In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to collect the physical information leaked by the devices where the cipher system is implemented on, such as running time, power consumption, electromagnetic radiation, etc. Our model is very robust as it does not depend on the kind of physical information leaked by the devices. We also prove that in the case of one-time pad encryption, we can strengthen the secrecy/security of the cipher system by using an appropriate affine encoder. More precisely, we prove that for any distribution of the secret keys and any measurement device used for collecting the physical information, we can derive an achievable rate region for reliability and security such that if we compress the ciphertext using an affine encoder with a rate within the achievable rate region, then: (1) anyone with a secret key will be able to decrypt and decode the ciphertext correctly, but (2) any adversary who obtains the ciphertext and also the side physical information will not be able to obtain any information about the hidden source as long as the leaked physical information is encoded with a rate within the rate region. We derive our result by adapting the framework of the one helper source coding problem posed and investigated by Ahlswede and Körner (1975) and Wyner (1975). For reliability and security, we obtain our result by combining the result of Csizár (1982) on universal coding for a single source using linear codes and the exponential strong converse theorem of Oohama (2015) for the one helper source coding problem.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514958 | PMC |
http://dx.doi.org/10.3390/e21050469 | DOI Listing |
Sci Rep
January 2025
Department of Mathematics, College of Science, King Khalid, University, Abha, 61413, Saudi Arabia.
Algebraic structures play a vital role in securing important data. These structures are utilized to construct the non-linear components of block ciphers. Since constructing non-linear components through algebraic structures is crucial for the confusion aspects of encryption schemes, relying solely on these structures can result in limited key spaces.
View Article and Find Full Text PDFJ Rural Health
January 2025
Department of Medical Education and Clinical Sciences, Elson S. Floyd College of Medicine, Washington State University, Spokane, Washington, USA.
Introduction: The objective of this scoping review is to identify interventions to promote well-being that have been tried or proven effective to prevent or address burnout in rural health care professionals and trainees (HCPTs). Secondarily, we aimed to identify potentially applicable and feasible well-being interventions that could help rural HCPTs.
Methods And Analysis: We used PRISMA guidelines to conduct a scoping review of peer-reviewed English language studies, from all countries, published in core health sciences databases.
J Am Acad Dermatol
December 2024
Department of Dermatology, University of California, San Francisco, California.
Background: Hidradenitis suppurativa (HS) affects different patient populations that require unique considerations in their management. However, no HS guidelines for these populations exist.
Objective: To provide evidence-based consensus recommendations for patients with HS in 7 special patient populations: (i) pregnancy, (ii) breastfeeding, (iii) pediatrics, (iv) malignancy, (v) tuberculosis infection, (vi) hepatitis B or C infection, and (vii) HIV disease.
PeerJ Comput Sci
November 2024
Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, Shanghai, North Zhongshan Road, China.
At CRYPTO 2019, Gohr pioneered the application of deep learning to differential cryptanalysis and successfully attacked the 11-round NSA block cipher Speck32/64 with a 7-round and an 8-round single-key differential neural distinguisher. Subsequently, Lu et al. (DOI 10.
View Article and Find Full Text PDFBiomedicines
November 2024
Department of Biomedical Sciences, College of Dental Medicine, Lincoln Memorial University, Knoxville, TN 37923, USA.
Autophagy is an intrinsic breakdown system that recycles organelles and macromolecules, which influences metabolic pathways, differentiation, and thereby cell survival. Oral health is an essential component of integrated well-being, and it is critical for developing therapeutic interventions to understand the molecular mechanisms underlying the maintenance of oral homeostasis. However, because of the complex dynamic relationship between autophagy and oral health, associated treatment modalities have not yet been well elucidated.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!