Mobile Learning Anytime Everywhere

Total Page:16

File Type:pdf, Size:1020Kb

Mobile Learning Anytime Everywhere Mobilelearning anytime everywhere A book of papers from MLEARN 2004 Edited by Jill Attewell and Carol Savill-Smith MLEARN 2 0 04 Mobilelearning anytime everywhere A book of papers from MLEARN 2004 Edited by Jill Attewell and Carol Savill-Smith MLEARN 2 0 04 Published by the Learning and Skills Development Agency www.LSDA.org.uk Registered with the Charity Commissioners LSDA is committed to providing publications that are accessible to all. To request additional copies of this publication or a different format please contact: Information Services Learning and Skills Development Agency Regent Arcade House 19–25 Argyll Street London W1F 7LS UK Tel +44 (0)20 7297 9144 Fax +44 (0)20 7297 9242 [email protected] Copyeditors: Helen Lund and Susannah Wight Designer: David Shaw and associates Outside front cover photograph: Creatas Images Printer: Blackmore Ltd, Shaftesbury, Dorset CIMS 052232SP/10/05/1800 ISBN 1–84572–344–9 © Learning and Skills Development Agency 2005 You are welcome to copy this publication for internal use within your organisation. Otherwise, no part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, electrical, chemical, optical, photocopying, recording or otherwise, without prior written permission of the copyright owner. Further information For further information about the issues discussed in this publication please contact: Jill Attewell Manager, Technology Enhanced Learning Research Centre Learning and Skills Development Agency Tel +44 (0)20 7297 9100 [email protected] The m-learning project and this publication were supported by the Learning and Skills Council as part of a grant to the Learning and Skills Development Agency for a programme of research and development. The m-learning project was supported by the European Commission Information Society and Media Directorate-General (IST 2000-25270). Contents Acknowledgements Foreword Introduction 1 MLEARN 2004 conference papers Using learning theories to design instruction for mobile learning devices 5 Mohamed Ally JELD, the Java Environment for Learning Design 9 Marco Arrigo, Manuel Gentile and Davide Taibi mCLT: an application for collaborative learning on a mobile telephone 11 Marco Arrigo, Manuel Gentile, Davide Taibi, Giorgio Chiappone and Domenico Tegolo Engaging and supporting mobile learners 15 Jill Attewell and Tamatha Webster Mobile learning in the retail trade: TransmobiLE 21 (EU-funded Leonardo da Vinci II pilot project) Artur Barth and Gottfried Kreis Wireless learning community hub 23 Russell Beale Integrating situated interaction with mobile awareness 25 Russell Beale and Matthew Jones Multimedia m-learning using mobile phones 27 Kuderna-Iulian Benta, Marcel Cremene and Razvan Padurean Finding the appropriate learning objects: 29 human, mobility, and community issues Andrew Brasher Development of a research plan for use of ambient technology 33 to test mobile learning theories Andrew Brasher and Josie Taylor Interactive Logbook: the development of an application to enhance 39 and facilitate collaborative working within groups in higher education Susan Bull, Larry Bridgefoot, Daniel Corlett, Paul Kiddie, Tom Marianczak, Chet Mistry, Neil Sandle, Mike Sharples and Daniel Williams Determining location in context-aware mobile learning 43 Will Byrne, Peter Lonsdale, Mike Sharples, Chris Baber, Theodoros N Arvanitis, Pat Brundell and Russell Beale The impact of innovation in medical and nursing training: 47 a Hospital Information System for Students (HISS) accessible through mobile devices Filippo Cacace, Maria Cinque, Michele Crudele, Giulio Iannello and Marco Venditti A system for adaptive platform-independent mobile learning 53 Nicola Capuano, Matteo Gaeta, Sergio Miranda and Laura Pappacena Mobile learning = collaboration 57 Jo Colley and Geoff Stead Tablet technology for informal collaboration in higher education 59 Dan Corlett and Mike Sharples The role of user scenarios as the central piece of 63 the development jigsaw puzzle Diane Evans and Josie Taylor Team awareness in personalised learning environments 67 Alois Ferscha, Clemens Holzmann and Stefan Oppl M-learning: an educational perspective 73 Johan B Freysen Mobile vision for ambient learning in urban environments 77 Gerald Fritz, Christin Seifert, Patrick Luley, Lucas Paletta and Alexander