者被邀请通过几个主要场景来使用该系统,但他们必须填写以前从未填写过的变量。通过几次迭代,并遵循由一个独立的测试团队与十个随机应答者创建的测试场景,该研究将系统的成功率提高了11.79%。
{"title":"Blackbox Testing on the ReVAMP Results of The DutaTani Agricultural Information System","authors":"Lukas Chrisantyo, Argo Wibowo, Maria Nila Anggiarini, Antonius Rachmat Chrismanto","doi":"10.29007/1sx8","DOIUrl":"https://doi.org/10.29007/1sx8","url":null,"abstract":"Information technology continues to evolve unceasingly. In line with the evolvement, agricultural sciences also transform the sense of technology utilization in its information systems to improve its quality and service. The Government of Indonesia strongly supports the use of information system technology in agriculture. DutaTani research team has consistently developed Agricultural Information System (AIS) technology since 2016 to achieve precision agriculture. These developments must be followed by continuous improvement of information systems carried out sustainably following changes and developments in the technology used. Testing is sorely needed in the system repair phase so that changes or improvements do not cause conflicts or problems in any pre-existing functions. The number of technologies that are tried to be applied in the repair phase tends to cause high system failures when they are tested on users. Based on these problems, this study aims to implement Blackbox testing to increase the system's success rate before general users utilize it. Blackbox testing is considered capable of bridging the development team and random respondents representing general users later. This research also added iterations to increase the success rate of the system. Respondents are invited to use the system through several main scenarios, but they have to fill in the input with variables that they have never filled in before. Through several iterations and following a test scenario created by an independent test team with ten random respondents, this study increased the system's success rate by 11.79%.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69420547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-Quantum Cryptography: An Introductory Overview and Implementation Challenges of Quantum-Resistant Algorithms 后量子密码学:量子抵抗算法的概述和实现挑战
Pub Date : 1900-01-01 DOI: 10.29007/2tpw
Sherdel A. Käppler, Bettina Schneider
Cryptographic algorithms are an essential measure to ensure confidentiality and integrity of internet communication. The development of quantum computers (QCs) and their potential to utilize Shor’s Law, is increasingly recognized as a threat to asymmetric cryptography. In response, post-quantum cryptography (PQC) is gaining prominence as a notable field of research aiming to standardize quantum resistant algorithms before the operational usage of QCs. This paper is addressed to people with preliminary knowledge in the field of cryptography and QC. Based on a literature review, the authors provide an overview of challenges faced by the research community and elaborate the advancements in addressing post-quantum threats. A migration strategy from classical cryptosystems to PQC systems is in development, but obstacles such as time constraints and improper implementation complicate the process. Full implementation could take a decade or more. Until then, our paper aims to create awareness for potential challenges when transitioning towards PQC. As categorization scheme for these potential obstacles, we refer to a well- established model in cybersecurity – the McCumber Cube. Conclusions embrace preparing for risks of improper implementation and deriving a multi-step migration. Special attention is expected to be needed for data migration of existing data sets. As a request for future research in PQC, the authors identified the process of implementing post-cryptography standards, e.g., from the National Institute of Standards and Technology (NIST), and an assessment of the perceived readiness of industry to adapt.
