Globalization of microchip fabrication opens the possibility for an attacker to insert hardware Trojans into a chip during the manufacturing process. While most defensive methods focus on detection or prevention, a recent method, called Randomized Encoding of Combinational Logic for Resistance to Data Leakage (RECORD), uses data randomization to prevent hardware Trojans from leaking meaningful information even when the entire design is known to the attacker. Both RECORD and its sequential variant require significant area and power overhead. In this paper, a Time-Division Multiplexed version of the RECORD design process is proposed which reduces area overhead by 63% and power by 56%. This time-division multiplexing (TDM) concept is further refined to allow commercial off the shelf (COTS) products and IP cores to be safely operated from a separate chip. These new methods tradeoff latency (5.3× for TDM and 3.9× for COTS) and energy use to accomplish area and power savings and achieve greater security than the original RECORD process.
Hiding voice data in center density of speech spectrum for secure transmissioneSAT Journals
Abstract
Speech data is becoming an effective and indispensable way for fast information transmission but associated with it are number of
unprecedented threats. The idea of this paper is to present a robust speech watermarking method to realize secure voice data
transmission. In this method carrier is transformed into frequency domain. Pre-processed normalized covert voice data
undergoes exponential transformation which is then substituted in center density of high frequency, high energy subband of
carrier. High frequency components are chosen for embedding watermark for two reasons. First, during transmission carrier
might get contaminated with noise and filteration generally suppress low frequency components so embedding in high frequency
component will keep watermark intact. Second reason is human ears are less sensitive to high frequencies so slight change in
amplitude of high frequency components is imperceptible.. Technique uses frequency masking, invisible, and blind approach also.
By applying reverse approach sensitive message can be extracted from the watermarked carrier. For embedding and retrieving
watermark secret key have been used. Experimental results have shown that proposed method does not change the size of the
cover signal even after embedding, does not degrade the quality of carrier and exhibit vigorous voice data hiding performance.
Proposed work can be used in those applications where maintaining integrity and secrecy about the information against
intentional or unintentional access is given utmost importance.
KeyWords: Index Terms- Exponential, Frequency Masking, Musical sequence, Speech watermarking, secure voice
data, signal to noise ratio
Design of an area efficient million-bit integer multiplier using double modul...Nxfee Innovation
This brief proposes a double modulus number theoretical transform (NTT) method for million-bit integer multiplication in fully homomorphic encryption. In our method, each NTT point is processed simultaneously under two moduli, and the final result is generated through the Chinese reminder theorem. The employment of double modulus enlarges the permitted NTT sample size from 24 to 32 bits and thus improves the transform efficiency. Based on the proposed double modulus method, we accomplish a VLSI design of million-bit integer multiplier with the Schönhage–Strassen algorithm. Implementation results on Altera Stratix-V FPGA show that this brief is able to compute a product of two 1024k-bit integers every 4.9 ms at the cost of only 7.9k ALUTs and 3.6k registers, which is more area-efficient when compared with the current competitors.
Analysis and design of cost effective, high-throughput ldpc decodersNxfee Innovation
This paper introduces a new approach to cost effective, high-throughput hardware designs for low-density parity-check (LDPC) decoders. The proposed approach, called nonsurjective finite alphabet iterative decoders (NS-FAIDs), exploits the robustness of message-passing LDPC decoders to inaccuracies in the calculation of exchanged messages, and it is shown to provide a unified framework for several designs previously proposed in the literature. NS-FAIDs are optimized by density evolution for regular and irregular LDPC codes, and are shown to provide different tradeoffs between hardware complexity and decoding performance. Two hardware architectures targeting high-throughput applications are also proposed, integrating both Min-Sum (MS) and NS-FAID decoding kernels. ASIC post synthesis implementation results on 65-nm CMOS technology show that NS-FAIDs yield significant improvements in the throughput to area ratio, by up to 58.75% with respect to the MS decoder, with even better or only slightly degraded error correction performance.
Feedback based low-power soft-error-tolerant design for dual-modular redundancyNxfee Innovation
Triple-modular redundancy (TMR), which consists of three identical modules and a voting circuit, is a common architecture for soft-error tolerance. However, the original TMR suffers from two major drawbacks: the large area overhead and the vulnerability of the voter. In order to overcome these drawbacks, we propose a new complementary dual-modular redundancy (CDMR) scheme for mitigating the effect of soft errors. Inspired by the Markov random field (MRF) theory, a two-stage voting system is implemented in CDMR, including a first stage optimal MRF structure and a second-stage high-performance merging unit. The CDMR scheme can reduce the voting circuit area by 20% while saving the area of one redundant module, achieving at least 26% error-rate reduction at an ultralow supply voltage of 0.25 V with 8.33% faster timing compared to previous voter designs.
Securing the present block cipher against combined side channel analysis and ...Nxfee Innovation
In this paper, we present and evaluate a hardware implementation of the PRESENT block cipher secured against both side-channel analysis and fault attacks (FAs). The side-channel security is provided by the first-order threshold implementation masking scheme of the serialized PRESENT proposed by Poschmann et al. For the FA resistance, we employ the Private Circuits II countermeasure presented by Ishai et al. at Eurocrypt 2006, which we tailor to resist arbitrary 1-bit faults. We perform a side-channel evaluation using the state-of-the-art leakage detection tests, quantify the resource overhead of the Private Circuits II countermeasure, subdue the implementation to established differential FAs against the PRESENT block cipher, and contemplate on the structural resistance of the countermeasure. This paper provides the detailed instructions on how to successfully achieve a secure Private Circuits II implementation for the data path as well as the control logic.