Almer Mobile learning in tomorrow’s education for MBA students 81 Dirk Frohberg Learning and collaborating using mobile devices and sessions 85 Michael Gardner, Hui-Na Chua and Anuroop Shahi From virtual cooperation to distance learning: 89 realising remote multimedia platforms on a QoS-enabled network Stefano Giordano, Gianluca Insolvibile, Valentina Chionsini and Pietro Polese Requirements for mobile learning games shown on 95 a mobile game prototype Christoph Göth, Urs-Peter Häss and Gerhard Schwabe A community of practice? The Toshiba Ambassador programme 101 Bob Harrison PaperLinks – linking printouts to mobile devices 105 Martin Hitz and Stefan Plattner Adaptive mobile learning systems – 109 the essential issues from the design perspective Anu Jäppinen, Mikko Ahonen, Teija Vainio and Erika Tanhua-Piiroinen Building a wireless learning management system 113 Ann Jeffery and Keith Webb Context awareness for MOBIlearn: creating an 115 engaging learning experience in an art museum Peter Lonsdale, Chris Baber, Mike Sharples, Will Byrne, Theodoros N Arvanitis, Pat Brundell and Russell Beale THE MOTFAL project: mobile technologies for ad hoc learning 119 Eleni Malliou, Stavros Savvas, Sofoklis Sotiriou, Antonis Miliarakis and Manolis Stratakis Providing quality of service (QoS) guarantees for 123 e-learning applications over IP networks: the MOICANE project Riccardo Mazza, Enrico Roddolo, Gianmarco Panza and Enrico Balatti eduSource Canada: learning object repositories and m-learning 127 Rory McGreal Interactivity in a large class using wireless devices 129 Fabrice Mercier, Bertrand David, René Chalon and Jean-Pierre Berthet mLab: handheld assisted laboratory 133 Jelena Miti´c, Markus Feisst and Andreas Christ Collaborative m-learning using agents and virtual reality 135 Teresa Monahan, Gavin McArdle, John Kilbride, Eleni Mangina and Michela Bertolotto A new model for the m-learning emergency scenario in risk contexts: 139 the emergency operator Anna Moreno and Sergio Grande MOBIlearn user trials on the museum scenario: 143 the first results of preparatory work Elena Murelli and Giorgio Da Bormida How can one effectively assess students working in 149 a collaborative mobile environment on an individual basis? Caoimhin O’Nuallain and Attracta Brennan A case study on the future options for mobile workplace learning 153 Marika Pehkonen and Hanne Murto (née Turunen) Approaches to just-in-time learning with mobile phones: 157 a case study of support for tourists’ language needs Anita Pincas Mobile lessons: concept and applications for 163 ‘on-site’ geo-referenced lessons Antonio Pintus, Davide Carboni, Gavino Paddeu, Andrea Piras and Stefano Sanna m-learning via the web: the challenge of size 167 Kris Popat and Geoff Stead E-learning to m-learning: an investigation into the potential 171 for content conversion Leon Rodin Educational content anytime, anywhere on any device 177 Gerard Smyth Blended learning, mobility and retention: 183 supporting first-year university students with appropriate technology Andy Stone HistoBrick: utilising J2ME to enable students to use mobile phones 187 for game-based learning on descriptive statistics Georg Ströhlein Evaluation of the technical and pedagogical mobile usability 191 Antti Syvänen and Petri Nokelainen A mobile interactive guide to the Museo Diocesano di Catania: 197 how to ‘open’ the Museo using PDAs Dr Carlo Tognoni The shift to seamless augmentation and ‘humane’ applications 201 via mobile/wireless devices: a view to a future for lifelong learning David C Traub Mobile learning – the ethical and legal challenges 203 John Traxler and Nell Bridges Implementing mobile technology as part of the 209 multimode (blended) teaching and learning academic strategy @ the Tshwane University of Technology Prof H J van der Merwe A study of mobile learning as part of everyday learning 211 Giasemi N Vavoula, Mike Sharples, Claire O’Malley and Josie Taylor Using mobile phones and pocket PCs for creating, delivering 213 and retrieving content on the fly, based on mobile web browsers Daniel Weiss International Workshop on Mobile Learning for Emergency Management (MLEM) papers A mobile first aid training system for training doctors 217 in stabilising casualties on site Verner Andersen Management of novel situations through mobile learning resources 221 Claudio Balducelli Logistics and medical support for isolated, mobile 