Public-Private Sector Relationships in a New Security Environment

Total Page:16

File Type:pdf, Size:1020Kb

Public-Private Sector Relationships in a New Security Environment BUSINESS AND SECURITY PUBLIC–PRIVATE SECTOR RELATIONSHIPS IN A NEW SECURITY ENVIRONMENT EDITED BY ALYSON J. K. BAILES AND ISABEL FROMMELT Business and Security Public–Private Sector Relationships in a New Security Environment Stockholm International Peace Research Institute SIPRI is an independent international institute for research into problems of peace and conflict, especially those of arms control and disarmament. It was established in 1966 to commemorate Sweden’s 150 years of unbroken peace. The Institute is financed mainly by a grant proposed by the Swedish Government and subsequently approved by the Swedish Parliament. The staff and the Governing Board are international. The Institute also has an Advisory Committee as an international consultative body. The Governing Board is not responsible for the views expressed in the publications of the Institute. Governing Board Ambassador Rolf Ekéus, Chairman (Sweden) Sir Marrack Goulding, Vice-Chairman (United Kingdom) Dr Alexei G. Arbatov (Russia) Dr Willem F. van Eekelen (Netherlands) Dr Nabil Elaraby (Egypt) Professor Helga Haftendorn (Germany) Professor Ronald G. Sutherland (Canada) The Director Director Alyson J. K. Bailes (United Kingdom) Stockholm International Peace Research Institute Signalistgatan 9, SE-169 70 Solna, Sweden Telephone: 46 8/655 97 00 Telefax: 46 8/655 97 33 Email: [email protected] Internet URL: http://www.sipri.org Business and Security Public–Private Sector Relationships in a New Security Environment Edited by Alyson J. K. Bailes and Isabel Frommelt OXFORD UNIVERSITY PRESS 2004 OXFORD UNIVERSITY PRESS Great Clarendon Street, Oxford OX2 6DP Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Bangkok Buenos Aires Cape Town Chennai Dar es Salaam Delhi Hong Kong Istanbul Karachi Kolkata Kuala Lumpur Madrid Melbourne Mexico City Mumbai Nairobi São Paulo Shanghai Taipei Tokyo Toronto Oxford is a registered trade mark of Oxford University Press in the UK and certain other countries Published in the United States by Oxford University Press Inc., New York © SIPRI 2004 First published 2004 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of SIPRI or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organizations. Enquiries concerning reproduction outside the scope of the above should be sent to SIPRI, Signalistgatan 9, SE-169 70 Solna, Sweden You must not circulate this book in any other binding or cover and you must impose the same condition on any acquirer British Library Cataloguing in Publication Data Data available Library of Congress Cataloguing in Publication Data Data available ISBN 0-19-927450-9 Typeset and originated by Stockholm International Peace Research Institute Printed in Great Britain on acid-free paper by Biddles Ltd., King’s Lynn, Norfolk Contents Preface xi Acronyms xiii Introduction 1 Business and security: public–private sector interface and interdependence at the turn of the 21st century Alyson J. K. Bailes I. Introduction: interdependence old and new 1 II. 11 September 2001 as catalyst 5 III. Two years on: new agenda items, second thoughts? 8 IV. Other players, other interests 18 V. This book 23 Part I. The general framework: goals and norms Editors’ remarks 1. Security and the responsibilities of the public and private sectors 27 István Gyarmati I. Introduction 27 II. New threats, new thinking 28 III. The new role of the private sector 30 IV. Conclusions 31 2. Public–private sector cooperation 33 Erik Belfrage I. Introduction: the development of modern terrorism 33 II. The role of private corporations in the provision of security 34 3. What price values? 37 Daniel Tarschys I. The ambivalence of value and the obscurity of price 37 II. Values in public policy and in the European institutions 38 III. Envoi 44 Part II. Cutting off resources for terrorism and crime: the global and European dimensions Editors’ remarks 4. An international response to terrorism 47 Claes Norgren I. Introduction 47 II. Terrorism: a threat to the international community 48 vi BUSINESS AND SECURITY III. Countering terrorism 51 IV. Measures to counter terrorist financing 52 V. Success or failure? 