Design and fpga implementation of a reconfigurable digital down converter for...Nxfee Innovation
This brief presents a field-programmable gate array-based implementation of a reconfigurable digital down converter (DDC) that can process input bandwidth of up to 3.6 GHz and provide a flexible down-converted output. The proposed DDC consists of a mixer and a resampling filter. The resampling filter can work at much higher clock rate. The reason is that all the single-cycle recursive loops in the re sampling filter are pipelined by using either real/imaginary part-time multiplexing or parallel processing technique. With features like arbitrary sampling rate conversion, and dynamic configuration, the proposed design is highly flexible, so that it can generate a down-converted output with sampling rate, selectable within the range of 1 kS/s–225 MS/s. Moreover, the flexibility is further improved by being able to specify the output sampling rate and center frequency to a resolution of less than 1 S/s. The experimental results show that the proposed design can achieve the same functionality as the existing work but with fewer hardware resources.
Cyber security course in kerala | C|PENT | Blitz Academyamallblitz0
Become a skilled cyber security professional in Kerala with the comprehensive C|PENT course at Blitz Academy. Gain hands-on experience and training. Contact now!
Hiding voice data in center density of speech spectrum for secure transmissioneSAT Journals
Abstract
Speech data is becoming an effective and indispensable way for fast information transmission but associated with it are number of
unprecedented threats. The idea of this paper is to present a robust speech watermarking method to realize secure voice data
transmission. In this method carrier is transformed into frequency domain. Pre-processed normalized covert voice data
undergoes exponential transformation which is then substituted in center density of high frequency, high energy subband of
carrier. High frequency components are chosen for embedding watermark for two reasons. First, during transmission carrier
might get contaminated with noise and filteration generally suppress low frequency components so embedding in high frequency
component will keep watermark intact. Second reason is human ears are less sensitive to high frequencies so slight change in
amplitude of high frequency components is imperceptible.. Technique uses frequency masking, invisible, and blind approach also.
By applying reverse approach sensitive message can be extracted from the watermarked carrier. For embedding and retrieving
watermark secret key have been used. Experimental results have shown that proposed method does not change the size of the
cover signal even after embedding, does not degrade the quality of carrier and exhibit vigorous voice data hiding performance.
Proposed work can be used in those applications where maintaining integrity and secrecy about the information against
intentional or unintentional access is given utmost importance.
KeyWords: Index Terms- Exponential, Frequency Masking, Musical sequence, Speech watermarking, secure voice
data, signal to noise ratio
Design of an area efficient million-bit integer multiplier using double modul...Nxfee Innovation
This brief proposes a double modulus number theoretical transform (NTT) method for million-bit integer multiplication in fully homomorphic encryption. In our method, each NTT point is processed simultaneously under two moduli, and the final result is generated through the Chinese reminder theorem. The employment of double modulus enlarges the permitted NTT sample size from 24 to 32 bits and thus improves the transform efficiency. Based on the proposed double modulus method, we accomplish a VLSI design of million-bit integer multiplier with the Schönhage–Strassen algorithm. Implementation results on Altera Stratix-V FPGA show that this brief is able to compute a product of two 1024k-bit integers every 4.9 ms at the cost of only 7.9k ALUTs and 3.6k registers, which is more area-efficient when compared with the current competitors.
Analysis and design of cost effective, high-throughput ldpc decodersNxfee Innovation
This paper introduces a new approach to cost effective, high-throughput hardware designs for low-density parity-check (LDPC) decoders. The proposed approach, called nonsurjective finite alphabet iterative decoders (NS-FAIDs), exploits the robustness of message-passing LDPC decoders to inaccuracies in the calculation of exchanged messages, and it is shown to provide a unified framework for several designs previously proposed in the literature. NS-FAIDs are optimized by density evolution for regular and irregular LDPC codes, and are shown to provide different tradeoffs between hardware complexity and decoding performance. Two hardware architectures targeting high-throughput applications are also proposed, integrating both Min-Sum (MS) and NS-FAID decoding kernels. ASIC post synthesis implementation results on 65-nm CMOS technology show that NS-FAIDs yield significant improvements in the throughput to area ratio, by up to 58.75% with respect to the MS decoder, with even better or only slightly degraded error correction performance.
Feedback based low-power soft-error-tolerant design for dual-modular redundancyNxfee Innovation
Triple-modular redundancy (TMR), which consists of three identical modules and a voting circuit, is a common architecture for soft-error tolerance. However, the original TMR suffers from two major drawbacks: the large area overhead and the vulnerability of the voter. In order to overcome these drawbacks, we propose a new complementary dual-modular redundancy (CDMR) scheme for mitigating the effect of soft errors. Inspired by the Markov random field (MRF) theory, a two-stage voting system is implemented in CDMR, including a first stage optimal MRF structure and a second-stage high-performance merging unit. The CDMR scheme can reduce the voting circuit area by 20% while saving the area of one redundant module, achieving at least 26% error-rate reduction at an ultralow supply voltage of 0.25 V with 8.33% faster timing compared to previous voter designs.
Securing the present block cipher against combined side channel analysis and ...Nxfee Innovation
In this paper, we present and evaluate a hardware implementation of the PRESENT block cipher secured against both side-channel analysis and fault attacks (FAs). The side-channel security is provided by the first-order threshold implementation masking scheme of the serialized PRESENT proposed by Poschmann et al. For the FA resistance, we employ the Private Circuits II countermeasure presented by Ishai et al. at Eurocrypt 2006, which we tailor to resist arbitrary 1-bit faults. We perform a side-channel evaluation using the state-of-the-art leakage detection tests, quantify the resource overhead of the Private Circuits II countermeasure, subdue the implementation to established differential FAs against the PRESENT block cipher, and contemplate on the structural resistance of the countermeasure. This paper provides the detailed instructions on how to successfully achieve a secure Private Circuits II implementation for the data path as well as the control logic.