227 and disaster situations: the I–DISCARE concept Eli Larsen, Antonio Bove and Bernard Comet Author index 231 Acknowledgements MLEARN 2004 conference chairs Terry Keefe Giorgio Da Bormida ICT Research and Development MOBIlearn project coordinator Ufi/learndirect, UK Jill Attewell Prof Michael Kelleher m-learning project coordinator Learning Futures Ltd, UK Professor Mike Sharples Prof Gabriele Kotsis University of Birmingham Johannes Kepler Universität Linz, Austria Dr Eelco Kruizinga The Conference Programme Committee CIBIT Consultants, the Netherlands Dr Theodoros N Arvanitis Dr Paul Lefrere MOBIlearn project, University of Birmingham, UK executive director, eLearning Jill Attewell Microsoft Education Solutions Group EMEA, UK m-learning project coordinator, Learning and Skills Prof
Recommended publications
  • A Quantitative Study of Advanced Encryption Standard Performance
    United States Military Academy USMA Digital Commons West Point ETD 12-2018 A Quantitative Study of Advanced Encryption Standard Performance as it Relates to Cryptographic Attack Feasibility Daniel Hawthorne United States Military Academy, [email protected] Follow this and additional works at: https://digitalcommons.usmalibrary.org/faculty_etd Part of the Information Security Commons Recommended Citation Hawthorne, Daniel, "A Quantitative Study of Advanced Encryption Standard Performance as it Relates to Cryptographic Attack Feasibility" (2018). West Point ETD. 9. https://digitalcommons.usmalibrary.org/faculty_etd/9 This Doctoral Dissertation is brought to you for free and open access by USMA Digital Commons. It has been accepted for inclusion in West Point ETD by an authorized administrator of USMA Digital Commons. For more information, please contact [email protected]. A QUANTITATIVE STUDY OF ADVANCED ENCRYPTION STANDARD PERFORMANCE AS IT RELATES TO CRYPTOGRAPHIC ATTACK FEASIBILITY A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Computer Science By Daniel Stephen Hawthorne Colorado Technical University December, 2018 Committee Dr. Richard Livingood, Ph.D., Chair Dr. Kelly Hughes, DCS, Committee Member Dr. James O. Webb, Ph.D., Committee Member December 17, 2018 © Daniel Stephen Hawthorne, 2018 1 Abstract The advanced encryption standard (AES) is the premier symmetric key cryptosystem in use today. Given its prevalence, the security provided by AES is of utmost importance. Technology is advancing at an incredible rate, in both capability and popularity, much faster than its rate of advancement in the late 1990s when AES was selected as the replacement standard for DES. Although the literature surrounding AES is robust, most studies fall into either theoretical or practical yet infeasible.
    [Show full text]
  • On Security and Privacy for Networked Information Society
    Antti Hakkala On Security and Privacy for Networked Information Society Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes Turku Centre for Computer Science TUCS Dissertations No 225, November 2017 ON SECURITY AND PRIVACY FOR NETWORKED INFORMATIONSOCIETY Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes antti hakkala To be presented, with the permission of the Faculty of Mathematics and Natural Sciences of the University of Turku, for public criticism in Auditorium XXII on November 18th, 2017, at 12 noon. University of Turku Department of Future Technologies FI-20014 Turun yliopisto 2017 supervisors Adjunct professor Seppo Virtanen, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland Professor Jouni Isoaho, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland reviewers Professor Tuomas Aura Department of Computer Science Aalto University Espoo, Finland Professor Olaf Maennel Department of Computer Science Tallinn University of Technology Tallinn, Estonia opponent Professor Jarno Limnéll Department of Communications and Networking Aalto University Espoo, Finland The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service ISBN 978-952-12-3607-5 (Online) ISSN 1239-1883 To my wife Maria, I am forever grateful for everything. Thank you. ABSTRACT Our society has developed into a networked information soci- ety, in which all aspects of human life are interconnected via the Internet — the backbone through which a significant part of communications traffic is routed. This makes the Internet ar- guably the most important piece of critical infrastructure in the world.
