Please wait a minute...
Chin. Phys. B, 2017, Vol. 26(10): 100507    DOI: 10.1088/1674-1056/26/10/100507
GENERAL Prev   Next  

Relating Maxwell's demon and quantitative analysis of information leakage for practical imperative programs

Kushal Anjaria, Arun Mishra
Department of Computer Science & Engineering, DIAT, Pune 411025, India
Abstract  Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage in imperative programs. But in the present work, our aim is to go in a reverse direction and try to find possible Maxwell's demon experimental setup for contemporary practical imperative programs in which variations of Shannon's entropy formula has been applied to measure the information leakage. To establish the relation between the second principle of thermodynamics and quantitative analysis of information leakage, present work models contemporary variations of imperative programs in terms of Maxwell's demon experimental setup. In the present work five contemporary variations of imperative program related to information quantification are identified. They are:(i) information leakage in imperative program, (ii) imperative multithreaded program, (iii) point to point leakage in the imperative program, (iv) imperative program with infinite observation, and (v) imperative program in the SOA-based environment. For these variations, minimal work required by an attacker to gain the secret is also calculated using historical Maxwell's demon experiment. To model the experimental setup of Maxwell's demon, non-interference security policy is used. In the present work, imperative programs with one-bit secret information have been considered to avoid the complexity. The findings of the present work from the history of physics can be utilized in many areas related to information flow of physical computing, nano-computing, quantum computing, biological computing, energy dissipation in computing, and computing power analysis.
Keywords:  information      Maxwell's demon      second principle of thermodynamics      information security      reversible system  
Received:  28 April 2017      Revised:  20 July 2017      Accepted manuscript online: 
PACS:  05.70.-a (Thermodynamics)  
  05.70.Ce (Thermodynamic functions and equations of state)  
  07.05.Bx (Computer systems: hardware, operating systems, computer languages, and utilities)  
Corresponding Authors:  Kushal Anjaria     E-mail:  kushal.anjaria@gmail.com

Cite this article: 

Kushal Anjaria, Arun Mishra Relating Maxwell's demon and quantitative analysis of information leakage for practical imperative programs 2017 Chin. Phys. B 26 100507