54 VI. The way forward 56 VII. Conclusions 58 5. Counter-terrorism measures undertaken under UN Security 59 Council auspices Thomas J. Biersteker I. Introduction 59 II. The role of the UN Security Council in efforts to counter 60 terrorist financing after 11 September 2001 III. An assessment of the effectiveness of UN Security Council 63 measures IV. Legal issues, problems and challenges 67 V. Conclusions 73 6. Strategic export controls and the private sector 76 Evan R. Berlack I. Introduction 76 II. The US approach 76 III. The evolution of international approaches to export controls 78 after 1945 IV. Characteristics and limitations of existing regimes 79 V. The impact of new priorities: non-proliferation and terrorism 81 VI. Conclusions 82 7. The European Union: new threats and the problem of coherence 84 Niall Burgess and David Spence I. Introduction 84 II. The EU’s policy responses to the September 2001 attacks 87 III. Remaining challenges for the EU 95 IV. Conclusions 100 8. Banking in an international and European framework: 102 the case of Liechtenstein Georges S. Baur I. Introduction 102 II. International initiatives 103 III. New developments in international law 103 IV. Liechtenstein as an example 104 V. The private sector 107 VI. Future developments 109 9. The resources and tactics of terrorism: a view from Russia 111 Vadim Volkov I. Introduction 111 II. The dual role of states 112 C ONTENTS vii III. Asymmetric warfare 113 IV. The social resources of terrorism 115 V. Conclusions 118 Part III. Business and conflict Editors’ remarks 10. Business investment, humanitarian problems and conflict 121 John J. Maresca I. Introduction 121 II. Conflict as the multiplier of humanitarian problems 122 III. Differentiating legitimate business from criminal activity 122 IV. Why invest in conflict-torn areas? 123 V. The business–humanitarian relationship 123 VI. The special role of resource companies 124 VII. Meeting security requirements 125 VIII. Respect for human rights 125 IX. The role of sanctions 127 X. The need for business–humanitarian dialogue and 128 cooperation 11. Conflict diamonds: the De Beers Group and the Kimberley 129 Process Andrew Bone I. Introduction 129 II. The Kimberley Process 133 III. An example well set? 135 Annex 11A. The Kimberley Process Certification Scheme 140 12. Oil and conflict: Lundin Petroleum’s experience in Sudan 148 Christine Batruch I. Introduction 148 II. Sudan’s war 148 III. Lundin in Sudan 150 IV. Lessons learned 160 13. The role of humanitarian organizations: the case of the 161 International Committee of the Red Cross Gilles Carbonnier I. Introduction 161 II. Business and the economy in conflict prevention 162 III. Challenges for business in conflict areas 164 IV. Dialogue between companies and the ICRC 166 V. Conclusions 169 viii BUS INES S AND SECURITY Part IV. Preserving the legitimate economy and critical infrastructure Editors’ remarks 14. The security of business: a view from the security industry 173 Crispin Black I. Introduction 173 II. The services available 174 III. Survival planning: never a state monopoly? 175 IV. Terrorism and intelligence 177 V. Conclusions 181 15. Survival planning for business: a view from Nokia 183 Urho Ilmonen I. Current threat assessment 183 II. What has changed after 11 September 2001? 183 III. Why is security needed and what is the focus? 184 IV. Vulnerabilities and attacks increase 184 V. Emergency response and business planning 185 VI. Partnership with the authorities? 185 VII. Conclusions 186 16. Defending against cyber terrorism: preserving the legitimate 187 economy Olivia Bosch I. Introduction 187 II. Cyber terrorism 187 III. Attribution and business continuity planning 191 IV. Globalization and the role of business in cyber security 193 V. Conclusions 195 17. The concept of critical infrastructure protection 197 Jan Metzger I. Introduction 197 II. CIP from an operational perspective 197 III. CIP from a conceptual perspective 200 IV. Criticality 201 V. Conclusions and recommendations 207 18. Critical energy system infrastructure protection in Europe and 210 the legitimate economy Kevin Rosner I. Introduction 210 II. Implications of the new European security framework 211 III. Developing CESI protection models and strategies 214 IV. Conclusions 216 CONTENTS ix Part V. The economic consequences of terrorism: can we afford to be safe? Editors’ remarks 19. The economic consequences of terrorism 219 Patrick Lenain I. Introduction: the shock of the new 219 II. A less safe world 220 III. Is the private sector spending more on security? 222 IV. The insurance problem 223 V. Tighter border controls and their costs 225 VI. The impact of growing security and military spending: has 227 the ‘peace dividend’ been reversed? VII. Conclusions 230 Box 19.1 New cargo-inspection procedures 226 Table 19.1. US Government spending on national defence, fiscal years 228 2000–2003 Part VI. The security–economy linkage in a global perspective Editors’ remarks 20. A view from the League of Arab States 235 Saad Alfarargi I. Introduction 235 II. Obstacles to a just system of collective global security and 236 governance III. Rich men’s and poor men’s agendas 237 IV. The way to a common agenda? 239 21. A view from Africa 242 Said Adejumobi I. Introduction 242 II. Terrorism: the political and economic dimensions 243 III. ‘Business as terror’ in Africa 245 IV. Prioritizing security in Africa 250 V. Conclusions 252 Annex. A comment on immigration controls and education in the 255 United States Phyllis O. Bonanno x BUSINESS AND SECURITY Appendices Isabel Frommelt 1. Institutions in the field of security, active or interested in the 261 public–private sector interface: government and international institutions, academic and research bodies, and non-governmental organizations 2.