加密算法是保证网络通信保密性和完整性的重要手段。量子计算机的发展及其利用肖尔定律的潜力,越来越被认为是对非对称密码学的威胁。因此,后量子密码学(PQC)作为一个值得关注的研究领域正日益突出,其目的是在量子密码学的操作使用之前对量子抵抗算法进行标准化。本文是写给在密码学和QC领域有初步知识的人。在文献综述的基础上,作者概述了研究界面临的挑战,并详细阐述了应对后量子威胁的进展。从经典密码系统到PQC系统的迁移策略正在开发中,但时间限制和不适当的实现等障碍使这一过程复杂化。全面实施可能需要10年甚至更长时间。在此之前,我们的论文旨在提高人们对向PQC过渡时潜在挑战的认识。作为这些潜在障碍的分类方案,我们参考了网络安全中一个完善的模型——麦坎伯立方体。结论包括为不适当实现的风险做好准备,并推导出多步骤迁移。预计需要特别注意现有数据集的数据迁移。作为对PQC未来研究的要求,作者确定了实施后加密标准的过程,例如来自国家标准与技术研究所(NIST),并评估了工业适应的感知准备情况。
{"title":"Post-Quantum Cryptography: An Introductory Overview and Implementation Challenges of Quantum-Resistant Algorithms","authors":"Sherdel A. Käppler, Bettina Schneider","doi":"10.29007/2tpw","DOIUrl":"https://doi.org/10.29007/2tpw","url":null,"abstract":"Cryptographic algorithms are an essential measure to ensure confidentiality and integrity of internet communication. The development of quantum computers (QCs) and their potential to utilize Shor’s Law, is increasingly recognized as a threat to asymmetric cryptography. In response, post-quantum cryptography (PQC) is gaining prominence as a notable field of research aiming to standardize quantum resistant algorithms before the operational usage of QCs. This paper is addressed to people with preliminary knowledge in the field of cryptography and QC. Based on a literature review, the authors provide an overview of challenges faced by the research community and elaborate the advancements in addressing post-quantum threats. A migration strategy from classical cryptosystems to PQC systems is in development, but obstacles such as time constraints and improper implementation complicate the process. Full implementation could take a decade or more. Until then, our paper aims to create awareness for potential challenges when transitioning towards PQC. As categorization scheme for these potential obstacles, we refer to a well- established model in cybersecurity – the McCumber Cube. Conclusions embrace preparing for risks of improper implementation and deriving a multi-step migration. Special attention is expected to be needed for data migration of existing data sets. As a request for future research in PQC, the authors identified the process of implementing post-cryptography standards, e.g., from the National Institute of Standards and Technology (NIST), and an assessment of the perceived readiness of industry to adapt.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69420636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transmembrane Protein Inter-Helical Residue Contacts Prediction Using Transductive Support Vector Machines 基于转导支持向量机的跨膜蛋白螺旋残基接触预测
Pub Date : 1900-01-01 DOI: 10.29007/3ztg
Bander Almalki, Aman Sawhney, Li Liao
Protein functions are strongly related to their 3D structure. Therefore, it is crucial to identify their structure to understand how they behave. Studies have shown that numerous numbers of proteins cross a biological membrane, called Transmembrane (TM) proteins, and many of them adopt alpha helices shape. Unlike the current contact prediction methods that use inductive learning to predict transmembrane protein inter-helical residues contact, we adopt a transductive learning approach. The idea of transductive learning can be very useful when the test set is much bigger than the training set, which is usually the case in amino acids residues contacts prediction. We test this approach on a set of transmembrane protein sequences to identify helix-helix residues contacts, compare transductive and inductive approaches, and identify conditions and limitations where TSVM outperforms inductive SVM. In addition, we investigate the performance degradation of the traditional TSVM and explore the proposed solutions in the literature. Moreover, we propose an early stop technique that can outperform the state of art TSVM and produce a more accurate prediction.
