SPARKLE Specification
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cryptanalysis of Feistel Networks with Secret Round Functions Alex Biryukov, Gaëtan Leurent, Léo Perrin
Cryptanalysis of Feistel Networks with Secret Round Functions Alex Biryukov, Gaëtan Leurent, Léo Perrin To cite this version: Alex Biryukov, Gaëtan Leurent, Léo Perrin. Cryptanalysis of Feistel Networks with Secret Round Functions. Selected Areas in Cryptography - SAC 2015, Aug 2015, Sackville, Canada. hal-01243130 HAL Id: hal-01243130 https://hal.inria.fr/hal-01243130 Submitted on 14 Dec 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1, Gaëtan Leurent2, and Léo Perrin3 1 [email protected], University of Luxembourg 2 [email protected], Inria, France 3 [email protected], SnT,University of Luxembourg Abstract. Generic distinguishers against Feistel Network with up to 5 rounds exist in the regular setting and up to 6 rounds in a multi-key setting. We present new cryptanalyses against Feistel Networks with 5, 6 and 7 rounds which are not simply distinguishers but actually recover completely the unknown Feistel functions. When an exclusive-or is used to combine the output of the round function with the other branch, we use the so-called yoyo game which we improved using a heuristic based on particular cycle structures. -
The Roots of Middle-Earth: William Morris's Influence Upon J. R. R. Tolkien
University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 12-2007 The Roots of Middle-Earth: William Morris's Influence upon J. R. R. Tolkien Kelvin Lee Massey University of Tennessee - Knoxville Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Part of the Literature in English, British Isles Commons Recommended Citation Massey, Kelvin Lee, "The Roots of Middle-Earth: William Morris's Influence upon J. R. R. olkien.T " PhD diss., University of Tennessee, 2007. https://trace.tennessee.edu/utk_graddiss/238 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Kelvin Lee Massey entitled "The Roots of Middle-Earth: William Morris's Influence upon J. R. R. olkien.T " I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in English. David F. Goslee, Major Professor We have read this dissertation and recommend its acceptance: Thomas Heffernan, Michael Lofaro, Robert Bast Accepted for the Council: Carolyn R. Hodges Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) To the Graduate Council: I am submitting herewith a dissertation written by Kelvin Lee Massey entitled “The Roots of Middle-earth: William Morris’s Influence upon J. -
Japanese Native Speakers' Attitudes Towards
JAPANESE NATIVE SPEAKERS’ ATTITUDES TOWARDS ATTENTION-GETTING NE OF INTIMACY IN RELATION TO JAPANESE FEMININITIES THESIS Presented in Partial Fulfillment of the Requirements for The Degree Master of Arts in the Graduate School of The Ohio State University By Atsuko Oyama, M.E. * * * * * The Ohio State University 2008 Master’s Examination Committee: Approved by Professor Mari Noda, Advisor Professor Mineharu Nakayama Advisor Professor Kathryn Campbell-Kibler Graduate Program in East Asian Languages and Literatures ABSTRACT This thesis investigates Japanese people’s perceptions of the speakers who use “attention-getting ne of intimacy” in discourse in relation to femininity. The attention- getting ne of intimacy is the particle ne that is used within utterances with a flat or a rising intonation. It is commonly assumed that this attention-getting ne is frequently used by children as well as women. Feminine connotations attached to this attention-getting ne when used by men are also noted. The attention-getting ne of intimacy is also said to connote both intimate and over-friendly impressions. On the other hand, recent studies on Japanese femininity have proposed new images that portrays figures of immature and feminine women. Assuming the similarity between the attention-getting ne and new images of Japanese femininity, this thesis aims to reveal the relationship between them. In order to investigate listeners’ perceptions of women who use the attention- getting ne of intimacy with respect to femininity, this thesis employs the matched-guise technique as its primary methodological choice using the presence of attention-getting ne of intimacy as its variable. In addition to the implicit reactions obtained in the matched- guise technique, people’s explicit thoughts regarding being onnarashii ‘womanly’ and kawairashii ‘endearing’ were also collected in the experiment. -
Francis Poulenc and Surrealism
