{"title":"Information leakage through passive timing attacks on RSA decryption system","authors":"Tomonori Hirata, Y. Kaji","doi":"10.1587/transfun.2022tap0006","DOIUrl":"https://doi.org/10.1587/transfun.2022tap0006","url":null,"abstract":"The threat of timing attacks is especially serious when an attacker actively controls the input to a target program. Countermeasures are studied to deter such active attacks, but the attacker still has the chance to learn something about the concealed information by passively watching the running time of the target program. The risk of passive timing attacks can be measured by the mutual information between the concealed information and the running time. However, the computation of the mutual information is hardly possible except for toy examples. This study focuses on three algorithms for RSA decryption, derives formulas of the mutual information under several assumptions and approximations, and calculates the mutual information numerically for practical security parameters.","PeriodicalId":347402,"journal":{"name":"2020 International Symposium on Information Theory and Its Applications (ISITA)","volume":"430 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115993376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Upper Bounds on the Error Probability for the Ensemble of Linear Block Codes with Mismatched Decoding","authors":"T. Niinomi, H. Yagi, S. Hirasawa","doi":"10.1587/transfun.2021tap0001","DOIUrl":"https://doi.org/10.1587/transfun.2021tap0001","url":null,"abstract":"In this paper, applying the technique of the DS2 bound, we derive an upper bound on the error probability of mismatched decoding with the ensemble of linear block codes, which was defined by Hof, Sason and Shamai. Assuming the ensemble of random linear block codes defined by Gallager, we show that the obtained bound is not looser than the conventional bound.","PeriodicalId":347402,"journal":{"name":"2020 International Symposium on Information Theory and Its Applications (ISITA)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116836436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Equivalent Expression for the Wyner-Ziv Source Coding Problem","authors":"Tetsunao Matsuta, T. Uyematsu","doi":"10.1587/transfun.2021tap0005","DOIUrl":"https://doi.org/10.1587/transfun.2021tap0005","url":null,"abstract":"We consider the coding problem for lossy source coding with side information at the decoder, which is known as the Wyner-Ziv source coding problem. The goal of the coding problem is to find the minimum rate such that the probability of exceeding a given distortion threshold is less than the desired level. We give an equivalent expression of the minimum rate by using the chromatic number and a notion of covering of a set. This allows us to analyze the coding problem in terms of graph coloring and covering.","PeriodicalId":347402,"journal":{"name":"2020 International Symposium on Information Theory and Its Applications (ISITA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121397304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The relation between Proportion test and Uniformity test in NIST SP800-22","authors":"Atsushi Iwasaki","doi":"10.34385/PROC.65.C01-8","DOIUrl":"https://doi.org/10.34385/PROC.65.C01-8","url":null,"abstract":"NIST SP800-22 statistical test tool is one of the randomness test suites. It consists of 15 kinds of tests, and each test outputs the p-value for a sequence. Each test outputs multiple p-values when we test plural sequences. SP800-22 suggests to perform additional hypothesis tests for the multiple p-values, called the proportion test and the uniformity test, and judge the randomness of the tested sequences. To make a rational criterion for the two tests, the relation between the proportion test and the uniformity test is essential. In this paper, we derive the probability that both the proportion and uniformity tests simultaneously reject the null hypothesis. In the derivation process, we use a numerical method, but it is not a stochastic algorithm. Thus, we can ensure the properness of the derived value of the probability.","PeriodicalId":347402,"journal":{"name":"2020 International Symposium on Information Theory and Its Applications (ISITA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133111122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decoding LDPC Codes with Probabilistic Local Maximum Likelihood Bit Flipping","authors":"R. Mathews, C. Winstead","doi":"10.26076/4CC6-05E6","DOIUrl":"https://doi.org/10.26076/4CC6-05E6","url":null,"abstract":"Low-density parity-check (LDPC) codes are high-performance linear error correcting codes with application to communication channels and digital storage media. LDPC codes are decoded using graph algorithms wherein a channel message sample is decoded with the aid of information from its adjacent graph neighborhood, called the syndrome. This work studies the conditional probability of a channel error given syndrome information at a particular decoding iteration to formulate a new algorithm called Probabilistic Local Maximum Likelihood Bit Flipping (PLMLBF). The PLMLBF algorithm uses a three dimensional Multi-iteration