蛋白质的功能与其三维结构密切相关。因此,确定它们的结构以了解它们的行为是至关重要的。研究表明,大量的蛋白质跨越生物膜,称为跨膜(TM)蛋白质,其中许多采用α螺旋形状。与目前使用归纳学习来预测跨膜蛋白螺旋间残基接触的接触预测方法不同,我们采用了转导学习方法。当测试集比训练集大得多时,转导学习的思想非常有用,这通常是氨基酸残基接触预测的情况。我们在一组跨膜蛋白序列上测试了这种方法,以识别螺旋-螺旋残基接触,比较转导和诱导方法,并确定TSVM优于诱导支持向量机的条件和限制。此外,我们还研究了传统TSVM的性能下降,并探讨了文献中提出的解决方案。此外,我们提出了一种早期停止技术,该技术可以优于最先进的TSVM,并产生更准确的预测。
{"title":"Transmembrane Protein Inter-Helical Residue Contacts Prediction Using Transductive Support Vector Machines","authors":"Bander Almalki, Aman Sawhney, Li Liao","doi":"10.29007/3ztg","DOIUrl":"https://doi.org/10.29007/3ztg","url":null,"abstract":"Protein functions are strongly related to their 3D structure. Therefore, it is crucial to identify their structure to understand how they behave. Studies have shown that numerous numbers of proteins cross a biological membrane, called Transmembrane (TM) proteins, and many of them adopt alpha helices shape. Unlike the current contact prediction methods that use inductive learning to predict transmembrane protein inter-helical residues contact, we adopt a transductive learning approach. The idea of transductive learning can be very useful when the test set is much bigger than the training set, which is usually the case in amino acids residues contacts prediction. We test this approach on a set of transmembrane protein sequences to identify helix-helix residues contacts, compare transductive and inductive approaches, and identify conditions and limitations where TSVM outperforms inductive SVM. In addition, we investigate the performance degradation of the traditional TSVM and explore the proposed solutions in the literature. Moreover, we propose an early stop technique that can outperform the state of art TSVM and produce a more accurate prediction.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69421339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges of Software Engineering in Computational Biology and Bioinformatics Scientific Software Projects 软件工程在计算生物学和生物信息学科学软件项目中的挑战
Pub Date : 1900-01-01 DOI: 10.29007/3q66
Tamer Aldwairi
Computational biology scientific software projects are continuously growing and the volume and the task of analyzing, designing, implementing, testing, and maintaining these projects to ensure high-quality software products are only getting harder and more complicated. Conventional software development methodologies are not sufficient in ensuring that scientific software is error-free or up to the standard or comparable to the software designed in the industry. For this reason, it is important to investigate projects that utilized the best software engineering practices during their development and find and understand the problems that arise during the development of those projects. Such understanding will serve as the first step in the process of developing high-quality software products and will enable us to design and propose solutions to the problems that commonly occur during the development of such projects. In this paper, we will discuss different studies that applied software engineering practices and approaches in their computational biology projects. The challenges they encountered and the benefits they gained from employing software engineering quality assurance and testing techniques. In addition, we will demonstrate some of our own experiences when designing, developing, and testing computational biology projects within academic settings. We will also present, based on our experience, some solutions, methodologies, and practices that when adopted will benefit the scientific computational biology software community throughout the process of designing and testing the software.
计算生物学科学软件项目不断增长,分析、设计、实现、测试和维护这些项目以确保高质量软件产品的数量和任务只会变得越来越困难和复杂。传统的软件开发方法不足以确保科学软件没有错误或达到标准或与工业中设计的软件相媲美。由于这个原因,调查那些在开发过程中使用了最佳软件工程实践的项目,发现并理解在这些项目的开发过程中出现的问题是很重要的。这种理解将作为开发高质量软件产品过程中的第一步,并将使我们能够设计并提出解决此类项目开发过程中经常出现的问题的方案。在本文中,我们将讨论在计算生物学项目中应用软件工程实践和方法的不同研究。他们遇到的挑战和他们从使用软件工程质量保证和测试技术中获得的好处。此外,我们将展示一些我们自己的经验时,设计,开发,并在学术环境中测试计算生物学项目。我们还将根据我们的经验,提出一些解决方案、方法和实践,当这些解决方案、方法和实践被采用时,将在整个软件设计和测试过程中有益于科学计算生物学软件社区。
