Key Derivation with Physical Unclonable Functions

Total Page:16

File Type:pdf, Size:1020Kb

Key Derivation with Physical Unclonable Functions TECHNISCHE UNIVERSITAT¨ MUNCHEN¨ Lehrstuhl f¨urSicherheit in der Informationstechnik Key Derivation with Physical Unclonable Functions Matthias Hiller Vollst¨andigerAbdruck der von der Fakult¨atf¨urElektrotechnik und Informationstechnik der Technischen Universit¨atM¨unchen zur Erlangung des akademischen Grades eines Doktor-Ingenieurs genehmigten Dissertation. Vorsitzender: Prof. Dr. sc. techn. Gerhard Kramer Pr¨uferder Dissertation: 1. Prof. Dr.-Ing. Georg Sigl 2. Prof. Dr.-Ing. Martin Bossert Die Dissertation wurde am 04.07.2016 bei der Technischen Universit¨at M¨unchen eingereicht und durch die Fakult¨at f¨ur Elektrotechnik und Informationstechnik am 07.11.2016 angenommen. Abstract Secure cryptographic keys are a prerequisite to protect the data that is transmitted and stored by today's and tomorrows embedded systems in the Internet of Things. For many of those systems, secure Non-Volatile Memory (NVM) is not available due to technical and cost constraints. Silicon Physical Unclonable Functions (PUFs) evaluate manufacturing variations to generate unique secrets inside Integrated Circuits (ICs) to replace the functionality of the NVM. However, PUFs are affected by noise and changes in environmental conditions, so that PUF responses cannot be directly used as cryptographic keys. Key derivation algorithms turn a noisy PUF response into a reliable cryptographic key. Error correction is required to remove the variation caused by environmental effects and random noise, and derive stable cryptographic keys. Helper data enables error correction by mapping random PUF responses to codewords of Error-Correcting Codes (ECCs), where errors can be detected and corrected. Over the last 10 years, several helper data generation approaches were introduced and implemented. Some challenges of key derivation with PUFs are the lacking of a generic theoretical framework and optimal practical ways of generating helper data. Further, today's hardware implementations focus on small block lengths in error correction for a low complexity. This thesis addresses these open points by showing that the practical problem of key derivation with PUFs is closely related to the information theoretical problem of key generation from compound sources. It also provides an algebraic representation that applies to a wide class of previous work on error correction for PUFs. The new rep- resentation allows to upper bound the secrecy leakage of an approach already on the algorithmic level during the design stage. The analysis shows that today's algorithms do not support maximum key rates and minimum helper data sizes, while causing no helper data leakage at the same time. Systematic Low Leakage Coding (SLLC) is a new error correction scheme presented in this thesis that translates the properties of theoretical random coding approaches to a deterministic code generation scheme. It maximizes the size of the key and minimizes the size of the helper data without causing secrecy leakage through the helper data. In addition, implementation parameters for an extremely low-area error correction for PUFs with very low bit error probability are provided. Not all PUF response bits are equally stable. This work shows with the information theoretical concept of typicality that the error correction overhead decreases significantly by selecting reliable PUF response bits in larger blocks. Differential Sequence Coding (DSC) is introduced as an error correction approach that creates one single block of reliable PUF response bits and thus overcomes the limitations of small block sizes of previous implementations. This work uses DSC in combination with the popular code class of convolutional codes. The DSC and Viterbi decoder error correction module reduces the size of the PUF and the helper data significantly for a popular reference scenario for SRAM PUFs and Xilinx Spartan 3 FPGAs without increasing the slice count of the implementation. The final comparison shows that different error correction candidates are favorable for different applications, depending on their requirements and constraints. This work expands the state of the art by providing more efficient solutions for various parameter sets. Keywords : Physical Unclonable Functions, Key derivation, Fuzzy Extractor, Syn- drome Coding, Error-Correcting Codes, Information Theory, Hardware Implementation, FPGA. Kurzfassung Sichere kryptografische Schl¨ussel sind eine Grundvoraussetzung, um Daten zu sch¨utzen, die von heutigen und zuk¨unftigen einbegetteten Systemen im Internet der Dinge gespeichert, verarbeitet und ¨ubertragen werden. Sichere Nicht-fl¨uchtige Speicher sind aufgrund technischer oder wirtschaftlicher Beschr¨ankungenin vielen Systemen nicht verf¨ugbar.Silicon