Recommended publications
  • Vector Boolean Functions: Applications in Symmetric Cryptography
    Vector Boolean Functions: Applications in Symmetric Cryptography José Antonio Álvarez Cubero Departamento de Matemática Aplicada a las Tecnologías de la Información y las Comunicaciones Universidad Politécnica de Madrid This dissertation is submitted for the degree of Doctor Ingeniero de Telecomunicación Escuela Técnica Superior de Ingenieros de Telecomunicación November 2015 I would like to thank my wife, Isabel, for her love, kindness and support she has shown during the past years it has taken me to finalize this thesis. Furthermore I would also liketo thank my parents for their endless love and support. Last but not least, I would like to thank my loved ones such as my daughter and sisters who have supported me throughout entire process, both by keeping me harmonious and helping me putting pieces together. I will be grateful forever for your love. Declaration The following papers have been published or accepted for publication, and contain material based on the content of this thesis. 1. [7] Álvarez-Cubero, J. A. and Zufiria, P. J. (expected 2016). Algorithm xxx: VBF: A library of C++ classes for vector Boolean functions in cryptography. ACM Transactions on Mathematical Software. (In Press: http://toms.acm.org/Upcoming.html) 2. [6] Álvarez-Cubero, J. A. and Zufiria, P. J. (2012). Cryptographic Criteria on Vector Boolean Functions, chapter 3, pages 51–70. Cryptography and Security in Computing, Jaydip Sen (Ed.), http://www.intechopen.com/books/cryptography-and-security-in-computing/ cryptographic-criteria-on-vector-boolean-functions. (Published) 3. [5] Álvarez-Cubero, J. A. and Zufiria, P. J. (2010). A C++ class for analysing vector Boolean functions from a cryptographic perspective.
    [Show full text]
  • A Preliminary Empirical Study to Compare MPI and Openmp ISI-TR-676
    A preliminary empirical study to compare MPI and OpenMP ISI-TR-676 Lorin Hochstein, Victor R. Basili December 2011 Abstract Context: The rise of multicore is bringing shared-memory parallelism to the masses. The community is struggling to identify which parallel models are most productive. Objective: Measure the effect of MPI and OpenMP models on programmer productivity. Design: One group of programmers solved the sharks and fishes problem using MPI and a second group solved the same problem using OpenMP, then each programmer switched models and solved the same problem again. The participants were graduate students in an HPC course. Measures: Development effort (hours), program correctness (grades), pro- gram performance (speedup versus serial implementation). Results: Mean OpenMP development time was 9.6 hours less than MPI (95% CI, 0.37 − 19 hours), a 43% reduction. No statistically significant difference was observed in assignment grades. MPI performance was better than OpenMP performance for 4 out of the 5 students that submitted correct implementations for both models. Conclusions: OpenMP solutions for this problem required less effort than MPI, but insufficient power to measure the effect on correctness. The perfor- mance data was insufficient to draw strong conclusions but suggests that unop- timized MPI programs perform better than unoptimized OpenMP programs, even with a similar parallelization strategy. Further studies are necessary to examine different programming problems, models, and levels of programmer experience. Chapter 1 INTRODUCTION In the high-performance computing community, the dominant parallel pro- gramming model today is MPI, with OpenMP as a distant but clear second place [1,2]. MPI’s advantage over OpenMP on distributed memory systems is well-known, and consequently MPI usage dominates in large-scale HPC sys- tems.
