This paper presents an efficient crypto processor architecture for key agreement using ECDH(Elliptic-curve Diffie Hellman)protocol over GF2163.The composition of our key-agreement architecture is expressed in consist...This paper presents an efficient crypto processor architecture for key agreement using ECDH(Elliptic-curve Diffie Hellman)protocol over GF2163.The composition of our key-agreement architecture is expressed in consisting of the following:(i)Elliptic-curve Point Multiplication architecture for public key generation(DESIGN-I)and(ii)integration of DESIGN-I with two additional routing multiplexers and a controller for shared key generation(DESIGN-II).The arithmetic operators used in DESIGN-I and DESIGNII contain an adder,squarer,a multiplier and inversion.A simple shift and add multiplication method is employed to retain lower hardware resources.Moreover,an essential inversion operation is operated using the Itoh-Tsujii algorithm with similar hardware resources of used squarer and multiplier units.The proposed architecture is implemented in a Verilog HDL.The implementation results are given on a Xilinx Virtex-7 FPGA(field-programmable gate array)device.For DESIGN-I and DESIGN-II over GF2163,(i)the utilized Slices are 3983 and 4037,(ii)the time to compute one public key and a shared secret is 553.7μs and 1170.7μs and(iii)the consumed power is 29μW and 57μW.Consequently,the achieved area optimized and power reduced results show that the proposed ECDH architecture is a suitable alternative(to generate a shared secret)for the applications that require low hardware resources and power consumption.展开更多
In recent years,various information and communication technology(ICT)devices measuring three-dimensional(3D)point cloud data have been developed and widely used for the application of pavement surface investigation.Ho...In recent years,various information and communication technology(ICT)devices measuring three-dimensional(3D)point cloud data have been developed and widely used for the application of pavement surface investigation.However,ICT devices have generally been developed not only for measuring road surface profiles but for various geo-reference point clouds.In this background,the validation of surface profiles acquired with ICT devices fulfils an important role in proving the reliability of measurement result composed by point clouds.This study proposes a wavelet transform agreement(WTA)which involves a normalization factor of profile amplitude for further improvement in the wavelet-based coherence technique.The WTA analysis allows evaluating similarity/dissimilarity of two profiles considering both the location and wavelength simultaneously.For this purpose,a terrestrial laser scanner(TLS),a mobile mapping system(MMS),and an unmanned aerial vehicle(UAV)are employed to prove the advantage of WTA in practical applications.As a result,the advantages of WTA analysis are clearly recognized in the optimization for the measurement interval of TLS,the multi-line measurement of MMS for ride quality improvement of a pavement,and the efficient operation of UAV in terms of the flight altitude.This paper also shows the identification of aging development for surface roughness over time in terms of locations and wavelengths.These findings help not only to guarantee the accuracy of profile measurements but to realize the sophisticated way of using 3D point clouds acquired with ICT devices.The outcomes of this study contribute to the increase of productivity for pavement works with improving the quality of surface profile measurement.展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
基金We acknowledge the support of Deanship of Scientific Research at King Khalid University for funding this work under grant number R.G.P.1/399/42.
文摘This paper presents an efficient crypto processor architecture for key agreement using ECDH(Elliptic-curve Diffie Hellman)protocol over GF2163.The composition of our key-agreement architecture is expressed in consisting of the following:(i)Elliptic-curve Point Multiplication architecture for public key generation(DESIGN-I)and(ii)integration of DESIGN-I with two additional routing multiplexers and a controller for shared key generation(DESIGN-II).The arithmetic operators used in DESIGN-I and DESIGNII contain an adder,squarer,a multiplier and inversion.A simple shift and add multiplication method is employed to retain lower hardware resources.Moreover,an essential inversion operation is operated using the Itoh-Tsujii algorithm with similar hardware resources of used squarer and multiplier units.The proposed architecture is implemented in a Verilog HDL.The implementation results are given on a Xilinx Virtex-7 FPGA(field-programmable gate array)device.For DESIGN-I and DESIGN-II over GF2163,(i)the utilized Slices are 3983 and 4037,(ii)the time to compute one public key and a shared secret is 553.7μs and 1170.7μs and(iii)the consumed power is 29μW and 57μW.Consequently,the achieved area optimized and power reduced results show that the proposed ECDH architecture is a suitable alternative(to generate a shared secret)for the applications that require low hardware resources and power consumption.
基金A part of this research was supported by the Grant-in-aid for Scientific Research(C)grant number 19K04634 of the Japan Society for the Promotion of Science(JSPS).
文摘In recent years,various information and communication technology(ICT)devices measuring three-dimensional(3D)point cloud data have been developed and widely used for the application of pavement surface investigation.However,ICT devices have generally been developed not only for measuring road surface profiles but for various geo-reference point clouds.In this background,the validation of surface profiles acquired with ICT devices fulfils an important role in proving the reliability of measurement result composed by point clouds.This study proposes a wavelet transform agreement(WTA)which involves a normalization factor of profile amplitude for further improvement in the wavelet-based coherence technique.The WTA analysis allows evaluating similarity/dissimilarity of two profiles considering both the location and wavelength simultaneously.For this purpose,a terrestrial laser scanner(TLS),a mobile mapping system(MMS),and an unmanned aerial vehicle(UAV)are employed to prove the advantage of WTA in practical applications.As a result,the advantages of WTA analysis are clearly recognized in the optimization for the measurement interval of TLS,the multi-line measurement of MMS for ride quality improvement of a pavement,and the efficient operation of UAV in terms of the flight altitude.This paper also shows the identification of aging development for surface roughness over time in terms of locations and wavelengths.These findings help not only to guarantee the accuracy of profile measurements but to realize the sophisticated way of using 3D point clouds acquired with ICT devices.The outcomes of this study contribute to the increase of productivity for pavement works with improving the quality of surface profile measurement.
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.