Physical Unclonable Functions (PUFs) werten Fertigungsschwankun- gen aus, um einzigartige Geheimnisse in integrierten Schaltungen zu erzeugen und nichtfl¨uchtige Speicher zu ersetzen. Die so-genannten PUF Responses werden von Rauschen und physikalischen Umgebungsgr¨oßenbeeinflusst, sodass sie nicht direkt als stabile kryptografische Schl¨usselverwendet werden k¨onnen. Algorithmen zur Schl¨usselableitungverarbeiten die PUF Response zu einem zuverl¨assi- gen kryptografischen Schl¨ussel.Fehlerkorrekturverfahren werden dabei ben¨otigt,um die Abweichungen, die durch das Rauschen und die Umgebungseffekte entstanden sind, zu entfernen. Helperdaten erm¨oglichen die Fehlerkorrektur, indem sie die zuf¨alligenPUF Responses auf Codew¨ortervon fehlerkorrigierenden Codes abbilden in denen Fehler erkannt und korrigiert werden k¨onnen. In den letzten 10 Jahren wurden zahlreiche Verfahren zur Helperdatenerzeugung vorgestellt und implementiert. Das Fehlen von all- gemeinen theoretischen Modellen und optimalen praktischen Verfahren zur Helperdaten- erzeugung, sowie das Bestreben m¨oglichst kleine Fehlerkorrekturbl¨ocke zu nutzen, um Hardwareimplementierungen klein zu halten sind Herausforderungen bei der Schl¨usse- lableitung mit PUFs. Bez¨uglich der theoretischen Modelle zeigt diese Arbeit, dass das informationstheoretis- che Problem der Schl¨usselerzeugung aus Compound Quellen eng mit Schl¨usselableitung aus PUFs verwandt ist. Außerdem wird eine generische algebraische Darstellung disku- tiert, mit der eine große Zahl vorhandener Ans¨atzezur Schl¨usselableitungdargestellt werden kann. Die neue Darstellung erm¨oglicht es, f¨ureinen Ansatz auf algorithmis- cher Ebene eine obere Schranke f¨urdie Schl¨usselinformation, die maximal durch die Helperdaten nach Außen gelangt, anzugeben. Systematic Low Leakage Coding (SLLC) ist ein in dieser Arbeit entwickelter neuer Fehlerkorrekturansatz, der die Eigenschaften von theoretischen Verfahren mit Zu- fallscodes zeigt und gleichzeitig durch deterministische Codegenerierung auch praktisch umgesetzt werden kann. Es maximiert er die Schl¨usselgr¨oßeund minimiert gleichzeitig die Gr¨oßeder ben¨otigtenHelperdaten. Außerdem werden Implementierungsparameter f¨ureine Lightweight-Implementierung f¨urPUFs mit sehr niedriger Fehlerwahrschein- lichkeit diskutiert. Nicht alle PUF-Response-Bits sind gleich stabil. Deshalb zeigt diese Arbeit mithilfe des informationstheoretischen Konzepts typischer Sequenzen, dass die Fehlerkorrektur f¨urgroße Bl¨ocke ausgew¨ahlterPUF-Response-Bits deutlich effizienter ist. Differential Sequence Coding (DSC) ist ein in dieser Arbeit entwickelter Fehlerkorrekturansatz, der auf einem einzigen Block mit zuverl¨assigen PUF-Response-Bits arbeitet und deshalb die Beschr¨ankungkleiner Blockgr¨oßen¨uberwindet. In dieser Arbeit wird DSC zusam- men mit Faltungscodes eingesetzt. Das Fehlerkorrekturmodul mit DSC und Viterbi- Decodierer reduziert die Anzahl ben¨otigterPUF-Response-Bits und die Helperdategr¨oße deutlich f¨urein typisches Referenzszenario mit SRAM PUF und Xilinx Spartan 3E FPGA. Dabei wird die Gr¨oßeder Implementierung nur unwesentlich erh¨oht. Der abschließende Vergleich zeigt, dass unterschiedliche Fehlerkorrekturans¨atzeje nach Vorgaben und Einschr¨ankungenf¨urunterschiedliche Anwendungen geeignet sind. Dabei erweitert diese Arbeit den Stand der Technik um neue, effizientere, Verfahren f¨urunter- schiedliche Anwendungen und Parameter. Schl¨usselworte : Physical Unclonable Functions, Schl¨usselableitung,Fuzzy Extractor, Syndrome Coding, Kanalcodierung, Informationstheorie, Hardwareimplementierung, FPGA. Acknowledgments The last four and a half years at TUM were full of exciting new experiences and chal- lenges, where no year was like the one before. Moving to a new university, working on a topic for several years and having the time to look at it from several different perspec- tives, having deep technical discussions, establishing new courses, advising students, publishing with people from different groups and fields, going to conferences, having research stays abroad, getting settled and finding new friends in Munich, ... and all of this would not have been possible without several people who I would like to thank: First of all I would like to thank Prof. Dr.-Ing. Georg Sigl for giving me the chance to do my PhD at his Chair of Security in Information Technology at TUM, giving me the freedom to work on the ideas that interested me most, for providing me guidance when needed, for opening doors and enabling opportunities. Collaborating with various people from other academic groups, Fraunhofer and industry was a great benefit and also being involved in teaching was an enriching personal experience. Further, I would like to thank Prof. Dr.-Ing. Martin Bossert for being member of the dissertation committee and for carefully reading this dissertation.