    [Show full text]
  • Christmas Stars Many Use the Coco-Cola Advert As Their Favourite First Sign of Christmas but at St
    December 2018 Christmas Stars Many use the Coco-Cola advert as their favourite first sign of Christmas but at St. Ed’s it is always our Nativity performances that signal Christmas is on its way! This year, our traditional nativity was performed by our Form 1 and Form 2 children who entertained their proud audience with an array of new festive songs including ‘A Great Big Star’ and “It’s a squash, it’s a squeeze”. #St. Ed’s defies anybody who left the Chapel that day without a tear in their eye! The following day it was our Early Years children who turned the Chapel into a winter wonderland of animals helping Rudolph who had lost his nose! After all of the animals kindly offered Rudolph alternatives, including a carrot and a star, it was Mr Walliker himself who saved the day as Rudolph’s nose appeared in his pocket! Thank Christmas for Mr Walliker! Congratulations to our Ties! Welcome Many congratulations to Ella Chauhan, Madelaine Murrin, Jake Paterson, Guy van Baby Michael Oudtshoorn and Erin Wilson who were awarded their Prefect “ties” this term. Voted for by the school staff, the “ties” role is to support the Heads of Prep Mr Church School, Kitty and Freddie, and assume particular responsibilities in and around the and his wife school. Quoting Churchill, “the price of greatness is responsibility” so well done Jitka are to you all for your more than deserving recognition. delighted to announce the birth of their son, Michael who arrived in this world on Saturday 17th November at 8.00 am weighing in at 8 lbs.
    [Show full text]
  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
    International Journal of Grid and Distributed Computing Vol. 10, No. 11 (2017), pp.79-98 http://dx.doi.org/10.14257/ijgdc.2017.10.11.08 Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1 Rahul Saha1, G. Geetha2, Gulshan Kumar3 and Hye-Jim Kim4 1,3School of Computer Science and Engineering, Lovely Professional University, Punjab, India 2Division of Research and Development, Lovely Professional University, Punjab, India 4Business Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of Korea Abstract Cryptography has always been a core component of security domain. Different security services such as confidentiality, integrity, availability, authentication, non-repudiation and access control, are provided by a number of cryptographic algorithms including block ciphers, stream ciphers and hash functions. Though the algorithms are public and cryptographic strength depends on the usage of the keys, the ciphertext analysis using different functions and operations used in the algorithms can lead to the path of revealing a key completely or partially. It is hard to find any survey till date which identifies different operations and functions used in cryptography. In this paper, we have categorized our survey of cryptographic functions and operations in the algorithms in three categories: block ciphers, stream ciphers and cryptanalysis attacks which are executable in different parts of the algorithms. This survey will help the budding researchers in the society of crypto for identifying different operations and functions in cryptographic algorithms. Keywords: cryptography; block; stream; cipher; plaintext; ciphertext; functions; research problems 1. Introduction Cryptography [1] in the previous time was analogous to encryption where the main task was to convert the readable message to an unreadable format.
    [Show full text]
  • A Brief Outlook at Block Ciphers
    A Brief Outlook at Block Ciphers Pascal Junod Ecole¶ Polytechnique F¶ed¶eralede Lausanne, Suisse CSA'03, Rabat, Maroc, 10-09-2003 Content F Generic Concepts F DES / AES F Cryptanalysis of Block Ciphers F Provable Security CSA'03, 10 septembre 2003, Rabat, Maroc { i { Block Cipher P e d P C K K CSA'03, 10 septembre 2003, Rabat, Maroc { ii { Block Cipher (2) F Deterministic, invertible function: e : {0, 1}n × K → {0, 1}n d : {0, 1}n × K → {0, 1}n F The function is parametered by a key K. F Mapping an n-bit plaintext P to an n-bit ciphertext C: C = eK(P ) F The function must be a bijection for a ¯xed key. CSA'03, 10 septembre 2003, Rabat, Maroc { iii { Product Ciphers and Iterated Block Ciphers F A product cipher combines two or more transformations in a manner intending that the resulting cipher is (hopefully) more secure than the individual components. F An iterated block cipher is a block cipher involving the sequential repeti- tion of an internal function f called a round function. Parameters include the number of rounds r, the block bit size n and the bit size k of the input key K from which r subkeys ki (called round keys) are derived. For invertibility purposes, the round function f is a bijection on the round input for each value ki. CSA'03, 10 septembre 2003, Rabat, Maroc { iv { Product Ciphers and Iterated Block Ciphers (2) P K f k1 f k2 f kr C CSA'03, 10 septembre 2003, Rabat, Maroc { v { Good and Bad Block Ciphers F Flexibility F Throughput F Estimated Security Level CSA'03, 10 septembre 2003, Rabat, Maroc { vi { Data Encryption Standard (DES) F American standard from (1976 - 1998).