Design and fpga implementation of a reconfigurable digital down converter for...Nxfee Innovation
This brief presents a field-programmable gate array-based implementation of a reconfigurable digital down converter (DDC) that can process input bandwidth of up to 3.6 GHz and provide a flexible down-converted output. The proposed DDC consists of a mixer and a resampling filter. The resampling filter can work at much higher clock rate. The reason is that all the single-cycle recursive loops in the re sampling filter are pipelined by using either real/imaginary part-time multiplexing or parallel processing technique. With features like arbitrary sampling rate conversion, and dynamic configuration, the proposed design is highly flexible, so that it can generate a down-converted output with sampling rate, selectable within the range of 1 kS/s–225 MS/s. Moreover, the flexibility is further improved by being able to specify the output sampling rate and center frequency to a resolution of less than 1 S/s. The experimental results show that the proposed design can achieve the same functionality as the existing work but with fewer hardware resources.
Cyber security course in kerala | C|PENT | Blitz Academyamallblitz0
Become a skilled cyber security professional in Kerala with the comprehensive C|PENT course at Blitz Academy. Gain hands-on experience and training. Contact now!
Become a skilled cyber security professional in Kerala with the comprehensive C|PENT course at Blitz Academy. Gain hands-on experience and training. Contact now!
https://blitzacademy.org/coursedetail.php?course_cat=9&course_id=2&Certified-Penetration-Testing-Professional-in-kerala
A high accuracy programmable pulse generator with a 10-ps timing resolutionNxfee Innovation
Automatic test equipment must have high-precision and low-power pulse generators (PGs) for testing memory and device-under-test ICs. This paper describes a high-accuracy and wide-data-rate-range PG with a 10-ps time resolution. The PG comprises an edge combiner (EC) and a multiphase clock generator (MPCG). The EC can produce an arbitrary waveform through 32 phase outputs of the MPCG. The EC adopts a one/zero detector and phase selection logic to define an operational data rate range and a timing resolution, respectively. Therefore, the EC uses the phase selection logic to combine the period window of the one/zero detector with the MPCG output phases. The EC also uses a countdown counter for a wide operational range. In the MPCG, a multiphase oscillator (MPO) adopts a ring oscillator scheme with sub feedback loops to extend its maximum operational frequency. The MPO also uses a phase error corrector to reduce the output phase error resulting from process and layout mismatches. Thus, the PG can obtain high accuracy waveforms owing to small phase errors. The test chip was implemented using a 0.13-µm CMOS process. The core area and power consumption of the PG were measured to be 250 × 300 µm2 and 18.7 mW, respectively. The data rate range of the PG was determined to be from 3.2 kHz to 893 MHz. The time resolution and average accuracy of the PG were measured to be 10 ps and ±0.3 LSB, respectively.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Privacy preserving public auditing for regenerating-code-based cloud storageLeMeniz Infotech
Privacy preserving public auditing for regenerating-code-based cloud storage
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
A reconfigurable ldpc decoder optimized applicationsNxfee Innovation
This paper presents a high data-rate low-density parity-check (LDPC) decoder, suitable for the 802.11n/ac (WiFi) standard. The innovative features of the proposed decoder relate to the decoding algorithms and the interconnection between the processing elements. The reduction of the hardware complexity of decoders based on the min-sum (MS) algorithms comes at the cost of performance degradation, especially at high-noise regions. We introduce more accurate approximations of the log sum-product algorithm that also operate well for low signal-to noise ratio values. Telecommunication standards, including WiFi, support more than one quasi-cyclic LDPC codes of different characteristics, such as codeword length and code rate. A proposed design technique derives networks, capable of supporting a variety of codes and efficiently realizing connectivity between a variable number of processing units, with a relatively small hardware overhead over the single-code case. As a demonstration of the proposed technique, we implemented a reconfigurable network based on barrel rotators, suitable for LDPC decoders compatible with WiFi standard. Our approach achieves low complexity and high clock frequency, compared with related prior works. A 90-nm application-specified integrated circuit implementation of the proposed high-parallel WiFi decoder occupies 4.88 mm2 and achieves an information throughput rate of 4.5 G bit/s at a clock frequency of 555 MHz.
Cyber security course in kerala | C|PENT | Blitz Academyamallblitz0
Become a skilled cyber security professional in Kerala with the comprehensive C|PENT course at Blitz Academy. Gain hands-on experience and training. Contact now!
Become a skilled cyber security professional in Kerala with the comprehensive C|PENT course at Blitz Academy. Gain hands-on experience and training. Contact now!
https://blitzacademy.org/coursedetail.php?course_cat=9&course_id=2&Certified-Penetration-Testing-Professional-in-kerala
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one
developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with
the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
Approximate hybrid high radix encoding for energy efficient inexact multipliersNxfee Innovation
Approximate computing forms a design alternative that exploits the intrinsic error resilience of various applications and produces energy-efficient circuits with small accuracy loss. In this paper, we propose an approximate hybrid high radix encoding for generating the partial products in signed multiplications that encodes the most significant bits with the accurate radix-4 encoding and the least significant bits with an approximate higher radix encoding. The approximations are performed by rounding the high radix values to their nearest power of two. The proposed technique can be configured to achieve the desired energy–accuracy tradeoffs. Compared with the accurate radix-4 multiplier, the proposed multipliers deliver up to 56% energy and 55% area savings, when operating at the same frequency, while the imposed error is bounded by a Gaussian distribution with near-zero average. Moreover, the proposed multipliers are compared with state-of-the-art inexact multipliers, outperforming them by up to 40% in energy consumption, for similar error values. Finally, we demonstrate the scalability of our technique.