{"title":"Challenges of Software Engineering in Computational Biology and Bioinformatics Scientific Software Projects","authors":"Tamer Aldwairi","doi":"10.29007/3q66","DOIUrl":"https://doi.org/10.29007/3q66","url":null,"abstract":"Computational biology scientific software projects are continuously growing and the volume and the task of analyzing, designing, implementing, testing, and maintaining these projects to ensure high-quality software products are only getting harder and more complicated. Conventional software development methodologies are not sufficient in ensuring that scientific software is error-free or up to the standard or comparable to the software designed in the industry. For this reason, it is important to investigate projects that utilized the best software engineering practices during their development and find and understand the problems that arise during the development of those projects. Such understanding will serve as the first step in the process of developing high-quality software products and will enable us to design and propose solutions to the problems that commonly occur during the development of such projects. In this paper, we will discuss different studies that applied software engineering practices and approaches in their computational biology projects. The challenges they encountered and the benefits they gained from employing software engineering quality assurance and testing techniques. In addition, we will demonstrate some of our own experiences when designing, developing, and testing computational biology projects within academic settings. We will also present, based on our experience, some solutions, methodologies, and practices that when adopted will benefit the scientific computational biology software community throughout the process of designing and testing the software.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69421452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Bucket-Based Data Pre-Processing Method for Encrypted Video Detection 一种基于桶的加密视频检测数据预处理方法
Pub Date : 1900-01-01 DOI: 10.29007/4rnp
Waleed Afandi, S. M. A. H. Bukhari, M. U. Khan, Tahir Maqsood, S. Khan
As the number of video streaming platforms is growing, the risk factor associated with illegal and inappropriate content streaming is increasing exponentially. Therefore, mon- itoring such content is essential. Many researches have been conducted on classifying encrypted videos. However, most existing techniques only pass raw traffic data into clas- sification models, which is an ineffective way of training a model. This research proposes a bucket-based data pre-processing technique for a video identification in network traffic. The bucketed traffic is then incorporated with a fine-tuned word2vec-based neural net- work to produce an effective encrypted video classifier. Experiments are carried out with different numbers and sizes of buckets to determine the best configuration. Furthermore, previous research has overlooked the phenomenon of concept drift, which reduces the effec- tiveness of a model. This paper also compares the severity of concept drift on the proposed and previous technique. The results indicate that the model can predict new samples of videos with an overall accuracy of 81% even after 20 days of training.
随着视频流媒体平台数量的增加,与非法和不适当内容流相关的风险因素呈指数级增长。因此,监测这些内容是必不可少的。对于加密视频的分类,人们进行了大量的研究。然而,大多数现有的技术只是将原始交通数据传递到分类模型中,这是一种无效的模型训练方法。提出了一种基于桶的网络流量视频识别数据预处理技术。然后,将桶状流量与经过微调的基于word2vec的神经网络结合起来,产生有效的加密视频分类器。采用不同数量和尺寸的桶进行实验,以确定最佳配置。此外,以往的研究忽略了概念漂移现象,这降低了模型的有效性。本文还比较了所提出的技术和以前的技术的概念漂移的严重程度。结果表明,即使经过20天的训练,该模型也能以81%的总体准确率预测视频的新样本。
{"title":"A Bucket-Based Data Pre-Processing Method for Encrypted Video Detection","authors":"Waleed Afandi, S. M. A. H. Bukhari, M. U. Khan, Tahir Maqsood, S. Khan","doi":"10.29007/4rnp","DOIUrl":"https://doi.org/10.29007/4rnp","url":null,"abstract":"As the number of video streaming platforms is growing, the risk factor associated with illegal and inappropriate content streaming is increasing exponentially. Therefore, mon- itoring such content is essential. Many researches have been conducted on classifying encrypted videos. However, most existing techniques only pass raw traffic data into clas- sification models, which is an ineffective way of training a model. This research proposes a bucket-based data pre-processing technique for a video identification in network traffic. The bucketed traffic is then incorporated with a fine-tuned word2vec-based neural net- work to produce an effective encrypted video classifier. Experiments are carried out with different numbers and sizes of buckets to determine the best configuration. Furthermore, previous research has overlooked the phenomenon of concept drift, which reduces the effec- tiveness of a model. This paper also compares the severity of concept drift on the proposed and previous technique. The results indicate that the model can predict new samples of videos with an overall accuracy of 81% even after 20 days of training.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69422000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
EPiC series in computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1