    [Show full text]
  • The Block Cipher SC2000
    The Block Cipher SC2000 Takeshi Shimoyama1, Hitoshi Yanami1, Kazuhiro Yokoyama1, Masahiko Takenaka2, Kouichi Itoh2, Jun Yajima2, Naoya Torii2, and Hidema Tanaka3 1 Fujitsu Laboratories LTD. 4-1-1, Kamikodanaka Nakahara-ku Kawasaki 211-8588, Japan {shimo,yanami,kayoko}@flab.fujitsu.co.jp 2 Fujitsu Laboratories LTD. 64, Nishiwaki, Ohkubo-cho, Akashi 674-8555, Japan {takenaka,kito,jyajima,torii}@flab.fujitsu.co.jp 3 Science University of Tokyo Yamazaki, Noda, Chiba, 278 Japan [email protected] Abstract. In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256-bit key lengths. The block cipher is constructed by piling two layers: one is a Feistel structure layer and the other is an SPN structure layer. Each operation used in two layers is S-box or logical operation, which has been well studied about security. It is a strong feature of the cipher that the fast software implementations are available by using the techniques of putting together S-boxes in various ways and of the Bitslice implementation. 1 Introduction In this paper, we propose a new block cipher SC2000. The algorithm has 128-bit data inputs and outputs and 128-bit, 192-bit, and 256-bit keys can be used. Our design policy for the cipher is to enable high-speed in software and hardware processing on various platforms while maintaining the high-level security as ci- pher. The cipher is constructed by piling a Feistel and an SPN structures with S-boxes for realizing those properties. For evaluation of security, we inspect the security in the design against dif- ferential attacks, linear attacks, higher order differential attacks, interpolation attacks, and so on.
    [Show full text]
  • Basic Cryptanalysis Methods on Block Ciphers
    1 BASIC CRYPTANALYSIS METHODS ON BLOCK CIPHERS A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF APPLIED MATHEMATICS OF MIDDLE EAST TECHNICAL UNIVERSITY BY DILEK˙ C¸ELIK˙ IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN CRYPTOGRAPHY MAY 2010 Approval of the thesis: BASIC CRYPTANALYSIS METHODS ON BLOCK CIPHERS submitted by DILEK˙ C¸ELIK˙ in partial fulfillment of the requirements for the degree of Master of Science in Department of Cryptography, Middle East Technical University by, Prof. Dr. Ersan AKYILDIZ Director, Graduate School of Applied Mathematics Prof. Dr. Ferruh OZBUDAK¨ Head of Department, Cryptography Assoc. Prof. Dr. Ali DOGANAKSOY˘ Supervisor, Department of Mathematics, METU Examining Committee Members: Prof. Dr. Ferruh OZBUDAK¨ Department of Mathematics, METU Assoc. Prof. Dr. Ali DOGANAKSOY˘ Department of Mathematics, METU Assist. Prof. Dr. Zulf¨ ukar¨ SAYGI Department of Mathematics, TOBB ETU Dr. Muhiddin UGUZ˘ Department of Mathematics, METU Dr. Murat CENK Department of Cryptography, METU Date: I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Name, Last Name: DILEK˙ C¸ELIK˙ Signature : iii ABSTRACT BASIC CRYPTANALYSIS METHODS ON BLOCK CIPHERS C¸elik, Dilek M.S., Department of Cryptography Supervisor : Assoc. Prof. Dr. Ali DOGANAKSOY˘ May 2010, 119 pages Differential cryptanalysis and linear cryptanalysis are the first significant methods used to at- tack on block ciphers. These concepts compose the keystones for most of the attacks in recent years.