Ca co an efficient cauchy coding approach for cloud storage systemsLeMeniz Infotech
Ca co an efficient cauchy coding approach for cloud storage systems
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
The need for power efficiency is driving a rethink of design decisions in processor architectures. While vector processors succeeded in the high-performance market in the past, they need a retailoring for the mobile market that they are entering now. Floating-point (FP) fused multiply-add (FMA), being a functional unit with high power consumption, deserves special attention. Although clock gating is a well-known method to reduce switching power in synchronous designs, there are unexplored opportunities for its application to vector processors, especially when considering active operating mode. In this research, we comprehensively identify, propose, and evaluate the most suitable clock-gating techniques for vector FMA units (VFUs). These techniques ensure power savings without jeopardizing the timing. We evaluate the proposed techniques using both synthetic and “real-world” application-based benchmarking. Using vector masking and vector multilane-aware clock gating, we report power reductions of up to 52%, assuming active VFU operating at the peak performance. Among other findings, we observe that vector instruction-based clock-gating techniques achieve power savings for all vector FP instructions. Finally, when evaluating all techniques together, using “real-world” benchmarking, the power reductions are up to 80%. Additionally, in accordance with processor design trends, we perform this research in a fully parameterizable and automated fashion.
Noise insensitive pll using a gate-voltage-boosted source-follower regulator ...Nxfee Innovation
In this brief, we propose a supply noise-insensitive charge pump phase-locked loop (PLL) using a source-follower (SF) regulator and noise cancellation. In order to minimize the voltage drop of the SF regulator while improving supply rejection, a gate-voltage-boosting technique and the body-controlled noise cancellation are proposed. To suppress the phase noise from the ring oscillator, a reference multiplier is employed to maximize the PLL loop bandwidth. Implemented in 65-nm CMOS, a prototype PLL at 3.2 GHz achieves supply noise spur of less than −33 dBc for a 50-mVpp supply noise around the loop bandwidth while consuming 3.12 mW from a 1-V supply.
More Related Content
Similar to Combating data leakage trojans in commercial and asic applications with time division multiplexing and random encoding
Become a skilled cyber security professional in Kerala with the comprehensive C|PENT course at Blitz Academy. Gain hands-on experience and training. Contact now!
https://blitzacademy.org/coursedetail.php?course_cat=9&course_id=2&Certified-Penetration-Testing-Professional-in-kerala
A high accuracy programmable pulse generator with a 10-ps timing resolutionNxfee Innovation
Automatic test equipment must have high-precision and low-power pulse generators (PGs) for testing memory and device-under-test ICs. This paper describes a high-accuracy and wide-data-rate-range PG with a 10-ps time resolution. The PG comprises an edge combiner (EC) and a multiphase clock generator (MPCG). The EC can produce an arbitrary waveform through 32 phase outputs of the MPCG. The EC adopts a one/zero detector and phase selection logic to define an operational data rate range and a timing resolution, respectively. Therefore, the EC uses the phase selection logic to combine the period window of the one/zero detector with the MPCG output phases. The EC also uses a countdown counter for a wide operational range. In the MPCG, a multiphase oscillator (MPO) adopts a ring oscillator scheme with sub feedback loops to extend its maximum operational frequency. The MPO also uses a phase error corrector to reduce the output phase error resulting from process and layout mismatches. Thus, the PG can obtain high accuracy waveforms owing to small phase errors. The test chip was implemented using a 0.13-µm CMOS process. The core area and power consumption of the PG were measured to be 250 × 300 µm2 and 18.7 mW, respectively. The data rate range of the PG was determined to be from 3.2 kHz to 893 MHz. The time resolution and average accuracy of the PG were measured to be 10 ps and ±0.3 LSB, respectively.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Privacy preserving public auditing for regenerating-code-based cloud storageLeMeniz Infotech
Privacy preserving public auditing for regenerating-code-based cloud storage
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
A reconfigurable ldpc decoder optimized applicationsNxfee Innovation
This paper presents a high data-rate low-density parity-check (LDPC) decoder, suitable for the 802.11n/ac (WiFi) standard. The innovative features of the proposed decoder relate to the decoding algorithms and the interconnection between the processing elements. The reduction of the hardware complexity of decoders based on the min-sum (MS) algorithms comes at the cost of performance degradation, especially at high-noise regions. We introduce more accurate approximations of the log sum-product algorithm that also operate well for low signal-to noise ratio values. Telecommunication standards, including WiFi, support more than one quasi-cyclic LDPC codes of different characteristics, such as codeword length and code rate. A proposed design technique derives networks, capable of supporting a variety of codes and efficiently realizing connectivity between a variable number of processing units, with a relatively small hardware overhead over the single-code case. As a demonstration of the proposed technique, we implemented a reconfigurable network based on barrel rotators, suitable for LDPC decoders compatible with WiFi standard. Our approach achieves low complexity and high clock frequency, compared with related prior works. A 90-nm application-specified integrated circuit implementation of the proposed high-parallel WiFi decoder occupies 4.88 mm2 and achieves an information throughput rate of 4.5 G bit/s at a clock frequency of 555 MHz.
Cyber security course in kerala | C|PENT | Blitz Academyamallblitz0
Become a skilled cyber security professional in Kerala with the comprehensive C|PENT course at Blitz Academy. Gain hands-on experience and training. Contact now!
Become a skilled cyber security professional in Kerala with the comprehensive C|PENT course at Blitz Academy. Gain hands-on experience and training. Contact now!
https://blitzacademy.org/coursedetail.php?course_cat=9&course_id=2&Certified-Penetration-Testing-Professional-in-kerala
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one
developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with
the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
Approximate hybrid high radix encoding for energy efficient inexact multipliersNxfee Innovation
Approximate computing forms a design alternative that exploits the intrinsic error resilience of various applications and produces energy-efficient circuits with small accuracy loss. In this paper, we propose an approximate hybrid high radix encoding for generating the partial products in signed multiplications that encodes the most significant bits with the accurate radix-4 encoding and the least significant bits with an approximate higher radix encoding. The approximations are performed by rounding the high radix values to their nearest power of two. The proposed technique can be configured to achieve the desired energy–accuracy tradeoffs. Compared with the accurate radix-4 multiplier, the proposed multipliers deliver up to 56% energy and 55% area savings, when operating at the same frequency, while the imposed error is bounded by a Gaussian distribution with near-zero average. Moreover, the proposed multipliers are compared with state-of-the-art inexact multipliers, outperforming them by up to 40% in energy consumption, for similar error values. Finally, we demonstrate the scalability of our technique.