Recommended publications
  • Exploiting Prior Knowledge During Automatic Key and Chord Estimation from Musical Audio
    Exploitatie van voorkennis bij het automatisch afleiden van toonaarden en akkoorden uit muzikale audio Exploiting Prior Knowledge during Automatic Key and Chord Estimation from Musical Audio Johan Pauwels Promotoren: prof. dr. ir. J.-P. Martens, prof. dr. M. Leman Proefschrift ingediend tot het behalen van de graad van Doctor in de Ingenieurswetenschappen Vakgroep Elektronica en Informatiesystemen Voorzitter: prof. dr. ir. R. Van de Walle Faculteit Ingenieurswetenschappen en Architectuur Academiejaar 2015 - 2016 ISBN 978-90-8578-883-6 NUR 962, 965 Wettelijk depot: D/2016/10.500/15 Abstract Chords and keys are two ways of describing music. They are exemplary of a general class of symbolic notations that musicians use to exchange in- formation about a music piece. This information can range from simple tempo indications such as “allegro” to precise instructions for a performer of the music. Concretely, both keys and chords are timed labels that de- scribe the harmony during certain time intervals, where harmony refers to the way music notes sound together. Chords describe the local harmony, whereas keys offer a more global overview and consequently cover a se- quence of multiple chords. Common to all music notations is that certain characteristics of the mu- sic are described while others are ignored. The adopted level of detail de- pends on the purpose of the intended information exchange. A simple de- scription such as “menuet”, for example, only serves to roughly describe the character of a music piece. Sheet music on the other hand contains precise information about the pitch, discretised information pertaining to timing and limited information about the timbre.
    [Show full text]
  • Theoretical Study of Continuous-Variable Quantum Key Distribution Anthony Leverrier
    Theoretical study of continuous-variable quantum key distribution Anthony Leverrier To cite this version: Anthony Leverrier. Theoretical study of continuous-variable quantum key distribution. Atomic Physics [physics.atom-ph]. Télécom ParisTech, 2009. English. tel-00451021 HAL Id: tel-00451021 https://pastel.archives-ouvertes.fr/tel-00451021 Submitted on 28 Jan 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. École Doctorale d’Informatique, Télécommunications et Électronique de Paris Thèse présentée pour obtenir le grade de docteur de l’Ecole Nationale Supérieure des Télécommunications Spécialité : Informatique et Réseaux Anthony LEVERRIER Etude théorique de la distribution quantique de clés à variables continues. Soutenue le 20 novembre 2009 devant le jury composé de Pr. Joseph Boutros Examinateur Pr. Nicolas Cerf Examinateur Pr. Jean Dalibard Examinateur Pr. Philippe Grangier Directeur de thèse Pr. Renato Renner Rapporteur Pr. Jean-Pierre Tillich Rapporteur Pr. Gilles Zémor Directeur de thèse École Doctorale d’Informatique, Télécommunications et Électronique de Paris PhD THESIS prepared and presented at Graduate School of Telecom ParisTech A dissertation submitted in partial fulfillment of the requirements for the degree of DOCTOR OF SCIENCE Specialized in Network and Computer Science Anthony LEVERRIER Theoretical study of continuous-variable quantum key distribution.
