DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into crypto...DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred to as DNA symmetric-key cryptosystem (DNASC). In DNASC, both encryption and decryption keys are formed by DNA probes, while its ciphertext is embedded in a specially designed DNA chip (microarray). The security of this system is mainly rooted in difficult biology processes and problems, rather than conventional computing technology, thus it is unaffected by changes from the attack of the coming quantum computer. The encryption process is a fabrication of a specially designed DNA chip and the decryption process is the DNA hybridization. In DNASC, billions of DNA probes are hybridized and identified at the same time, thus the decryption process is conducted in a massive, parallel way. The great potential in vast parallelism computation and the extraordinary information density of DNA are displayed in DNASC to some degree.展开更多
With reference to a protection model featuring processes, objects and domains, we consider the salient aspects of the protection problem, domain representation and access right segregation in memory. We propose a solu...With reference to a protection model featuring processes, objects and domains, we consider the salient aspects of the protection problem, domain representation and access right segregation in memory. We propose a solution based on protected references, each consisting of the identifier of an object and the specification of a collection of access rights for this object. The protection system associates an encryption key with each object and each domain. A protected reference for a given object is always part of a domain, and is stored in memory in the ciphertext form that results from application of a double encryption using both the object key and the domain key.展开更多
FUTURE is a recently proposed lightweight block cipher that achieved a remarkable hardware performance due to careful design decisions.FUTURE is an Advanced Encryption Standard(AES)-like Substitution-Permutation Netwo...FUTURE is a recently proposed lightweight block cipher that achieved a remarkable hardware performance due to careful design decisions.FUTURE is an Advanced Encryption Standard(AES)-like Substitution-Permutation Network(SPN)with 10 rounds,whose round function consists of four components,i.e.,SubCell,MixColumn,ShiftRow,and AddRoundKey.Unlike AES,it is a 64-bit-size block cipher with a 128-bit secret key,and the state can be arranged into 16 cells.Therefore,the operations of FUTURE including its S-box is defined over F24.The previous studies have shown that the integral properties of 4-bit S-boxes are usually weaker than larger-size S-boxes,thus the number of rounds of FUTURE,i.e.,10 rounds only,might be too aggressive to provide enough resistance against integral cryptanalysis.In this paper,we mount the integral cryptanalysis on FUTURE.With state-of-the-art detection techniques,we identify several integral distinguishers of 7 rounds of FUTURE.By extending this 7-round distinguisher by 3 forward rounds,we manage to recover all the 128 bits secret keys from the full FUTURE cipher without the full codebook for the first time.To further achieve better time complexity,we also present a key recovery attack on full FUTURE with full codebook.Both attacks have better time complexity than existing results.展开更多
文摘DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred to as DNA symmetric-key cryptosystem (DNASC). In DNASC, both encryption and decryption keys are formed by DNA probes, while its ciphertext is embedded in a specially designed DNA chip (microarray). The security of this system is mainly rooted in difficult biology processes and problems, rather than conventional computing technology, thus it is unaffected by changes from the attack of the coming quantum computer. The encryption process is a fabrication of a specially designed DNA chip and the decryption process is the DNA hybridization. In DNASC, billions of DNA probes are hybridized and identified at the same time, thus the decryption process is conducted in a massive, parallel way. The great potential in vast parallelism computation and the extraordinary information density of DNA are displayed in DNASC to some degree.
文摘With reference to a protection model featuring processes, objects and domains, we consider the salient aspects of the protection problem, domain representation and access right segregation in memory. We propose a solution based on protected references, each consisting of the identifier of an object and the specification of a collection of access rights for this object. The protection system associates an encryption key with each object and each domain. A protected reference for a given object is always part of a domain, and is stored in memory in the ciphertext form that results from application of a double encryption using both the object key and the domain key.
基金supported by the National Natural Science Foundation of China(No.62032014)the National Key Research and Development Program of China(No.2018YFA0704702)the Major Basic Research Project of Natural Science Foundation of Shandong Province,China(No.ZR202010220025).
文摘FUTURE is a recently proposed lightweight block cipher that achieved a remarkable hardware performance due to careful design decisions.FUTURE is an Advanced Encryption Standard(AES)-like Substitution-Permutation Network(SPN)with 10 rounds,whose round function consists of four components,i.e.,SubCell,MixColumn,ShiftRow,and AddRoundKey.Unlike AES,it is a 64-bit-size block cipher with a 128-bit secret key,and the state can be arranged into 16 cells.Therefore,the operations of FUTURE including its S-box is defined over F24.The previous studies have shown that the integral properties of 4-bit S-boxes are usually weaker than larger-size S-boxes,thus the number of rounds of FUTURE,i.e.,10 rounds only,might be too aggressive to provide enough resistance against integral cryptanalysis.In this paper,we mount the integral cryptanalysis on FUTURE.With state-of-the-art detection techniques,we identify several integral distinguishers of 7 rounds of FUTURE.By extending this 7-round distinguisher by 3 forward rounds,we manage to recover all the 128 bits secret keys from the full FUTURE cipher without the full codebook for the first time.To further achieve better time complexity,we also present a key recovery attack on full FUTURE with full codebook.Both attacks have better time complexity than existing results.