[1] Maruyama K, Nori F and Vedral V 2009 Rev. Mod. Phys. 81 1
[2] Lutz E and Ciliberto S 2015 Physics Today 68 (9)
[3] Boudol G and Castellani I 2002 Theor. Comput. Sci. 281 109
[4] Denning D E 1976 Commun. ACM 19 236
[5] Gray Ⅲ J W 1992 J. Comput. Secur. 1 255
[6] McLean J 1990 IEEE Proceedings in Computer Society Symposium on Research in Security and Privacy, pp. 180-187
[7] Clark D, Hunt S and Malacaria P 2007 J. Comput. Secur. 15 321
[8] Clark D, Hunt S and Malacaria P 2002 Electronic Notes in Theoretical Computer Science 59 238
[9] Chen H and Malacaria P 2007 in ACM Proceedings of the 2007 Workshop on Programming Languages and Analysis forSsecurity pp. 31——40
[10] Ngo T M and Huisman M 2013 arXiv preprint arXiv:1306.2693
[11] Boreale M 2009 Information and Computation 207 699
[12] Chothia T, Kawamoto Y, Novakovic C and Parker D 2013 in IEEE 26th Computer Security Foundations Symposium, pp. 193-205
[13] Biondi F, Legay A, Nielsen B F, Malacaria P and Wasowski A 2014 in IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science
[14] Kaur D and Kaur P 2016 Procedia Computer Science 78 298
[15] Bennett C H 1973 in Maxwell's Demon, Entropy, Information, Computing, pp. 197-204
[16] McLean J, Millen N J and Gligor V 2001 in Proceedings of the IEEE Workshop on Computer Security Foundations pp. 237——238
[17] Landauer R 1961 IBM J. Res. Develop. (International Business Machines) 5 183 doi:10.1147/rd.53.0183
[18] Malacaria P and Smeraldi F 2013 Information and Computation 226 76
[19] Szilard L 1964 Behavioral Science 9 301
[20] Toyabe S, Sagawa T, Ueda M, Muneyuki E and Sano M 2010 Nat. Phys. 6 988
[21] Ladyman J, Presnell S and Short A J 2008 Studies in History and Philosophy of Science Part B:Studies in History and Philosophy of Modern Physics 39 315
[22] Koski J V, Maisi V F, Pekola J P and Averin D V 2014 Proc. Nat. Acad. Sci. 111 13786
[23] Bennett C H 1982 Int. J. Theor. Phys. 21 905
[24] Erl T 2005 Service-oriented architecture:concepts, technology, and design Pearson Education India
[25] Yamany H F E, Capretz M A and Allison D S 2009 In IEEE Congress on Services-I pp. 653-660
[26] Anjaria K and Mishra A 2017"Quantitative analysis of information leakage in service oriented architecture based web services", Kybernetes, 46 (3)
[27] Clausius R 1879 The mechanical theory of heat, Macmillan
[28] Lef H S and Rex A F 2003 Maxwell's Demon 2:Entropy, Classical and Quantum Information. Computing (Bristol and Philadelphia:Institute of Physics Publishing)
[29] Bérut A, Arakelyan A, Petrosyan A, Ciliberto S, Dillenschneider R and Lutz E 2012 Nature 483 187
[30] Penrose O 2005 Foundations of statistical mechanics:a deductive treatment, Courier Corporation
[31] Landauer R 1961 IBM J. Res. Develop. 5 148
[32] Parrondo J M, Horowitz J M and Sagawa T 2015 Nat. Phys. 11 131
[33] Timler J and Lent C S 2003 J. Appl. Phys. 94 1050
[34] Mandal D and Jarzynski C 2012 Proc. Nat. Acad. Sci. 109 11641
[35] Malacaria P and Smeraldi F 2012 IEEE 25th Computer Security Foundations Symposium, pp. 280-290
[1] Non-Markovianity of an atom in a semi-infinite rectangular waveguide
Jing Zeng(曾静), Yaju Song(宋亚菊), Jing Lu(卢竞), and Lan Zhou(周兰). Chin. Phys. B, 2023, 32(3): 030305.
[2] Topological phase transition in network spreading
Fuzhong Nian(年福忠) and Xia Zhang(张霞). Chin. Phys. B, 2023, 32(3): 038901.
[3] Improving the teleportation of quantum Fisher information under non-Markovian environment
Yan-Ling Li(李艳玲), Yi-Bo Zeng(曾艺博), Lin Yao(姚林), and Xing Xiao(肖兴). Chin. Phys. B, 2023, 32(1): 010303.
[4] Bioinspired tactile perception platform with information encryption function
Zhi-Wen Shi(石智文), Zheng-Yu Ren(任征宇), Wei-Sheng Wang(王伟胜), Hui Xiao(肖惠), Yu-Heng Zeng(曾俞衡), and Li-Qiang Zhu(竺立强). Chin. Phys. B, 2022, 31(9): 098506.
[5] Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
Xiaopeng Yan(闫晓鹏), Xingyuan Wang(王兴元), and Yongjin Xian(咸永锦). Chin. Phys. B, 2022, 31(8): 080504.
[6] Environmental parameter estimation with the two-level atom probes
Mengmeng Luo(罗萌萌), Wenxiao Liu(刘文晓), Yuetao Chen(陈悦涛), Shangbin Han(韩尚斌), and Shaoyan Gao(高韶燕). Chin. Phys. B, 2022, 31(5): 050304.
[7] Relativistic motion on Gaussian quantum steering for two-mode localized Gaussian states
Xiao-Long Gong(龚小龙), Shuo Cao(曹硕), Yue Fang(方越), and Tong-Hua Liu(刘统华). Chin. Phys. B, 2022, 31(5): 050402.
[8] Quantum watermarking based on threshold segmentation using quantum informational entropy
Jia Luo(罗佳), Ri-Gui Zhou(周日贵), Wen-Wen Hu(胡文文), YaoChong Li(李尧翀), and Gao-Feng Luo(罗高峰). Chin. Phys. B, 2022, 31(4): 040302.
[9] Quantum metrology with coherent superposition of two different coded channels
Dong Xie(谢东), Chunling Xu(徐春玲), and Anmin Wang(王安民). Chin. Phys. B, 2021, 30(9): 090304.
[10] Nonequilibrium free energy and information flow of a double quantum-dot system with Coulomb coupling
Zhiyuan Lin(林智远), Tong Fu(付彤), Juying Xiao(肖菊英), Shanhe Su(苏山河), Jincan Chen(陈金灿), and Yanchao Zhang(张艳超). Chin. Phys. B, 2021, 30(8): 080501.
[11] Quantum storage of single photons with unknown arrival time and pulse shapes
Yu You(由玉), Gong-Wei Lin(林功伟), Ling-Juan Feng(封玲娟), Yue-Ping Niu(钮月萍), and Shang-Qing Gong(龚尚庆). Chin. Phys. B, 2021, 30(8): 084207.
[12] Improving the purity of heralded single-photon sources through spontaneous parametric down-conversion process
Jing Wang(王静), Chun-Hui Zhang(张春辉), Jing-Yang Liu(刘靖阳), Xue-Rui Qian(钱雪瑞), Jian Li(李剑), and Qin Wang(王琴). Chin. Phys. B, 2021, 30(7): 070304.
[13] Pre-warning information dissemination models of different media under emergencies
Anying Chen(陈安滢), Haoran Zhu(朱昊然), Xiaoyong Ni(倪晓勇), Guofeng Su(苏国锋). Chin. Phys. B, 2020, 29(9): 094302.
[14] Reversion of weak-measured quantum entanglement state
Shao-Jiang Du(杜少将), Yonggang Peng(彭勇刚), Hai-Ran Feng(冯海冉), Feng Han(韩峰), Lian-Wu Yang(杨连武), Yu-Jun Zheng(郑雨军). Chin. Phys. B, 2020, 29(7): 074202.
[15] Entrainment range affected by the difference in sensitivity to light-information between two groups of SCN neurons
Bao Zhu(朱宝), Jian Zhou(周建), Mengting Jia(贾梦婷), Huijie Yang(杨会杰), Changgui Gu(顾长贵). Chin. Phys. B, 2020, 29(6): 068702.
No Suggested Reading articles found!