    [Show full text]
  • Circle of Fifths Guitar Scales
    Circle of fifths guitar scales Continue We used to talk about a large scale. We have built a large scale C, which happens to contain no sharp and non-flats. We then created some other large scales based on the same exact scale formula; that is, with the same exact type of steps as major C, but starting with a different note other than C. C Main Scale C♯ D D♯ E F♯ G♯ A♯ B C Let's take the fifth note in C-scale (tone G) and use this note to make a new scale. What will be the names of the notes? From G we will apply the formula of whole and half steps, using chromatic scales as our source: wh, wh, h, wh, wh, h. the result is G A B B C D F F♯ F. G. G. G. Major Scale G♯ A♯ B C C C♯ D♯ E F F♯ G When writing notation, we will always write sharp when F appear? It seems annoying. Therefore, the standard practice is to announce it at the beginning of a piece of music called key signatureA markings used at the beginning of a piece of written music to specify the key; usually, which notes will be sharp or which notes will be flat. (But not both) (pictured). This symbol indicates that until otherwise stated, all F will actually be F♯. Note that the sharp one is placed directly above the triple key line of note F. This key signature will be a G major key. While useful in understanding notation, key signatures are also valuable, even if we never read music.
    [Show full text]
  • 25‹ Mhz Clock Continuous-Variable Quantum Key Distribution
    www.nature.com/scientificreports OPEN 25 MHz clock continuous-variable quantum key distribution system over 50 km fiber channel Received: 10 February 2015 1 1 1 1 2 1,2 Accepted: 24 August 2015 Chao Wang , Duan Huang , Peng Huang , Dakai Lin , Jinye Peng & Guihua Zeng Published: 30 September 2015 In this paper, a practical continuous-variable quantum key distribution system is developed and it runs in the real-world conditions with 25 MHz clock rate. To reach high-rate, we have employed a homodyne detector with maximal bandwidth to 300 MHz and an optimal high-efficiency error reconciliation algorithm with processing speed up to 25 Mbps. To optimize the stability of the system, several key techniques are developed, which include a novel phase compensation algorithm, a polarization feedback algorithm, and related stability method on the modulators. Practically, our system is tested for more than 12 hours with a final secret key rate of 52 kbps over 50 km transmission distance, which is the highest rate so far in such distance. Our system may pave the road for practical broadband secure quantum communication with continuous variables in the commercial conditions. Quantum key distribution (QKD) is able to enable two remote participants to share unconditionally secure keys based on the laws of quantum mechanics1–3. By combining with one-time pad encryption, the QKD is promising for effectively ending the cat and mouse game between the guardians of secrets and their enemies4 and it has now become one of the most dynamic research fields. Since the first experi- mental demonstration of the QKD over 32-cm free-space channel in 19925, tremendous efforts have been made to keep pace with the demands in large-scale and broadband secure quantum communication6–11.
    [Show full text]
  • Tonality Estimation in Electronic Dance Music a Computational and Musically Informed Examination
    Tonality Estimation in Electronic Dance Music A Computational and Musically Informed Examination Ángel Faraldo Pérez TESI DOCTORAL UPF / 2017 Thesis Directors: Dr. Sergi Jordà Puig Music Technology Group Department of Information and Communication Technologies Universitat Pompeu Fabra, Barcelona, Spain Dissertation submitted to the Department of Information and Communication Tech- nologies of Universitat Pompeu Fabra in partial fulfilment of the requirements for the degree of DOCTOR PER LA UNIVERSITAT POMPEU FABRA Copyright c 2017 by Ángel Faraldo Licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 Music Technology Group (http://mtg.upf.edu), Department of Information and Communication Tech- nologies (http://www.upf.edu/dtic), Universitat Pompeu Fabra (http://www.upf.edu), Barcelona, Spain. The doctoral defence was held on ......................... at the Universitat Pompeu Fabra and scored as ........................................................... Dr. Sergi Jordà Puig (Thesis Supervisor) Universitat Pompeu Fabra (UPF), Barcelona, Spain Dr. Agustín Martorell Domínguez (Thesis Committee Member) Universitat Pompeu Fabra (UPF), Barcelona, Spain Dr. Gianni Ginesi (Thesis Committee Member) Escola Superior de Musica de Catalunya (ESMUC), Barcelona, Spain Dr. Anja Volk (Thesis Committee Member) Universiteit Utrecht, The Netherlands This thesis has been carried out at the Music Technology Group (MTG) of Universitat Pompeu Fabra in Barcelona, Spain, from January 2014 to November 2017, supervised by Dr. Sergi Jordà Puig and Prof. Perfecto Herrera Boyer. My work has been supported by the Department of Information and Communication Technologies (DTIC) PhD fellowship (2015-17), Universitat Pompeu Fabra, and the European Research Council under the European Union’s 7th Framework Program, as part of the GiantSteps project (FP7-ICT-2013-10, grant agreement 610591).