Wright State University CORE Scholar Master of Humanities Capstone Projects Master of Humanities Program 1-2-2019 Francis Poulenc and Surrealism Ginger Minneman Wright State University - Main Campus Follow this and additional works at: https://corescholar.libraries.wright.edu/humanities Part of the Arts and Humanities Commons Repository Citation Minneman, G. (2019) Francis Poulenc and Surrealism. Wright State University, Dayton, Ohio. This Thesis is brought to you for free and open access by the Master of Humanities Program at CORE Scholar. It has been accepted for inclusion in Master of Humanities Capstone Projects by an authorized administrator of CORE Scholar. For more information, please contact [email protected]. Minneman 1 Ginger Minneman Final Project Essay MA in Humanities candidate Francis Poulenc and Surrealism I. Introduction While it is true that surrealism was first and foremost a literary movement with strong ties to the world of art, and not usually applied to musicians, I believe the composer Francis Poulenc was so strongly influenced by this movement, that he could be considered a surrealist, in the same way that Debussy is regarded as an impressionist and Schönberg an expressionist; especially given that the artistic movement in the other two cases is a loose fit at best and does not apply to the entirety of their output. In this essay, which served as the basis for my lecture recital, I will examine some of the basic ideals of surrealism and show how Francis Poulenc embodies and embraces surrealist ideals in his persona, his music, his choice of texts and his compositional methods, or lack thereof. -
BLAKE2: Simpler, Smaller, Fast As MD5
BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1, Samuel Neves2, Zooko Wilcox-O'Hearn3, and Christian Winnerlein4 1 Kudelski Security, Switzerland [email protected] 2 University of Coimbra, Portugal [email protected] 3 Least Authority Enterprises, USA [email protected] 4 Ludwig Maximilian University of Munich, Germany [email protected] Abstract. We present the hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE optimized for speed in software. Target applications include cloud storage, intrusion detection, or version control systems. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms, and BLAKE2s for smaller architectures. On 64- bit platforms, BLAKE2 is often faster than MD5, yet provides security similar to that of SHA-3: up to 256-bit collision resistance, immunity to length extension, indifferentiability from a random oracle, etc. We specify parallel versions BLAKE2bp and BLAKE2sp that are up to 4 and 8 times faster, by taking advantage of SIMD and/or multiple cores. BLAKE2 reduces the RAM requirements of BLAKE down to 168 bytes, making it smaller than any of the five SHA-3 finalists, and 32% smaller than BLAKE. Finally, BLAKE2 provides a comprehensive support for tree-hashing as well as keyed hashing (be it in sequential or tree mode). 1 Introduction The SHA-3 Competition succeeded in selecting a hash function that comple- ments SHA-2 and is much faster than SHA-2 in hardware [1]. There is nev- ertheless a demand for fast software hashing for applications such as integrity checking and deduplication in filesystems and cloud storage, host-based intrusion detection, version control systems, or secure boot schemes. -
Security Analysis of BLAKE2's Modes of Operation
Security Analysis of BLAKE2's Modes of Operation Atul Luykx, Bart Mennink, Samuel Neves KU Leuven (Belgium) and Radboud University (The Netherlands) FSE 2017 March 7, 2017 1 / 14 BLAKE2 m1 m2 m3 m 0∗ `k IV PB F F F F H(m) ⊕ t1 f1 t2 f2 t3 f3 t` f` Cryptographic hash function • Aumasson, Neves, Wilcox-O'Hearn, Winnerlein (2013) • Simplication of SHA-3 nalist BLAKE • 2 / 14 BLAKE2 Use in Password Hashing Argon2 (Biryukov et al.) • Catena (Forler et al.) • Lyra (Almeida et al.) • Lyra2 (Simplício Jr. et al.) • Rig (Chang et al.) • Use in Authenticated Encryption AEZ (Hoang et al.) • Applications Noise Protocol Framework (Perrin) • Zcash Protocol (Hopwood et al.) • RAR 5.0 (Roshal) • 3 / 14 BLAKE2 Guo et al. 2014 Hao 2014 Khovratovich et al. 2015 Espitau et al. 2015 ??? Even slight modications may make a scheme insecure! Security Inheritance? BLAKE cryptanalysis Aumasson et al. 2010 Biryukov et al. 2011 Dunkelman&K. 2011 generic Andreeva et al. 2012 Chang et al. 2012 4 / 14 ??? Even slight modications may make a scheme insecure! Security Inheritance? BLAKE BLAKE2 cryptanalysis Aumasson et al. 2010 Guo et al. 2014 Biryukov et al. 2011 Hao 2014 Dunkelman&K. 2011 Khovratovich et al. 2015 Espitau et al. 2015 generic Andreeva et al. 2012 Chang et al. 2012 4 / 14 Even slight modications may make a scheme insecure! Security Inheritance? BLAKE BLAKE2 cryptanalysis Aumasson et al. 2010 Guo et al. 2014 Biryukov et al. 2011 Hao 2014 Dunkelman&K. 2011 Khovratovich et al. 2015 Espitau et al. 2015 generic Andreeva et al. -
Mahina, the Hawaiian Moon Calendar, and Shamanic Astrology by Liz Dacus
