-
Leveraging AES Padding: dBs for Nothing and FEC for Free in IoT Systems
Authors:
Jongchan Woo,
Vipindev Adat Vasudevan,
Benjamin D. Kim,
Rafael G. L. D'Oliveira,
Alejandro Cohen,
Thomas Stahlbuhk,
Ken R. Duffy,
Muriel Médard
Abstract:
The Internet of Things (IoT) represents a significant advancement in digital technology, with its rapidly growing network of interconnected devices. This expansion, however, brings forth critical challenges in data security and reliability, especially under the threat of increasing cyber vulnerabilities. Addressing the security concerns, the Advanced Encryption Standard (AES) is commonly employed…
▽ More
The Internet of Things (IoT) represents a significant advancement in digital technology, with its rapidly growing network of interconnected devices. This expansion, however, brings forth critical challenges in data security and reliability, especially under the threat of increasing cyber vulnerabilities. Addressing the security concerns, the Advanced Encryption Standard (AES) is commonly employed for secure encryption in IoT systems. Our study explores an innovative use of AES, by repurposing AES padding bits for error correction and thus introducing a dual-functional method that seamlessly integrates error-correcting capabilities into the standard encryption process. The integration of the state-of-the-art Guessing Random Additive Noise Decoder (GRAND) in the receiver's architecture facilitates the joint decoding and decryption process. This strategic approach not only preserves the existing structure of the transmitter but also significantly enhances communication reliability in noisy environments, achieving a notable over 3 dB gain in Block Error Rate (BLER). Remarkably, this enhanced performance comes with a minimal power overhead at the receiver - less than 15% compared to the traditional decryption-only process, underscoring the efficiency of our hardware design for IoT applications. This paper discusses a comprehensive analysis of our approach, particularly in energy efficiency and system performance, presenting a novel and practical solution for reliable IoT communications.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
On the Benefits of Coding for Network Slicing
Authors:
Homa Esfahanizadeh,
Vipindev Adat Vasudevan,
Benjamin D. Kim,
Shruti Siva,
Jennifer Kim,
Alejandro Cohen,
Muriel Médard
Abstract:
Network slicing has emerged as an integral concept in 5G, aiming to partition the physical network infrastructure into isolated slices, customized for specific applications. We theoretically formulate the key performance metrics of an application, in terms of goodput and delivery delay, at a cost of network resources in terms of bandwidth. We explore an un-coded communication protocol that uses fe…
▽ More
Network slicing has emerged as an integral concept in 5G, aiming to partition the physical network infrastructure into isolated slices, customized for specific applications. We theoretically formulate the key performance metrics of an application, in terms of goodput and delivery delay, at a cost of network resources in terms of bandwidth. We explore an un-coded communication protocol that uses feedback-based repetitions, and a coded protocol, implementing random linear network coding and using coding-aware acknowledgments. We find that coding reduces the resource demands of a slice to meet the requirements for an application, thereby serving more applications efficiently. Coded slices thus free up resources for other slices, be they coded or not. Based on these results, we propose a hybrid approach, wherein coding is introduced selectively in certain network slices. This approach not only facilitates a smoother transition from un-coded systems to coded systems but also reduces costs across all slices. Theoretical findings in this paper are validated and expanded upon through real-time simulations of the network.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation
Authors:
Benjamin D. Kim,
Vipindev Adat Vasudevan,
Jongchan Woo,
Alejandro Cohen,
Rafael G. L. D'Oliveira,
Thomas Stahlbuhk,
Muriel Médard
Abstract:
The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems has an extensive history. However, estimating MI between unknown random variables in a high-dimensional space is challenging. Recent advances in machine learning have enabled progress in estimating MI using neural networks. This work presents a novel application of MI estimation in the field of cryptography…
▽ More
The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems has an extensive history. However, estimating MI between unknown random variables in a high-dimensional space is challenging. Recent advances in machine learning have enabled progress in estimating MI using neural networks. This work presents a novel application of MI estimation in the field of cryptography. We propose applying this methodology directly to estimate the MI between plaintext and ciphertext in a chosen plaintext attack. The leaked information, if any, from the encryption could potentially be exploited by adversaries to compromise the computational security of the cryptosystem. We evaluate the efficiency of our approach by empirically analyzing multiple encryption schemes and baseline approaches. Furthermore, we extend the analysis to novel network coding-based cryptosystems that provide individual secrecy and study the relationship between information leakage and input distribution.
△ Less
Submitted 18 September, 2023; v1 submitted 14 September, 2023;
originally announced September 2023.
-
Effective versions of two theorems of Rado
Authors:
Jason Bell,
Daryl Funk,
Byoung Du Kim,
Dillon Mayhew
Abstract:
Let $M$ be a representable matroid on $n$ elements. We give bounds, in terms of $n$, on the least positive characteristic and smallest field over which $M$ is representable.
Let $M$ be a representable matroid on $n$ elements. We give bounds, in terms of $n$, on the least positive characteristic and smallest field over which $M$ is representable.
△ Less
Submitted 24 October, 2019; v1 submitted 28 February, 2018;
originally announced February 2018.
