FAIR Data Pipeline: provenance-driven data management for traceable scientific workflows
Authors:
Sonia Natalie Mitchell,
Andrew Lahiff,
Nathan Cummings,
Jonathan Hollocombe,
Bram Boskamp,
Ryan Field,
Dennis Reddyhoff,
Kristian Zarebski,
Antony Wilson,
Bruno Viola,
Martin Burke,
Blair Archibald,
Paul Bessell,
Richard Blackwell,
Lisa A Boden,
Alys Brett,
Sam Brett,
Ruth Dundas,
Jessica Enright,
Alejandra N. Gonzalez-Beltran,
Claire Harris,
Ian Hinder,
Christopher David Hughes,
Martin Knight,
Vino Mano
, et al. (13 additional authors not shown)
Abstract:
Modern epidemiological analyses to understand and combat the spread of disease depend critically on access to, and use of, data. Rapidly evolving data, such as data streams changing during a disease outbreak, are particularly challenging. Data management is further complicated by data being imprecisely identified when used. Public trust in policy decisions resulting from such analyses is easily da…
▽ More
Modern epidemiological analyses to understand and combat the spread of disease depend critically on access to, and use of, data. Rapidly evolving data, such as data streams changing during a disease outbreak, are particularly challenging. Data management is further complicated by data being imprecisely identified when used. Public trust in policy decisions resulting from such analyses is easily damaged and is often low, with cynicism arising where claims of "following the science" are made without accompanying evidence. Tracing the provenance of such decisions back through open software to primary data would clarify this evidence, enhancing the transparency of the decision-making process. Here, we demonstrate a Findable, Accessible, Interoperable and Reusable (FAIR) data pipeline developed during the COVID-19 pandemic that allows easy annotation of data as they are consumed by analyses, while tracing the provenance of scientific outputs back through the analytical source code to data sources. Such a tool provides a mechanism for the public, and fellow scientists, to better assess the trust that should be placed in scientific evidence, while allowing scientists to support policy-makers in openly justifying their decisions. We believe that tools such as this should be promoted for use across all areas of policy-facing research.
△ Less
Submitted 4 May, 2022; v1 submitted 13 October, 2021;
originally announced October 2021.
Using carry-truncated addition to analyze add-rotate-xor hash algorithms
Authors:
Rebecca E. Field,
Brant C. Jones
Abstract:
We introduce a truncated addition operation on pairs of N-bit binary numbers that interpolates between ordinary addition mod 2^N and bitwise addition in (Z/2Z)^N. We use truncated addition to analyze hash functions that are built from the bit operations add, rotate, and xor, such as Blake, Skein, and Cubehash. Any ARX algorithm can be approximated by replacing ordinary addition with truncated addi…
▽ More
We introduce a truncated addition operation on pairs of N-bit binary numbers that interpolates between ordinary addition mod 2^N and bitwise addition in (Z/2Z)^N. We use truncated addition to analyze hash functions that are built from the bit operations add, rotate, and xor, such as Blake, Skein, and Cubehash. Any ARX algorithm can be approximated by replacing ordinary addition with truncated addition, and we define a metric on such algorithms which we call the {\bf sensitivity}. This metric measures the smallest approximation agreeing with the full algorithm a statistically useful portion of the time (we use 0.1%). Because truncated addition greatly reduces the complexity of the non-linear operation in ARX algorithms, the approximated algorithms are more susceptible to both collision and pre-image attacks, and we outline a potential collision attack explicitly. We particularize some of these observations to the Skein hash function.
△ Less
Submitted 18 March, 2013;
originally announced March 2013.