    [Show full text]
  • Image Munitions and the Continuation of War and Politics by Other Means
    _________________________________________________________________________Swansea University E-Theses Image warfare in the war on terror: Image munitions and the continuation of war and politics by other means. Roger, Nathan Philip How to cite: _________________________________________________________________________ Roger, Nathan Philip (2010) Image warfare in the war on terror: Image munitions and the continuation of war and politics by other means.. thesis, Swansea University. http://cronfa.swan.ac.uk/Record/cronfa42350 Use policy: _________________________________________________________________________ This item is brought to you by Swansea University. Any person downloading material is agreeing to abide by the terms of the repository licence: copies of full text items may be used or reproduced in any format or medium, without prior permission for personal research or study, educational or non-commercial purposes only. The copyright for any work remains with the original author unless otherwise specified. The full-text must not be sold in any format or medium without the formal permission of the copyright holder. Permission for multiple reproductions should be obtained from the original author. Authors are personally responsible for adhering to copyright and publisher restrictions when uploading content to the repository. Please link to the metadata record in the Swansea University repository, Cronfa (link given in the citation reference above.) http://www.swansea.ac.uk/library/researchsupport/ris-support/ Image warfare in the war on terror: Image munitions and the continuation of war and politics by other means Nathan Philip Roger Submitted to the University of Wales in fulfilment of the requirements for the Degree of Doctor of Philosophy. Swansea University 2010 ProQuest Number: 10798058 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted.
    [Show full text]
  • Applying Conditional Linear Cryptanalysis to Ciphers with Key- Dependant Operations
    Applying Conditional Linear Cryptanalysis to Ciphers with Key- Dependant Operations REINER DOJEN TOM COFFEY Data Communications Security Laboratory Department of Electronic and Computer Engineering University of Limerick IRELAND Abstract: - Linear cryptanalysis has been proven to be a powerful attack that can be applied to a number of symmetric block ciphers. However, conventional linear cryptanalysis is ineffective in attacking ciphers that use key-dependent operations, such as ICE, Lucifer and SAFER. In this paper conditional linear cryptanalysis, which uses characteristics that depend on some key-bit values, is introduced. This technique and its application to symmetric ciphers are analysed. The consequences of using key-dependent characteristics are explained and a formal notation of conditional linear cryptanalysis is presented. As a case study, conditional linear cryptanalysis is applied to the ICE cipher, which uses key-dependant operations to improve resistance against cryptanalysis. A successful attack on ThinICE using the new technique is presented. Further, experimental work supporting the effectiveness of conditional linear cryptanalysis is also detailed., Key-Words: - Cryptography, Cryptanalysis, Linear cryptanalysis, Symmetric ciphers, Attack 1 Introduction In contrast to differential cryptanalysis, linear As the volume of data transmitted over the world's cryptanalysis uses linear approximations to describe expanding communication networks increases so the F-function of a block cipher. Thus, if some also does the demand for data security services such plaintext bits and ciphertext bits are XORed as confidentiality and integrity. This protection can together, then the result equals the XOR of some be achieved by using either a public key cipher or a bits of the key (with a probability p, for the key) and symmetric cipher.