Ca co an efficient cauchy coding approach for cloud storage systemsLeMeniz Infotech
Ca co an efficient cauchy coding approach for cloud storage systems
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
The need for power efficiency is driving a rethink of design decisions in processor architectures. While vector processors succeeded in the high-performance market in the past, they need a retailoring for the mobile market that they are entering now. Floating-point (FP) fused multiply-add (FMA), being a functional unit with high power consumption, deserves special attention. Although clock gating is a well-known method to reduce switching power in synchronous designs, there are unexplored opportunities for its application to vector processors, especially when considering active operating mode. In this research, we comprehensively identify, propose, and evaluate the most suitable clock-gating techniques for vector FMA units (VFUs). These techniques ensure power savings without jeopardizing the timing. We evaluate the proposed techniques using both synthetic and “real-world” application-based benchmarking. Using vector masking and vector multilane-aware clock gating, we report power reductions of up to 52%, assuming active VFU operating at the peak performance. Among other findings, we observe that vector instruction-based clock-gating techniques achieve power savings for all vector FP instructions. Finally, when evaluating all techniques together, using “real-world” benchmarking, the power reductions are up to 80%. Additionally, in accordance with processor design trends, we perform this research in a fully parameterizable and automated fashion.
Noise insensitive pll using a gate-voltage-boosted source-follower regulator ...Nxfee Innovation
In this brief, we propose a supply noise-insensitive charge pump phase-locked loop (PLL) using a source-follower (SF) regulator and noise cancellation. In order to minimize the voltage drop of the SF regulator while improving supply rejection, a gate-voltage-boosting technique and the body-controlled noise cancellation are proposed. To suppress the phase noise from the ring oscillator, a reference multiplier is employed to maximize the PLL loop bandwidth. Implemented in 65-nm CMOS, a prototype PLL at 3.2 GHz achieves supply noise spur of less than −33 dBc for a 50-mVpp supply noise around the loop bandwidth while consuming 3.12 mW from a 1-V supply.
An efficient fault tolerance design for integer parallel matrix vectorNxfee Innovation
Parallel matrix processing is a typical operation in many systems, and in particular matrix–vector multiplication (MVM) is one of the most common operations in the modern digital signal processing and digital communication systems. This paper proposes a fault tolerant design for integer parallel MVMs. The scheme combines ideas from error correction codes with the self-checking capability of MVM. Field-programmable gate array evaluation shows that the proposed scheme can significantly reduce the overheads compared to the protection of each MVM on its own. Therefore, the proposed technique can be used to reduce the cost of providing fault tolerance in practical implementations.
The implementation of the improved omp for aic reconstruction based on parall...Nxfee Innovation
Sparse signal recovery becomes extremely challenging for a variety of real-time applications. In this paper, we improve the orthogonal matching pursuit (OMP) algorithm based on parallel correlation indices selection mechanism in each iteration and Goldschmidt algorithm. Simulation results show that the improved OMP algorithm with a reduced number of iterations and low hardware complexity of matrix operations has higher success rate and recovery signal-to-noise-ratio (RSNR) for sparse signal recovery. This paper presents an efficient complex valued system hardware architecture of the recovery algorithm for analog-to-information structure based on compressive sensing. The proposed architecture is implemented and validated on the Xilinx Virtex6 field-programmable gate array (FPGA) for signal reconstruction with N = 1024, K = 36, and M = 256. The implementation results showed that the improved OMP algorithm achieved a higher RSNR of 31.04 dB compared with the original OMP algorithm. This synthesized design consumes a few percentages of the hardware resources of the FPGA chip with the clock frequency of 135.4 MHZ and reconstruction time of 170 µs, which is faster than the existing design.
Multilevel half rate phase detector for clock and data recovery circuitsNxfee Innovation
In this brief, a half-rate (HR) bang-bang (BB) phase detector (PD) with multiple decision levels is proposed for clock and data recovery (CDR) circuits. The combination allows the oscillator to run at half the input data rate while providing information about the sign and magnitude of the phase shift between the PD inputs. This allows a finer control of the frequency of the oscillator in the phase-locked loop (PLL) of the CDR circuit, which results in up to 30% less output clock jitter than with a conventional two-levels HR BB PD. Thanks to this, the bit error rate can be decreased by up to 5× in a 5-Gb/s CDR circuit. The proposed topology was implemented in a 28-nm FDSOI CMOS technology providing average power consumption below 76 µW with a supply voltage of 1 V. Although multilevel (ML) BB PDs have already been proposed in some PLL-based CDR with very interesting results, a specific design of the PD has to be implemented for an HR system. This brief provides the first ML-HR-BBPD.
Low complexity methodology for complex square-root computationNxfee Innovation
In this brief, we propose a low-complexity methodology to compute a complex square root using only a circular coordinate rotation digital computer (CORDIC) as opposed to the state-of-the-art techniques that need both circular as well as hyperbolic CORDICs. Subsequently, an architecture has been designed based on the proposed methodology and implemented on the ASIC platform using the UMC 180-nm Technology node with 1.0 V at 5 MHz. Field programmable gate array (FPGA) prototyping using Xilinx’ Virtex-6 (XC6v1x240t) has also been carried out. After thorough theoretical analysis and experimental validations, it can be inferred that the proposed methodology reduces 21.15% slice look up tables (on FPGA platform) and saves 20.25% silicon area overhead and decreases 19% power consumption (on ASIC platform) when compared with the state-of-the-art method without compromising the computational speed, throughput, and accuracy.