    [Show full text]
  • AN EXPLORATION of the KEY CHARACTERISTICS in BEETHOVEN's PIANO SONATAS and SELECTED INSTRUMENTAL REPERTOIRE Dimitri Papadimit
    AN EXPLORATION OF THE KEY CHARACTERISTICS IN BEETHOVEN’S PIANO SONATAS AND SELECTED INSTRUMENTAL REPERTOIRE Dimitri Papadimitriou Dissertation submitted to Dublin City University in partial fulfilment of the requirements for the degree Doctor of Music Performance ROYAL IRISH ACADEMY OF MUSIC Supervisor: Dr. Denise Neary July 2013 Declaration I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of Doctor of Music Performance, is entirely my own work, and that I have exercised reasonable care to ensure that the work is original, and does not to the best of my knowledge breach any law of copyright, and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed:_____________________________ ID No.:_____________ Date: _______________ Terms and Conditions of Use of Digitised Theses from Royal Irish Academy of Music Copyright statement All material supplied by Royal Irish Academy of Music Library is protected by copyright (under the Copyright and Related Rights Act, 2000 as amended) and other relevant Intellectual Property Rights. By accessing and using a Digitised Thesis from Royal Irish Academy of Music you acknowledge that all Intellectual Property Rights in any Works supplied are the sole and exclusive property of the copyright and/or other Intellectual Property Right holder. Specific copyright holders may not be explicitly identified. Use of materials from other sources within a thesis
    [Show full text]
  • Beethoven's Compositional Approach to Multi-Movement Structures in His
    Beethoven’s Compositional Approach to Multi-Movement Structures in his Instrumental Works A thesis submitted to the University of Manchester for the degree of Doctor of Philosophy in the Faculty of Humanities 2013 ERICA BUURMAN SCHOOL OF ARTS, LANGUAGES AND CULTURES Contents List of Tables................................................................................................................ 6 List of Music Examples ............................................................................................... 7 Abstract ...................................................................................................................... 11 Declaration ................................................................................................................. 12 Copyright Statement .................................................................................................. 13 Acknowledgements .................................................................................................... 14 Abbreviations ............................................................................................................. 15 Note on the Transcriptions ......................................................................................... 17 Chapter 1—Introduction ............................................................................................ 18 1.1—Aims .............................................................................................................. 18 1.2—Contexts .......................................................................................................
    [Show full text]
  • Pro Series Technical Information
    Terminology When making a definition of a term, the following rules were A definition must meet the following rules: applied to the term: 1. It must describe the subject of the term 1. Is the term listed in a standard dictionary? without graphics. 2. Is the definition there the same meaning used in 2. It must describe ONLY the subject of the term. our industry? 3. The term should not be used in the definition. A standard pocket dictionary can be obtained easily and If you have a technical objection to any definition, on short notice from a variety of stores that have a please bring it to the attention of a member of the LIST pocket book display. If the answer to either of the Council for review. questions above is no, then the definition of the term may be found here. Used by permission. Copyright © 1989, 1990, 1995, 1996, 1997 LIST Council -A- bottom pin n. usually a cylindrical shaped tumbler actual key section n. the exact cross sectional binary cut key n. a key whose combination only which may be conical, ball shaped or chisel pointed configuration of a key blade as viewed from the bow allows for two possibilities in each bitting position: on the end which makes contact with the key toward the tip cut/no cut bow n. the portion of the key which serves as a grip actuator n. a device, usually connected to a cylinder, binary type cylinder or lock n. a cylinder or lock or handle which, when activated, may cause a lock mechanism whose combination only allows for two bitting to operate possibilities in each bitting position bow stop n.