    [Show full text]
  • ACUSON SC2000TM Volume Imaging Ultrasound System
    ACUSON SC2000TM Volume Imaging Ultrasound System XXXXXXXXXXXXxxXXXXXXXXXXXXXXXXXXXX DICOM Conformance Statement Version VA16D, VA16E 30-Sept-2011 © Siemens Healthcare 2011 All rights reserved Siemens Healthcare, Henkestr. 127, D-91052 Erlangen, Germany Headquarters: Berlin and Munich Siemens AG, Wittelsbacher Platz 2, D-80333 Munich, Germany ACUSON SC2000TM is a trademark of Siemens Healthcare. TM ACUSON SC2000 Volume Imaging Ultrasound System DICOM Conformance Statement CONFORMANCE STATEMENT OVERVIEW The ACUSON SC2000TM Volume Imaging Ultrasound System supports the following DICOM Application Entities: - Verification o Verification AE - Transfer o Storage AE o Storage Commitment AE - Query / Retrieve o Query AE o Retrieve AE - Workflow Management o Worklist AE o MPPS AE Table 1. NETWORK SERVICES Service Class User Service Class Provider SOP Classes (SCU) (SCP) VERIFICATION Verification AE Verification Yes Yes TRANSFER Storage AE Ultrasound Image Storage Yes Yes Ultrasound Multi-frame Image Storage Yes Yes Secondary Capture Image Storage Yes Yes Comprehensive SR Yes Yes Raw Data Storage Yes Yes Storage Commitment AE Storage Commitment Push Model Yes No QUERY / RETRIEVE Query AE Study Root Query/Retrieve Information Model – FIND Yes No Retrieve AE Study Root Query/Retrieve Information Model – MOVE Yes No WORKFLOW MANAGEMENT Worklist AE Modality Worklist Yes No MPPS AE MPPS (N-Create, N-Set) Yes No © Siemens Healthcare, 2011 Version VA16D/E Page 2 of 111 TM ACUSON SC2000 Volume Imaging Ultrasound System DICOM Conformance Statement Table
    [Show full text]
  • Research Problems in Block Cipher Cryptanalysis: an Experimental Analysis Amandeep, G
    International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8S3, June 2019 Research Problems in Block Cipher Cryptanalysis: An Experimental Analysis Amandeep, G. Geetha Abstract: Cryptography has always been a very concerning Organization of this paper is as follows. Section 2 lists the issue in research related to digital security. The dynamic need of Block ciphers in a chronological order in a table having six applications and keeping online transactions secure have been columns stating name of the algorithm, year of publication, giving pathways to the need of developing different its cryptographic strategies. Though a number of cryptographic structure, block size, key size, and the cryptanalysis done on algorithms have been introduced till now, but each of these algorithms has its own disadvantages or weaknesses which are that particular cipher. This table becomes the basis of the identified by the process of cryptanalysis. This paper presents a analysis done in Section 3 and tabulates the information as to survey of different block ciphers and the results of attempts to which structure has been cryptanalyzed more, thereby identify their weakness. Depending upon the literature review, establishing a trend of structures analyzed Section 4 some open research problems are being presented which the identifies the open research problems based on the analysis cryptologists can depend on to work for bettering cyber security. done in Section 3. Section 5 of the paper, presents the conclusion of this study. Index Terms: block ciphers, cryptanalysis, attacks, SPN, Feistel. II. RELATED WORK I. INTRODUCTION This paper surveys 69 block ciphers and presents, in Cryptography is the science which deals with Table I, a summarized report as per the attacks concerned.
    [Show full text]
  • Secure Implementation of Block Ciphers Against Physical Attacks Dahmun Goudarzi
    Secure Implementation of Block Ciphers against Physical Attacks Dahmun Goudarzi To cite this version: Dahmun Goudarzi. Secure Implementation of Block Ciphers against Physical Attacks. Cryptography and Security [cs.CR]. ENS Paris - Ecole Normale Supérieure de Paris, 2018. English. tel-01896103v2 HAL Id: tel-01896103 https://hal.inria.fr/tel-01896103v2 Submitted on 24 Dec 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE DE DOCTORAT de l’Université de recherche Paris Sciences et Lettres PSL Research University Préparée à l’École normale supérieure Secure Implementation of Block Ciphers against Physical Attacks École doctorale n◦386 Sciences Mathématiques de Paris Centre Spécialité Informatique COMPOSITION DU JURY Mme. Canteaut Anne INRIA Paris Examinatrice M. Fouque Pierre-Alain Université de Rennes 1 Rapporteur Mme. Handschuh Helena Rambus Soutenue par Examinatrice Dahmun Goudarzi M. Pointcheval David le 21 septembre 2018 CNRS, École normale supérieure Examinateur M. Renault Guénaël Dirigée par ANSSI Matthieu Rivain et Examinateur Damien Vergnaud M. Rivain Matthieu CryptoExperts Directeur de thèse M. Schwabe Peter RESEARCH UNIVERSITY PARIS Radboud University ÉCOLE NORMALE SUPÉRIEURE Rapporteur M. Vergnaud Damien UPMC Directeur de thèse Secure Implementation of Block Ciphers against Physical Attacks Dahmun Goudarzi Thèse de doctorat dirigée par Matthieu Rivain et Damien Vergnaud Résumé Depuis leur introduction à la fin des années 1990, les attaques par canaux auxiliaires sont considérées comme une menace majeure contre les implémentations cryptographiques.
    [Show full text]