Fast neural network training on fpga using quasi newton optimization methodNxfee Innovation
In this brief, a customized and pipelined hardware implementation of the quasi-Newton (QN) method on field-programmable gate array (FPGA) is proposed for fast artificial neural networks onsite training, targeting at the embedded applications. The architecture is scalable to cope with different neural network sizes while it supports batch-mode training. Experimental results demonstrate the superior performance and power efficiency of the proposed implementation over CPU, graphics processing unit, and FPGA QN implementations.
Efficient fpga mapping of pipeline sdf fft coresNxfee Innovation
In this paper, an efficient mapping of the pipeline single-path delay feedback (SDF) fast Fourier transform (FFT) architecture to field-programmable gate arrays (FPGAs) is proposed. By considering the architectural features of the target FPGA, significantly better implementation results are obtained. This is illustrated by mapping an R22SDF 1024-point FFT core toward both Xilinx Virtex-4 and Virtex-6 devices. The optimized FPGA mapping is explored in detail. Algorithmic transformations that allow a better mapping are proposed, resulting in implementation achievements that by far outperforms earlier published work. For Virtex-4, the results show a 350% increase in throughput per slice and 25% reduction in block RAM (BRAM) use, with the same amount of DSP48 resources, compared with the best earlier published result. The resulting Virtex-6 design sees even larger increases in throughput per slice compared with Xilinx FFT IP core, using half as many DSP48E1 blocks and less BRAM resources. The results clearly show that the FPGA mapping is crucial, not only the architecture and algorithm choices.
Approximate sum of-products designs based on distributed arithmeticNxfee Innovation
Approximate circuits provide high performance and require low power. Sum-of-products (SOP) units are key elements in many digital signal processing applications. In this brief, three approximate SOP (ASOP) models which are based on the distributed arithmetic are proposed. They are designed for different levels of accuracy. First model of ASOP achieves an improvement up to 64% on area and 70% on power, when compared with conventional unit. Other two models provide an improvement of 32% and 48% on area and 54% and 58% on power, respectively, with a reduced error rate compared with the first model. Third model achieves the mean relative error and normalized error distance as low as 0.05% and 0.009%, respectively. Performance of approximate units is evaluated with a noisy image smoothing application, where the proposed models are capable of achieving higher peak signal to-noise ratio than the existing state-of-the-art techniques. It is shown that the proposed approximate models achieve higher processing accuracy than existing works but with significant improvements in power and performance.
An energy efficient programmable many core accelerator for personalized biome...Nxfee Innovation
Wearable personalized health monitoring systems can offer a cost-effective solution for human health care. These systems must constantly monitor patients’ physiological signals and provide highly accurate, and quick processing and delivery of the vast amount of data within a limited power and area footprint. These personalized biomedical applications require sampling and processing multiple streams of physiological signals with a varying number of channels and sampling rates. The processing typically consists of feature extraction, data fusion, and classification stages that require a large number of digital signal processing (DSP) and machine learning (ML) kernels. In response to these requirements, in this paper, a tiny, energy efficient, and domain-specific manycore accelerator referred to as power-efficient nano clusters (PENC) is proposed to map and execute the kernels of these applications. Simulation results show that the PENC is able to reduce energy consumption by up to 80% and 25% for DSP and ML kernels, respectively, when optimally parallelized. In addition, we fully implemented three compute-intensive personalized biomedical applications, namely, multichannel seizure detection, multi physiological stress detection, and standalone tongue drive system (sTDS), to evaluate the proposed manycore performance relative to commodity embedded CPU, graphical processing unit (GPU), and field programmable gate array (FPGA)-based implementations. For these three case studies, the energy consumption and the performance of the proposed PENC manycore, when acting as an accelerator along with an Intel Atom processor as a host, are compared with the existing commercial off-the-shelf general purpose, customizable, and programmable embedded platforms, including Intel Atom, Xilinx Artix-7 FPGA, and NVIDIA TK1 advanced RISC machine -A15 and K1 GPU system on a chip. For these applications, the PENC manycore is able to significantly improve throughput and energy efficiency by up to 1872× and 276×, respectively. For the most computational intensive application of seizure detection, the PENC manycore is able to achieve a throughput of 15.22 giga-operations-per-second (GOPs), which is a 14× improvement in throughput over custom FPGA solution. For stress detection, the PENC achieves a throughput of 21.36 GOPs and an energy efficiency of 4.23 GOP/J, which is 14.87× and 2.28× better over FPGA implementation, respectively. For the sTDS application, the PENC improves a through put by 5.45× and an energy efficiency by 2.37× over FPGA implementation.
Algorithm and vlsi architecture design of proportionate type lms adaptive fil...Nxfee Innovation
Proportionate-type normalized LMS (Pt-NLMS) family of adaptive filtering algorithms for sparse system identification pose significant implementation challenges due to their high computational complexity especially for real-time applications like network echo cancelation. In this paper, we make the first attempt to implement Pt-NLMS algorithms in hardware. Several reformulations are proposed to simplify the original Pt-NLMS algorithms, thereby making them amenable to real time VLSI implementations and the reformulated algorithms referred as delayed µ-law proportionate LMS (DMPLMS) algorithm for white input and delayed wavelet MPLMS (DWMPLMS) for colored input are then implemented in hardware. Simulation studies demonstrate that the performance loss is very small for the proposed reformulations. We implemented the proposed designs considering 16-bit fixed point representation in hardware, and synthesis results show that the DMPLMS architecture with ≈30% increase in hardware over the state-of-the-art conventional delayed LMS architecture achieves 3× improvement in convergence rate for white input and the DWMPLMS architecture with ≈70% increase in hardware achieves 10× improvement in convergence rate for correlated input conditions.