    [Show full text]
  • Efficient Hashing Using the AES Instruction
    Efficient Hashing Using the AES Instruction Set Joppe W. Bos1, Onur Özen1, and Martijn Stam2 1 Laboratory for Cryptologic Algorithms, EPFL, Station 14, CH-1015 Lausanne, Switzerland {joppe.bos,onur.ozen}@epfl.ch 2 Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB, United Kingdom [email protected] Abstract. In this work, we provide a software benchmark for a large range of 256-bit blockcipher-based hash functions. We instantiate the underlying blockci- pher with AES, which allows us to exploit the recent AES instruction set (AES- NI). Since AES itself only outputs 128 bits, we consider double-block-length constructions, as well as (single-block-length) constructions based on RIJNDAEL- 256. Although we primarily target architectures supporting AES-NI, our frame- work has much broader applications by estimating the performance of these hash functions on any (micro-)architecture given AES-benchmark results. As far as we are aware, this is the first comprehensive performance comparison of multi- block-length hash functions in software. 1 Introduction Historically, the most popular way of constructing a hash function is to iterate a com- pression function that itself is based on a blockcipher (this idea dates back to Ra- bin [49]). This approach has the practical advantage—especially on resource-constrained devices—that only a single primitive is needed to implement two functionalities (namely encrypting and hashing). Moreover, trust in the blockcipher can be conferred to the cor- responding hash function. The wisdom of blockcipher-based hashing is still valid today. Indeed, the current cryptographic hash function standard SHA-2 and some of the SHA- 3 candidates are, or can be regarded as, blockcipher-based designs.
    [Show full text]
  • Stream Cipher Designs: a Review
    SCIENCE CHINA Information Sciences March 2020, Vol. 63 131101:1–131101:25 . REVIEW . https://doi.org/10.1007/s11432-018-9929-x Stream cipher designs: a review Lin JIAO1*, Yonglin HAO1 & Dengguo FENG1,2* 1 State Key Laboratory of Cryptology, Beijing 100878, China; 2 State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China Received 13 August 2018/Accepted 30 June 2019/Published online 10 February 2020 Abstract Stream cipher is an important branch of symmetric cryptosystems, which takes obvious advan- tages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or resource constraints, and has always been a hot and central research topic in cryptography. With the rapid development of network and communication technology, cipher algorithms play more and more crucial role in information security. Simultaneously, the application environment of cipher algorithms is in- creasingly complex, which challenges the existing cipher algorithms and calls for novel suitable designs. To accommodate new strict requirements and provide systematic scientific basis for future designs, this paper reviews the development history of stream ciphers, classifies and summarizes the design principles of typical stream ciphers in groups, briefly discusses the advantages and weakness of various stream ciphers in terms of security and implementation. Finally, it tries to foresee the prospective design directions of stream ciphers. Keywords stream cipher, survey, lightweight, authenticated encryption, homomorphic encryption Citation Jiao L, Hao Y L, Feng D G. Stream cipher designs: a review. Sci China Inf Sci, 2020, 63(3): 131101, https://doi.org/10.1007/s11432-018-9929-x 1 Introduction The widely applied e-commerce, e-government, along with the fast developing cloud computing, big data, have triggered high demands in both efficiency and security of information processing.