Probability Flip Matrix (MIPFM) to quantify the frequency of errors in a noise corrupted message frame being decoded using a specific LDPC code. The matrix is used to probabilistically decode noise corrupted message frames. The motivation for this work is to provide a theoretical framework for constructing probabilistic and noisy bit-flipping algorithms, such as the Noisy Gradient Descent Bit Flipping (NGDBF) algorithm, which up to now have been mainly heuristic in nature.","PeriodicalId":347402,"journal":{"name":"2020 International Symposium on Information Theory and Its Applications (ISITA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130713611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Basis Matrices of a Visual Cryptography Scheme with Meaningful Shares and Analysis of Its Security","authors":"Kyohei Sekine, H. Koga","doi":"10.1587/TRANSFUN.2020DMP0010","DOIUrl":"https://doi.org/10.1587/TRANSFUN.2020DMP0010","url":null,"abstract":"The extended visual cryptography scheme (EVCS) proposed by Ateniese et al. is one variation of the visual cryptography scheme such that a secret image is recovered from certain qualified collections of meaningful shares that are distributed to respective participants. In this paper, we give a new definition of the EVCS for improving visibility of the recovered secret image as well as the shares. We construct optimal basis matrices with the minimum number of pixel expansion by solving a certain integer programming problem. We also analyze security of the EVCS meeting the new definition from information-theoretic viewpoint.","PeriodicalId":347402,"journal":{"name":"2020 International Symposium on Information Theory and Its Applications (ISITA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121543507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Carrier Differential Trellis-Coded Modulation/Demodulation Employing Multiple Differential Detection with Channel Prediction","authors":"Tetsuro Kubo, H. Kubo","doi":"10.2299/JSP.25.163","DOIUrl":"https://doi.org/10.2299/JSP.25.163","url":null,"abstract":"This paper proposes a multi-carrier (MC) modulation scheme employing differential trellis-coded modulation (DTCM) and multiple differential detection with channel prediction in order to cope with doubly-selective fading at the good required signal-to-noise power ratio (SNR), where doubly-selective channels correspond to severe time/frequency-selective channels. For frequency-selective fading, MC modulation schemes are effective. For time-selective fading, multiple differential detection employing per-survivor processing (PSP-MDD) with channel prediction is effective. However, channel prediction degrades the required SNR for PSP-MDD. In order to cope with doubly-selective fading and improve the required SNR, this paper proposes MC-DTCM employing PSP-MDD with channel prediction. Finally, computer simulation results show that the proposed scheme can improve both the performance for doubly-selective fading and the required SNR compared with the conventional PSP-MDD with channel prediction.","PeriodicalId":347402,"journal":{"name":"2020 International Symposium on Information Theory and Its Applications (ISITA)","volume":"12 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131301331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Construction of Binary Punctured Linear Codes and A Supporting Method for Best Code Search","authors":"Takuya Ohara, Makoto Takita, M. Morii","doi":"10.1587/transfun.2021tap0007","DOIUrl":"https://doi.org/10.1587/transfun.2021tap0007","url":null,"abstract":"Reduction of redundancy and improvement of error-correcting capability are essential research themes in the coding theory. The best codes constructed in various ways are recorded in a database maintained by Markus Grassl. In this paper, we propose an algorithm to construct the best code using punctured codes and a supporting method for constructing the best codes. First, we define a new evaluation function to determine deletion bits and propose an algorithm for constructing punctured linear codes. 36 best codes were constructed in the proposed algorithm, and 131 best codes were constructed by further modifying those best codes. Secondly, we evaluate the possibility of increasing the minimum distance based on the relationship between code length, information length, and minimum distance. We narrowed down the target (n,k) code to try the best code search based on the evaluation and found 30 other best codes.","PeriodicalId":347402,"journal":{"name":"2020 International Symposium on Information Theory and Its Applications (ISITA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124604192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decoding Algorithms of Monotone Codes and Azinv Codes and Their Unified View","authors":"Hokuto Takahashi, M. Hagiwara","doi":"10.1007/s10623-021-01004-0","DOIUrl":"https://doi.org/10.1007/s10623-021-01004-0","url":null,"abstract":"","PeriodicalId":347402,"journal":{"name":"2020 International Symposium on Information Theory and Its Applications (ISITA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130066404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}