Mahina, the Hawaiian Moon Calendar, and Shamanic Astrology By Liz Dacus In August of 2009, a Shamanic Astrology group gathered for a week long event on the Big Island. The main purpose of the gathering was to learn more about the night sky and the Hawaiian Moon Calendar. It is exciting to see how the Hawaiian Moon Calendar can be integrated into the Shamanic Astrology Mystery School’s current understanding of the Moon cycles. I think it is worthwhile to begin with the Hawaiian story of how the Moon came to be, in the words of noted artist and post contact historian Herbert Kane.(1) “In the beginning there was only Po, the Darkness, an infinite, formless night without beginning, without end. But within that emptiness there emerged a Thought, an intelligence that brooded through an immensity of time and space, Hina. And in that darkness was created a womb, the Earth Mother, Papa (pa-PAH). Then light was created, the light of the Sky Father, Wakea. In their embrace, male light penetrated female darkness, and from this union of opposites was created a universe of opposites---male and female, light and dark, heat and cold, rough and smooth, wet and dry, storm and stillness-a universe where all things are defined by their opposites. Thus the Universe was given form and life; for only in the marriage of light and darkness can forms be revealed. Only in sunlight can there be growth of living things, all fathered by light and mothered in the darkness of the womb, the egg, or the soil. -
Extending NIST's CAVP Testing of Cryptographic Hash Function
Extending NIST’s CAVP Testing of Cryptographic Hash Function Implementations Nicky Mouha and Christopher Celi National Institute of Standards and Technology, Gaithersburg, MD, USA [email protected],[email protected] Abstract. This paper describes a vulnerability in Apple’s CoreCrypto library, which affects 11 out of the 12 implemented hash functions: every implemented hash function except MD2 (Message Digest 2), as well as several higher-level operations such as the Hash-based Message Authen- tication Code (HMAC) and the Ed25519 signature scheme. The vulnera- bility is present in each of Apple’s CoreCrypto libraries that are currently validated under FIPS 140-2 (Federal Information Processing Standard). For inputs of about 232 bytes (4 GiB) or more, the implementations do not produce the correct output, but instead enter into an infinite loop. The vulnerability shows a limitation in the Cryptographic Algorithm Validation Program (CAVP) of the National Institute of Standards and Technology (NIST), which currently does not perform tests on hash func- tions for inputs larger than 65 535 bits. To overcome this limitation of NIST’s CAVP, we introduce a new test type called the Large Data Test (LDT). The LDT detects vulnerabilities similar to that in CoreCrypto in implementations submitted for validation under FIPS 140-2. Keywords: CVE-2019-8741, FIPS, CAVP, ACVP, Apple, CoreCrypto, hash function, vulnerability. 1 Introduction The security of cryptography in practice relies not only on the resistance of the algorithms against cryptanalytical attacks, but also on the correctness and robustness of their implementations. Software implementations are vulnerable to software faults, also known as bugs. -
State of the Art in Lightweight Symmetric Cryptography
State of the Art in Lightweight Symmetric Cryptography Alex Biryukov1 and Léo Perrin2 1 SnT, CSC, University of Luxembourg, [email protected] 2 SnT, University of Luxembourg, [email protected] Abstract. Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a “lightweight” algorithm is usually designed to satisfy. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (nist...) and international (iso/iec...) standards are listed. We then discuss some trends we identified in the design of lightweight algorithms, namely the designers’ preference for arx-based and bitsliced-S-Box-based designs and simple key schedules. Finally, we argue that lightweight cryptography is too large a field and that it should be split into two related but distinct areas: ultra-lightweight and IoT cryptography. The former deals only with the smallest of devices for which a lower security level may be justified by the very harsh design constraints. The latter corresponds to low-power embedded processors for which the Aes and modern hash function are costly but which have to provide a high level security due to their greater connectivity. Keywords: Lightweight cryptography · Ultra-Lightweight · IoT · Internet of Things · SoK · Survey · Standards · Industry 1 Introduction The Internet of Things (IoT) is one of the foremost buzzwords in computer science and information technology at the time of writing. -
Green Bond Pricing in the Primary Market