A flexible wildcard pattern matching accelerator via simultaneous discrete fi...Nxfee Innovation
Regular expression matching becomes indispensable elements of Internet of Things network security. However, traditional ternary content addressable memory (TCAM) search engine is unable to handle patterns with wildcards, as it precisely tracks only one active state with single transition. This paper proposes a promising simultaneous pattern matching methodology for wildcard patterns by two separated engines to represent discrete finite automata. A key preprocessing to encode possible postfix pattern by a unique key ensures that follow-up patterns can accurately traverse all possible matches with limited hardware resources. This approach is practical and scalable for achieving good performance and low space consumption in network security, and it can be applicable to any regular expressions even with multi wildcard patterns. The experimental results demonstrate that this scheme can efficiently and accurately recognize wildcard patterns by simultaneously tracking only two active states. By adopting SRAM TCAM in the proposed architecture, the energy consumption is reduced to around 39%, compared with the energy consumption using a computing system that contains a large memory lookup and comparison overhead.
A fast and low complexity operator for the computation of the arctangent of a...Nxfee Innovation
The computation of the arctangent of a complex number, i.e., the atan2 function, is frequently needed in hardware systems that could profit from an optimized operator. In this brief, we present a novel method to compute the atan2 function and a hardware architecture for its implementation. The method is based on a first stage that performs a coarse approximation of the atan2 function and a second stage that improves the output accuracy by means of a lookup table. We present results for fixed-point implementations in a field-programmable gate array device, all of them guaranteeing last-bit accuracy, which provide an advantage in latency, speed, and use of resources, when compared with well-established fixed-point options.
A closed form expression for minimum operating voltage of cmos d flip-flopNxfee Innovation
In this paper, a closed-form expression for estimating the minimum operating voltage (VDDmin) of D flip-flops (FFs) is proposed. VDDmin is defined as the minimum supply voltage at which the FFs are functional without errors. The proposed expression indicates that VDDmin of FFs is a linear function of the square root of logarithm of the number of FFs, and its slope depends on the within-die variation of the threshold voltage (VTH) and its intercept depends on the balance between PMOS and NMOS, which is mainly due to the die-to-die VTH variation. The proposed expression of VDDmin is validated by the simulation results as well as the silicon measurements. Finally, we discuss the dependence of VDDmin on the device parameters..
A 128 tap highly tunable cmos if finite impulse response filter for pulsed ra...Nxfee Innovation
A configurable-bandwidth (BW) filter is presented in this paper for pulsed radar applications. To eliminate dispersion effects in the received waveform, a finite impulse response (FIR) topology is proposed, which has a measured standard deviation of an in-band group delay of 11 ns that is primarily dominated by the inherent, fully predictable delay introduced by the sample-and-hold. The filter operates at an IF of 20 MHz, and is tunable in BW from 1.5 to 15 MHz, which makes it optimal to be used with varying pulse widths in the radar. Employing a total of 128 taps, the FIR filter provides greater than 50-dB sharp attenuation in the stop band in order to minimize all out-of-band noise in the low signal-to-noise received radar signal. Fabricated in a 0.18-µm silicon on insulator CMOS process, the proposed filter consumes approximately 3.5mW/tap with a 1.8-V supply. A 20-MHz two-tone measurement with 200-kHz tone separation shows IIP3 greater than 8.5dBm.
A 12 bit 40-ms s sar adc with a fast-binary-window dac switching schemeNxfee Innovation
This paper presents a 12-bit 40-MS/s successive approximation register analog-to-digital converter (ADC) for ultrasound imaging systems. By incorporating a fast binary window digital-to-analog converter (DAC) switching technique, the problematic most significant bit transition glitch was removed to improve linearity without increasing the input capacitance or using a calibration scheme. A hybrid DAC was also developed to overcome the yield problem that occurs when a tiny unit capacitance is used in the DAC. Moreover, a reference buffer was used to accelerate the DAC settling to achieve high speed conversion. The prototype ADC was fabricated using a 130-nm CMOS technology. The ADC core occupied an active area of 0.1 mm 2 and consumed a total power of 1.32 mW when a 1.2-V supply was used at a conversion rate of 40 MS/s. The measured peak signal-to-noise-and-distortion ratio and spurious free dynamic range were 64 and 77.5 dB, respectively. The peak effective number of bits was 10.33, which is equivalent to a Walden figure-of-merit of 25.6 fJ/conversion step.
NXFEE Innovation is the Industry of Semiconductor IP Development, IP Designs, and services of developing solution to provide core products and application to customers with a wide range of solution that include custom ASIC/ FPGA/ DSP/ EMBEDDED System/ Wireless Technologies. Having lustrum of expertise and satisfied customers, NXFEE have the capability to deliver solution that is fully meshed with customer’s business requirement, meeting the highest standards.