    [Show full text]
  • A Bibliography of Publications on Hashing Algorithms
    A Bibliography of Publications on Hashing Algorithms Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 24 August 2021 Version 2.344 Title word cross-reference [BRM+09, BS91b, BS91a, CM01, Gir87, Ven86, WS93, War14, Coh97, Coh98, LHC05, QG89, QG90]. O(1) [FKS84]. O(log log n) #2 [Cer85]. [MN90]. O(log W ) [LS07b]. O(N) [HG77, MN90]. pn [Ack74]. π [FFGL10]. q 1 [PPS21]. 10 [GLM+10]. 11 [SY11]. 2 [OWZ14]. SL2 [MT16]. Z=p [Mue04]. + [EAA 16, GG92, HD72]. 2n [QG89, QG90]. + 3 [CBA94, Fly92, GG92, GK94, LMJC07, -approximate [SWQ 14]. -ary LDY+16, SYW+20, WSSO12]. 5=8 [Sch11]. [CC91, CLC92, Gui78, RRS07]. -Bit $62m [Nic17]. 64 [LK16]. ∗ [LNS93]. + [QG89, QG90, LK16, LK11]. -Body MT [WS93, War14]. -codes [Bie95]. -dimension [Omi88, Omi89a]. [HRB13]. 2 [AK98, QJ97]. A [Lyo83]. A∗ [MD97]. A2 [LHC05]. -dimensional [Yuv75]. + + -Functions [OOB12]. -gram [Bie95]. α [ABC 16]. b [LK11]. B [TB91]. + c [SWQ+14]. d [FPS17, PRM16]. f [LG78]. [Coh98, Ven86]. -Grams [Coh97, BRM 09]. 2 -Hash [BS91b, BS91a]. -Independence GL2(Fpn )[TNS20].H [DRS12]. H2A [CBB05]. K [Yuv75, APV07, CL85, CC91, [PT16, PT10a]. -mer [HC14, PNPC20]. CLC92, DKRT15, Die96, EFMRK+20, -min-wise [FPS17]. -Nearest [CL85]. + -partitions [DKRT15]. -Pipeline [PRM16]. FPS17, Gui78, HC14, LLG 17, PT10a, + PT16, PNPC20, RRS07, SS90b]. L [OOB12]. -probe [SS90b]. -Round [GLM 10, SY11].
    [Show full text]
  • Optimizing Authenticated Encryption Algorithms
    Masaryk University Faculty of Informatics Optimizing authenticated encryption algorithms Master’s Thesis Ondrej Mosnáček Brno, Fall 2017 Masaryk University Faculty of Informatics Optimizing authenticated encryption algorithms Master’s Thesis Ondrej Mosnáček Brno, Fall 2017 This is where a copy of the official signed thesis assignment and a copy ofthe Statement of an Author is located in the printed version of the document. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Ondrej Mosnáček Advisor: Ing. Milan Brož i Acknowledgement I would like to thank my advisor, Milan Brož, for his guidance, pa- tience, and helpful feedback and advice. Also, I would like to thank my girlfriend Ludmila, my family, and my friends for their support and kind words of encouragement. If I had more time, I would have written a shorter letter. — Blaise Pascal iii Abstract In this thesis, we look at authenticated encryption with associated data (AEAD), which is a cryptographic scheme that provides both confidentiality and integrity of messages within a single operation. We look at various existing and proposed AEAD algorithms and compare them both in terms of security and performance. We take a closer look at three selected candidate families of algorithms from the CAESAR competition. Then we discuss common facilities provided by the two most com- mon CPU architectures – x86 and ARM – that can be used to implement cryptographic algorithms efficiently.
    [Show full text]
  • Low-Complexity Mitigation of Cache Side Channel Attacks
    Non-Monopolizable Caches: Low-Complexity Mitigation of Cache Side Channel Attacks LEONID DOMNITSER, State University of New York at Binghamton AAMER JALEEL, Intel Corporation, VSSAD JASON LOEW, NAEL ABU-GHAZALEH, and DMITRY PONOMAREV, State University of New York at Binghamton We propose a flexibly-partitioned cache design that either drastically weakens or completely eliminates cache-based side channel attacks. The proposed Non-Monopolizable (NoMo) cache dynamically reserves cache lines for active threads and prevents other co-executing threads from evicting reserved lines. Unreserved lines remain available for dynamic sharing among threads. NoMo requires only simple modifications to the cache replacement logic, making it straightforward to adopt. It requires no software support enabling it to automatically protect pre-existing binaries. NoMo results in performance degradation of about 1% on average. We demonstrate that NoMo can provide strong security guarantees for the AES and Blowfish encryption algorithms. Categories and Subject Descriptors: C.1.0 [Processor Architectures]: General General Terms: Design, Security, Performance Additional Key Words and Phrases: Side-channel attacks, shared caches, secure architectures ACM Reference Format: Domnitser, L., Jaleel, A., Loew, J., Abu-Ghazaleh, N., and Ponomarev, D. 2012. Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks. ACM Trans. Architec. Code Optim. 8, 4, Article 35 (January 2012), 21 pages. DOI = 10.1145/2086696.2086714 http://doi.acm.org/10.1145/2086696.2086714 1. INTRODUCTION In recent years, security has emerged as a key design consideration in computing and communication systems. Security solutions center around the use of cryptographic algorithms, such as symmetric ciphers, public-key ciphers, and hash functions.