    [Show full text]
  • The Instarmental Variation Sets of Antonio Vivaldi: Old Forms in New Genres
    The Instarmental Variation Sets of Antonio Vivaldi: Old Forms in New Genres Nicholas Scott Lockey B,M., Pacitic Lutheran University, 2002 A Thesis Submitted in Partial Fulfilherit of the Requirements for the Degree of MASTER OF ARTS in the School of Music O Nicholas Scott Lockey, 2004 University of Victoria All rights reserved. This thesis may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. Sup-r: Dr. Susan Lewis Haanmond (School of Music) Abstract Studies of variation form generally overlook the works of Antonio Vivaldi due to the lack of sufficient bibliographic resources and assumptions downplaying the significance of Vivaldi's variation sets. This study, however, argues that Vivaldi's sets represent innovative contributions to the hm It begins by cataloguing the twenty instrumental variation sets published in the &st critical edition of Vivaidits works (Milan: Ricordi, 1947-72). It then examines the sequence of vatiations and manner of conclusion in each set, issues crucial to the reception of variation form ever since late eighteenth-century writers such as Koch and Vogler expanded discussions of variation technique to address variation sets as a musical farm. Vivakli's examples are compared to those by Corelli, Rarneau, and Handel, highlighting Vivaldi's greater emphasis on coherent progressions and f'lrm conclusions. Additionally, reeent chronological studies are combined to propose that Vivaldi was among the first composers to use variation form hsolo concertos. Contents
    [Show full text]
  • Minnis, Timothy John All Rights Reserved the ORIGINAL SOLO PIANO MUSIC of ALBERT ROUSSEL
    INFORMATION TO USERS This reproduction was made from a copy of a document sent to us for microfilming. While the most advanced technology has been used to photograph and reproduce this document, the quality of the reproduction is heavily dependent upon the quality of the material submitted. The following explanation of techniques is provided to help clarify markings or notations which may appear on this reproduction. 1.The sign or “target” for pages apparently lacking from the document photographed is “Missing Page(s)”. If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting through an image and duplicating adjacent pages to assure complete continuity. 2. When an image on the film is obliterated with a round black mark, it is an indication of either blurred copy because of movement during exposure, duplicate copy, or copyrighted materials that should not have been filmed. For blurred pages, a good image of the page can be found in the adjacent frame. If copyrighted materials were deleted, a target note will appear listing the pages in the adjacent frame. 3. When a map, drawing or chart, etc., is part of the material being photographed, a definite method of “sectioning” the material has been followed. It is customary to begin filming at the upper left hand comer of a large sheet and to continue from left to right in equal sections with small overlaps. If necessary, sectioning is continued again—beginning below the first row and continuing on until complete.
    [Show full text]
  • Modal Chord Progressions
    Modal Chord Progressions: The main thing to notice with any modal chord progression is the disparity between the theoretical key that the chords have come from, diatonically speaking...and the home key or key centre that the ear hears. Take for example the following chord progression: C – G – AM7 – (D7 G) - C It is usually the case that the first chord is the Tonic chord and also the point of departure. In this case then, it appears that the C Major chord is the Tonic or Key chord. But from a theoretical point of view the C Major scale does not accommodate a D7 chord. Of course, one way to explain the presence of this chord, is that it is a secondary dominant - the idea that any chord can be preceded by its own Dominant 7th chord whose root is a perfect 5th higher). In which case, isn’t this progression just the C Major scale with a slight deviation? Well, what I would say without doubt, is that the note ‘C’ and the C Major chord are at the centre of things. The fact that we start and end on it helps in this regard. If we are looking for a unifying scale to play over the entire progression (accepting as we will that the whole progression belongs to one key – rather than a modulation) then the fact of the matter is that the notes provided by the C Major scale will NOT work: there is a clash between the natural F in the C Major scale and the F# resident in the D7 chord.
    [Show full text]
  • This Thesis Has Been Submitted in Fulfilment of the Requirements for a Postgraduate Degree (E.G
    This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions of use: This work is protected by copyright and other intellectual property rights, which are retained by the thesis author, unless otherwise stated. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. ACCOUNTING AND THE STATE: TRANSPARENCY AS THE ART OF GOVERNMENT Jonathan Andrew Tweedie Doctor of Philosophy The University of Edinburgh 2020 Abstract In this thesis, I explore how accounting is used by the British state in order to govern its citizens. Specifically, I investigate the emergence of ‘the transparent state’, the state that claims to make its inner workings visible to its citizens through the publication of vast arrays of online, financial and non-financial information, audit and performance measures, ranking, ratings and statistics. The state claims that the visibility produced by ‘transparency’ is democratising and empowering for its citizens. I consider how this form of visibility compares to the ways in which the state has appeared to and/or concealed itself from its citizens throughout history.
    [Show full text]