中国物理B ›› 2017, Vol. 26 ›› Issue (10): 100507-100507.doi: 10.1088/1674-1056/26/10/100507

• GENERAL • 上一篇    下一篇

Relating Maxwell's demon and quantitative analysis of information leakage for practical imperative programs

Kushal Anjaria, Arun Mishra   

  1. Department of Computer Science & Engineering, DIAT, Pune 411025, India
  • 收稿日期:2017-04-28 修回日期:2017-07-20 出版日期:2017-10-05 发布日期:2017-10-05
  • 通讯作者: Kushal Anjaria E-mail:kushal.anjaria@gmail.com

Relating Maxwell's demon and quantitative analysis of information leakage for practical imperative programs

Kushal Anjaria, Arun Mishra   

  1. Department of Computer Science & Engineering, DIAT, Pune 411025, India
  • Received:2017-04-28 Revised:2017-07-20 Online:2017-10-05 Published:2017-10-05
  • Contact: Kushal Anjaria E-mail:kushal.anjaria@gmail.com

摘要: Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage in imperative programs. But in the present work, our aim is to go in a reverse direction and try to find possible Maxwell's demon experimental setup for contemporary practical imperative programs in which variations of Shannon's entropy formula has been applied to measure the information leakage. To establish the relation between the second principle of thermodynamics and quantitative analysis of information leakage, present work models contemporary variations of imperative programs in terms of Maxwell's demon experimental setup. In the present work five contemporary variations of imperative program related to information quantification are identified. They are:(i) information leakage in imperative program, (ii) imperative multithreaded program, (iii) point to point leakage in the imperative program, (iv) imperative program with infinite observation, and (v) imperative program in the SOA-based environment. For these variations, minimal work required by an attacker to gain the secret is also calculated using historical Maxwell's demon experiment. To model the experimental setup of Maxwell's demon, non-interference security policy is used. In the present work, imperative programs with one-bit secret information have been considered to avoid the complexity. The findings of the present work from the history of physics can be utilized in many areas related to information flow of physical computing, nano-computing, quantum computing, biological computing, energy dissipation in computing, and computing power analysis.

关键词: information, Maxwell', s demon, second principle of thermodynamics, information security, reversible system

Abstract: Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage in imperative programs. But in the present work, our aim is to go in a reverse direction and try to find possible Maxwell's demon experimental setup for contemporary practical imperative programs in which variations of Shannon's entropy formula has been applied to measure the information leakage. To establish the relation between the second principle of thermodynamics and quantitative analysis of information leakage, present work models contemporary variations of imperative programs in terms of Maxwell's demon experimental setup. In the present work five contemporary variations of imperative program related to information quantification are identified. They are:(i) information leakage in imperative program, (ii) imperative multithreaded program, (iii) point to point leakage in the imperative program, (iv) imperative program with infinite observation, and (v) imperative program in the SOA-based environment. For these variations, minimal work required by an attacker to gain the secret is also calculated using historical Maxwell's demon experiment. To model the experimental setup of Maxwell's demon, non-interference security policy is used. In the present work, imperative programs with one-bit secret information have been considered to avoid the complexity. The findings of the present work from the history of physics can be utilized in many areas related to information flow of physical computing, nano-computing, quantum computing, biological computing, energy dissipation in computing, and computing power analysis.

Key words: information, Maxwell's demon, second principle of thermodynamics, information security, reversible system

中图分类号:  (Thermodynamics)

  • 05.70.-a
05.70.Ce (Thermodynamic functions and equations of state) 07.05.Bx (Computer systems: hardware, operating systems, computer languages, and utilities)