    [Show full text]
  • ISWC'09 in Particular Attempted to Broaden Its Scope to Cooperative Wear- Able Systems, I.E
    ISWC’09 Program 13th IEEE International Symposium on Wearable Computers 4-7 September 2009, Linz - AUSTRIA Institute for Pervasive Computing Technology for People Sponsors Platinum Gold 2 Table of Content Welcome From Upper Austria 4 Welcome From Linz 5 Welcomes From the JKU 6 Message From the General Co-Chairs 8 Message From the PC Co-Chairs 9 Message From LBR & Video Chairs 10 Message From Demo & DC Chairs 11 Committees 12 Program at a Glance 13 General Information 14 Keynotes 16 Friday, September 4, 2009 18 Saturday, September 5, 2009 22 Sunday, September 6, 2009 25 Monday, September 7, 2009 29 Social Events 31 Side Events 32 About the Organizers 34 Linz - Upper Austria 36 Artwork 37 3 Welcome From Upper Austria Wir in Oberösterreich haben uns das ehrgeizige Ziel gesetzt, bei den Ersten von Morgen dabei zu sein. Kreative Köpfe und gut ausgebildete Menschen im Land brauchen ein Fun- dament. Wir wollen daher unsere Forschungs- und Entwicklungsquote auf 4 Prozent des regionalen BIPs steigern. Wer zu den Besten gehören will, muss in einer globalisierten Welt auch seine Türen für die Besten aus aller Welt weit aufmachen. Ich freue mich daher, dass dieses Symposium inter- nationalen Wissenschaftern ein Forum zum Austausch der neuesten Entwicklungen bietet. Josef Pühringer Ich heiße alle Gäste in Oberösterreich herzlich willkommen und danke den Veranstaltern Governor of Upper Austria für die aufwändigen Vorbereitungsarbeiten. Gemeinsam sorgen sie dafür, dass Zukunft in Oberösterreich bereits etwas früher als anderswo beginnt. Dr. Josef Pühringer Landeshauptmann (Upper Austria has always targeted to be among the first of tomorrow. Creative minds and a highly educated society are fundamental for our country.
    [Show full text]
  • An Overview of Cryptographic Primitives for Possible Use in 5G and Beyond
    SCIENCE CHINA Information Sciences December 2020, Vol. 63 220301:1–220301:22 . REVIEW . https://doi.org/10.1007/s11432-019-2907-4 Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond An overview of cryptographic primitives for possible use in 5G and beyond Jing YANG* & Thomas JOHANSSON Department of Electrical and Information Technology, Lund University, Lund 22100, Sweden Received 9 December 2019/Revised 20 February 2020/Accepted 11 May 2020/Published online 11 November 2020 Abstract This survey overviews the potential use of cryptographic primitives in the fifth-generation mobile communications system (aka 5G) and beyond. It discusses the new security challenges that come with 5G and presents the upcoming security architecture. It shows the use of current cryptographic algorithms and discusses new algorithms or modifications of existing ones, that can be relevant. It also discusses the need for lightweight algorithms to meet the new use cases as well as the general demand for algorithms secure even when large quantum computers are available. Keywords 5G, cryptographic primitives, lightweight cryptography, post-quantum cryptography Citation Yang J, Johansson T. An overview of cryptographic primitives for possible use in 5G and beyond. Sci China Inf Sci, 2020, 63(12): 220301, https://doi.org/10.1007/s11432-019-2907-4 1 Introduction Wireless communication has transformed our society. The introduction of mobile communication as specified and provided by the second, third and fourth generation of mobile communication systems (respectively referred to as 2G, 3G, long-term evolution (LTE)) has changed our lives. Most people today own a mobile phone, keeping it closeby, and conducting not only phone calls, Internet browsing, but also a number of other very convenient services, which may include mobile tickets, money transfer, paying for parking, etc.