GREEN BOND PRICING H1 IN THE PRIMARY MARKET: (Q1-Q2) 2019 January - June 2019 Report highlights • Includes 61 green bonds from 52 issuers with a combined face value of USD56.6bn issued in H1 (Q1-Q2) 2019 • EUR green bonds achieved larger book cover, and greater spread compression than vanilla equivalents, on average • USD green bonds were similar to vanilla equivalents, on average • Two thirds of green bonds in our sample priced without new issue premium • 53% of green bonds were sold to green investors • 28 days after pricing, green bonds tend to have tightened more than their benchmarks, on average • Spotlight on EUR Utility bonds With funding support by Obvion Hyptheken and Lyxor Asset Management Green Bond Pricing in the Primary Market: January - June 2019 1 Introduction Report highlights This is the 8th report in our pricing series, • On average, EUR green bonds achieved • Seven days after pricing, vanilla bonds in which we observe how green bonds larger oversubscription and spread had tightened more than green bonds, on perform in the primary markets. This compression than vanilla equivalents (for average. After 28 days, green bonds had, report includes bonds issued in the first six the same sector and period). on average, tightened more than vanilla months of 2019 (H1 2019). See more on page 3 bonds. See more on pages 12 During this period, USD117bn of green bonds • On average, USD green bonds achieved were issued that complied with the Climate lower oversubscription and spread • In Q3 more green benchmark Utilities Bonds Taxonomy.1 Our analysis for H1 2019 compression than vanilla equivalents. -
Schielke, Samuli. "Destiny As a Relationship." HAU: Journal of Ethnographic Theory 8 (1/2): 343–346
Schielke, Samuli. "Destiny as a relationship." HAU: Journal of Ethnographic Theory 8 (1/2): 343–346. DOI: 10.1086/698268 Destiny as a relationship AFTERWORD to the special section ANTHROPOLOGIES OF DESTINY: ACTION, TEMPORALITY, FREEDOM Samuli Schielke, Leibniz-Zentrum Moderner Orient, Berlin Abstract: This afterword takes a closer look at relationships of power involved in destiny, taking inspiration from questions and answers offered in this special section on anthropologies of destiny. Destiny offers a theory of human action according to which humans can have power over their condition only in accordance and alliance with very powerful or omnipotent superhuman beings or processes, such as the monotheist God, polytheistic pantheons, heaven, planets, but also history, progress, or markets. Who are they? Do they need to be intentional? What kinds of power relations, or “relationship power,” do humans and the superhuman authors of their destiny craft? I return to the opening question of the special section—What does it mean to live a life that has already been written?—and suggest that destiny as an intimate relationships of power is meaningful in the sense that it provides practical, moral answers to the question why. Keywords: predestination, power, relationality, morality, God, divination, Tralfamadore Was the situation just structured that way? It is possible to imagine a destiny that is not a relationship but instead a deterministic causal chain that writes itself without intervention by powerful others. Kurt Vonnegut ([1969] 1979) did so in his novel Slaughterhouse-Five about the firebombing of Dresden, which he witnessed as a young prisoner of war. The protagonist, Billy Pilgrim, travels in time between World War II, a postwar American present, and a near future. -
Data Encryption Standard
Data Encryption Standard The Data Encryption Standard (DES /ˌdiːˌiːˈɛs, dɛz/) is a Data Encryption Standard symmetric-key algorithm for the encryption of electronic data. Although insecure, it was highly influential in the advancement of modern cryptography. Developed in the early 1970s atIBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data. In 1976, after consultation with theNational Security Agency (NSA), the NBS eventually selected a slightly modified version (strengthened against differential cryptanalysis, but weakened against brute-force attacks), which was published as an official Federal Information Processing Standard (FIPS) for the United States in 1977. The publication of an NSA-approved encryption standard simultaneously resulted in its quick international adoption and widespread academic scrutiny. Controversies arose out of classified The Feistel function (F function) of DES design elements, a relatively short key length of the symmetric-key General block cipher design, and the involvement of the NSA, nourishing Designers IBM suspicions about a backdoor. Today it is known that the S-boxes that had raised those suspicions were in fact designed by the NSA to First 1975 (Federal Register) actually remove a backdoor they secretly knew (differential published (standardized in January 1977) cryptanalysis). However, the NSA also ensured that the key size was Derived Lucifer drastically reduced such that they could break it by brute force from [2] attack. The intense academic scrutiny the algorithm received over Successors Triple DES, G-DES, DES-X, time led to the modern understanding of block ciphers and their LOKI89, ICE cryptanalysis.