-
Construction of Anti-Cyclotomic Euler Systems of Abelian Varieties Associated to $X_1(N)$
Authors:
Daeyeol Jeon. Byoung Du Kim,
Chang Heon Kim
Abstract:
Let $K$ be an imaginary quadratic field, $N$ be a positive integer, $f(z)$ be a newform of level $Γ_1(N)$, and $A_f$ be the abelian variety associated to $f$. For each $τ\in K$ ($\operatorname{Im} τ>0$), we construct a certain point $P_τ$ on $A_f$ defined over an extended ring class field of $K$ of level $N$. Our construction generalizes Birch's construction of the Heegner points to the abelian va…
▽ More
Let $K$ be an imaginary quadratic field, $N$ be a positive integer, $f(z)$ be a newform of level $Γ_1(N)$, and $A_f$ be the abelian variety associated to $f$. For each $τ\in K$ ($\operatorname{Im} τ>0$), we construct a certain point $P_τ$ on $A_f$ defined over an extended ring class field of $K$ of level $N$. Our construction generalizes Birch's construction of the Heegner points to the abelian varieties associated to modular forms of level $Γ_1(N)$ and nontrivial character. Then, we show that $P_τ$'s satisfy the distribution and congruence relations of an Euler system, which implies that it should be possible to apply the Euler system techniques to them to show a relation between the non-torsionness of $P_τ$ and the rank of $A_f(K)$.
△ Less
Submitted 24 October, 2017;
originally announced October 2017.
-
Ranks of rational points of the Jacobian varieties of hyperelliptic curves
Authors:
Bo-Hae Im,
Byoung Du Kim
Abstract:
In this paper, we obtain bounds for the Mordell-Weil ranks over cyclotomic extensions of a wide range of abelian varieties defined over a number field $F$ whose primes above $p$ are totally ramified over $F/\mathbb{Q}$. We assume that the abelian varieties may have good non-ordinary reduction at those primes. Our work is a generalization of \cite{Kim}, in which the second author generalized Perrin…
▽ More
In this paper, we obtain bounds for the Mordell-Weil ranks over cyclotomic extensions of a wide range of abelian varieties defined over a number field $F$ whose primes above $p$ are totally ramified over $F/\mathbb{Q}$. We assume that the abelian varieties may have good non-ordinary reduction at those primes. Our work is a generalization of \cite{Kim}, in which the second author generalized Perrin-Riou's Iwasawa theory for elliptic curves over $\mathbb{Q}$ with supersingular reduction (\cite{Perrin-Riou}) to elliptic curves defined over the above-mentioned number field $F$. On top of non-ordinary reduction and the ramification of the field $F$, we deal with the additional difficulty that the dimensions of the abelian varieties can be any number bigger than 1 which causes a variety of issues. As a result, we obtain bounds for the ranks over cyclotomic extensions $\mathbb{Q}(μ_{p^{\max(M,N)+n}})$ of the Jacobian varieties of {\it ramified} hyperelliptic curves $y^{2p^M}=x^{3p^N}+ax^{p^N}+b$ among others.
△ Less
Submitted 25 February, 2017;
originally announced February 2017.
-
Ranks of the Rational Points of Abelian Varieties over Ramified Fields, and Iwasawa Theory for Primes with Non-Ordinary Reduction
Authors:
Byoung Du Kim
Abstract:
Let $A$ be an abelian variety defined over a number field $F$. Suppose its dual abelian variety $A'$ has good non-ordinary reduction at the primes above $p$. Let $F_{\infty}/F$ be a $\mathbb Z_p$-extension, and for simplicity, assume that there is only one prime $\mathfrak p$ of $F_{\infty}$ above $p$, and $F_{\infty, \mathfrak p}/\mathbb Q_p$ is totally ramified and abelian. (For example, we can…
▽ More
Let $A$ be an abelian variety defined over a number field $F$. Suppose its dual abelian variety $A'$ has good non-ordinary reduction at the primes above $p$. Let $F_{\infty}/F$ be a $\mathbb Z_p$-extension, and for simplicity, assume that there is only one prime $\mathfrak p$ of $F_{\infty}$ above $p$, and $F_{\infty, \mathfrak p}/\mathbb Q_p$ is totally ramified and abelian. (For example, we can take $F=\mathbb Q(ζ_{p^N})$ for some $N$, and $F_{\infty}=\mathbb Q(ζ_{p^{\infty}})$.) As Perrin-Riou did, we use Fontaine's theory of group schemes to construct series of points over each $F_{n, \mathfrak p}$ which satisfy norm relations associated to the Dieudonne module of $A'$ (in the case of elliptic curves, simply the Euler factor at $\mathfrak p$), and use these points to construct characteristic power series $\bf L_α \in \mathbb Q_p[[X]]$ analogous to Mazur's characteristic polynomials in the case of good ordinary reduction. By studying $\bf L_α$, we obtain a weak bound for $\text{rank} E(F_n)$.
In the second part, we establish a more robust Iwasawa Theory for elliptic curves, and find a better bound for their ranks under the following conditions: Take an elliptic curve $E$ over a number field $F$. The conditions for $F$ and $F_{\infty}$ are the same as above. Also as above, we assume $E$ has supersingular reduction at $\mathfrak p$. We discover that we can construct series of local points which satisfy finer norm relations under some conditions related to the logarithm of $E/F_{\mathfrak p}$. Then, we apply Sprung's and Perrin-Riou's insights to construct \textit{integral} characteristic polynomials $\bf L_{alg}^{\sharp}$ and $\bf L_{alg}^{\flat}$. One of the consequences of this construction is that if $\bf L_{alg}^{\sharp}$ and $\bf L_{alg}^{\flat}$ are not divisible by a certain power of $p$, then $E(F_{\infty})$ has a finite rank modulo torsions.
△ Less
Submitted 10 August, 2016;
originally announced August 2016.