    [Show full text]
  • The Design of Scalar AES Instruction Set Extensions for RISC-V
    The design of scalar AES Instruction Set Extensions for RISC-V Ben Marshall1, G. Richard Newell2, Dan Page1, Markku-Juhani O. Saarinen3 and Claire Wolf4 1 Department of Computer Science, University of Bristol {ben.marshall,daniel.page}@bristol.ac.uk 2 Microchip Technology Inc., USA [email protected] 3 PQShield, UK [email protected] 4 Symbiotic EDA [email protected] Abstract. Secure, efficient execution of AES is an essential requirement on most computing platforms. Dedicated Instruction Set Extensions (ISEs) are often included for this purpose. RISC-V is a (relatively) new ISA that lacks such a standardised ISE. We survey the state-of-the-art industrial and academic ISEs for AES, implement and evaluate five different ISEs, one of which is novel. We recommend separate ISEs for 32 and 64-bit base architectures, with measured performance improvements for an AES-128 block encryption of 4× and 10× with a hardware cost of 1.1K and 8.2K gates respectivley, when compared to a software-only implementation based on use of T-tables. We also explore how the proposed standard bit-manipulation extension to RISC-V can be harnessed for efficient implementation of AES-GCM. Our work supports the ongoing RISC-V cryptography extension standardisation process. Keywords: ISE, AES, RISC-V 1 Introduction Implementing the Advanced Encryption Standard (AES). Compared to more general workloads, cryptographic algorithms like AES present a significant implementation chal- lenge. They involve computationally intensive and specialised functionality, are used in a wide range of contexts, and form a central target in a complex attack surface. The demand for efficiency (however measured) is an example of this challenge in two ways.
    [Show full text]
  • Dr. Markku-Juhani O. Saarinen
    Dr. Markku-Juhani O. Saarinen Curriculum Vitae – September 3, 2021 E-mail: [email protected] Homepage: https://mjos.fi Education Ph.D. Information Security, 2009. Royal Holloway, University of London, UK Thesis: “Cryptanalysis of Dedicated Cryptographic Hash Functions”, under Prof. Keith Martin. I did my doctoral research with the RHUL Information Security Group (ISG). M.Sc. Scientific Computing, (1999) 2005. University of Jyväskylä, Finland Computer science with a large mathematics component. I didn’t take a B.Sc degree in 1999, but after a pause, I continued to Master’s, which was awarded eximia cum laude. Background and Skill Profile I got my first real job in 1997 when SSH Communications Security hired me – then a young maths undergraduate with programming skills – to work full time as a cryptographer. I have worked exclusively in technical INFOSEC and COMSEC ever since. I earned my graduate degrees mostly while doing consulting and engineering work in the security industry, and I maintain strong links with the wider security research community. I was one of the main designers of the official RISC-V Cryptography Extensions, specif- ically the entropy source, constant-time feature, and AES/SM4 instructions [2, 3, 5]. For many years I’ve also worked on systems security, having been hired to audit sen- sitive corporate information systems, and also delivered penetration testing training. Security Engineering. I mostly code in C and Python, and I’m a fan of Rust. Most of my hardware work is done in SystemVerilog. I can also work with many other tools and languages and write assembly for ARM, x86, RISC-V, and others.
    [Show full text]
  • The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
    Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes Goutam Paul Cryptology and Security Research Unit (CSRU), R. C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata 700 108, India [email protected] and Anupam Chattopadhyay School of Computer Engineering, Nanyang Technological University, Singapore [email protected] Abstract With increasing usage of hardware accelerators in modern heterogeneous System- on-Chips (SoCs), the distinction between hardware and software is no longer rigid. The domain of cryptography is no exception and efficient hardware design of so-called software ciphers are becoming increasingly popular. In this paper, for the first time we propose an efficient hardware accelerator design for SOSEMANUK, one of the fi- nalists of the eSTREAM stream cipher competition in the software category. Since SOSEMANUK combines the design principles of the block cipher Serpent and the stream cipher SNOW 2.0, we make our design flexible to accommodate the option for independent execution of Serpent and SNOW 2.0. In the process, we identify interest- ing design points and explore different levels of optimizations. We perform a detailed experimental evaluation for the performance figures of each design point. The best throughput achieved by the combined design is 67.84 Gbps for SOSEMANUK, 33.92 Gbps for SNOW 2.0 and 2.12 Gbps for Serpent. Our design outperforms all existing hardware (as well as software) designs of Serpent, SNOW 2.0 and SOSEMANUK, along with those of all other eSTREAM candidates. Keywords: Cryptography, Hardware Accelerator, Serpent, SNOW 2.0, SOSEMANUK, Stream cipher implementation.
    [Show full text]