NXFEE will Provide cost effective outsourcing services for secure and turn key product development in the areas of Bio-Medical/ Wireless/ Robotics/ VLSI/ DSP/ Embedded design & Development from conceptualization to production. Our sound technology and knowledge base have helped us to create products using emerging technology that include FPGA, VHDL, VERILOG HDL, SYSTEM VERILOG HDL, UVM, OVM, VVM, DSP, RTOS, DSP, Bluetooth, WI-FI, RF, CDMA, AXI, AHP, APB, and other related technologies in the area of industrial automation, telecommunications, consumer electronics and automotive applications.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Combating data leakage trojans in commercial and asic applications with time division multiplexing and random encoding
1. NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
Combating Data Leakage Trojans in Commercial and ASIC Applications
With Time-Division Multiplexing and Random Encoding
Abstract:
Globalization of microchip fabrication opens the possibility for an attacker to insert
hardware Trojans into a chip during the manufacturing process. While most defensive
methods focus on detection or prevention, a recent method, called Randomized Encoding
of Combinational Logic for Resistance to Data Leakage (RECORD), uses data
randomization to prevent hardware Trojans from leaking meaningful information even
when the entire design is known to the attacker. Both RECORD and its sequential variant
require significant area and power overhead. In this paper, a Time-Division Multiplexed
version of the RECORD design process is proposed which reduces area overhead by 63%
and power by 56%. This time-division multiplexing (TDM) concept is further refined to
allow commercial off the shelf (COTS) products and IP cores to be safely operated from
a separate chip. These new methods tradeoff latency (5.3× for TDM and 3.9× for COTS)
and energy use to accomplish area and power savings and achieve greater security than
the original RECORD process.
Software Implementation:
Modelsim
Xilinx 14.2
Existing System:
Detection and prevention of hardware Trojan attacks has become a major concern for a
company wishing to outsource its hardware manufacturing. The threat of a hardware
Trojan could lie dormant on a new chip for years before crippling it. Hardware Trojans
could also steal encryption keys, passwords, or other sensitive information,
2. NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
compromising security-critical systems. These data leakage Trojans can leak secret
information out through Wi-Fi or even through the power signature itself. Detecting
hardware Trojans has proven very difficult if not impossible. Some Trojans have been
demonstrated to successfully operate with as little as five transistors.
Most current methods of defense would be ineffective against such an attack. This
problem extends beyond custom application specified integrated circuit (ASIC) designs
and the firms creating them. Most companies buy commercial chips and are in no way
involved in the design and production processes. Protecting against Trojan‘s in a
commercial off-the-shelf (COTS) chip has so far been a mostly unexplored area of
hardware Trojan defense. Current methods of detecting hardware Trojans after
production involve runtime monitoring and post manufacture testing. Runtime
monitoring and post manufacture testing rely on identifying the differences in chip
operation introduced by the Trojan circuit. These methods depend on the tester‘s ability
to trigger the Trojan circuit so the effects of the Trojan can be measured. For runtime
monitoring and post manufacture testing to work, a ―golden chip‖ is usually needed for
comparison, as simulation of the chip functionality is generally not accurate enough to
show the very small changes introduced by the additional Trojan circuitry. How to
produce the golden chip is a major problem. Furthermore, neither of these broad
categories of Trojan protection is relevant for a third party company buying a COTS chip.
A more reliable method of protection is to design the chip for security from the
beginning. The concept of design for security (DFS) encompasses many possible ideas
and methods, such as obfuscation layout camouflaging and split manufacturing.
Obfuscation and layout camouflaging, however, are both susceptible to reverse
engineering given enough time and effort. Split manufacturing is susceptible if multiple
fabrication runs are used, which is often the case in modern design flows.
This paper focuses on a new DFS method known as Randomized Encoding of
Combinational Logic for Resistance to Data Leakage (RECORD) and more specifically
3. NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
the sequential RECORD variant which can protect sensitive information from being
leaked even when the full design is known to the attacker and multiple fabrication runs
are needed. Sequential RECORD took the initial concept of RECORD, which was only
specified for combinational logic, and extended it to sequential circuits. The method uses
two randomly generated numbers to temporarily encode incoming data into a dual-rail
signal. The random numbers represent one of the rails. Through Boolean manipulation
and split manufacturing, the sequential RECORD process is able to effectively prevent
any data leakage Trojans from capturing meaningful data from anywhere on the chip.
This process does not try to detect or even prevent hardware Trojans on the chip. There is
no longer any need. Any data captured by the attacks would be meaningless. The
sequential RECORD process suffers from two drawbacks. First, the RECORD algorithm
increases the area by almost 4× and the power by about 4.5×. And since it is a DFS
method, it must be designed into the chip from the start making it useless for COTS
applications. In this paper two modifications to the RECORD process are presented.
The first, time-division multiplexing (TDM) RECORD, will show how the RECORD
process can be modified to reduce the area and power overhead by 63% and 56%,
respectively, at the expense of processing time and total energy used. Second, a scheme
to use the RECORD concepts off chip to allow safe operation of COTS products is
presented.
Disadvantages:
Overhead is not reduced
Security is lower
Area and power savings is lower
Proposed System:
Time-division multiplexing
4. NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
RECORD provides excellent protection for custom ASIC designs both for combinational
or sequential circuits. It does, however, carry a large area and power overhead,
approximately 3.75× area and 4.5× power for sequential RECORD. RECORD also
benefits from using a simple and generic implementation that can be easily adapted to
any design with no circuit specific logic or control. When area or power is at a premium a
different approach is needed. TDM offers a perfect solution to reduce the power and area
overhead. The sequential RECORD process contains four copies of the same logic. This
serves two purposes; it allows for quick parallel processing of the four input vectors and
helps to confuse attackers. TDM RECORD eliminates the duplication while at the same
time opening up possibilities for an even more secure protection scheme.
The intermediate combinational logic is copied four times and operated on in parallel.
The only difference between the blocks is that each block of logic is sent a different input
vector. In TDM RECORD, the four variant input combinations can be sent in sequence to
just one copy of the intermediate logic instead of four. The outputs of the intermediate
logic are then stored in one of the four register blocks before being demuxed to determine
the final correct output. The register blocks are not the same as in sequential RECORD.
In TDM RECORD, all four outputs are not available in the same clock cycle. Each
intermediate output vector, g1–4, is stored on subsequent clock cycles until all four input
vectors have completed.
5. NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
Fig. 1. Registers for each round of TDM RECORD and the reindexing logic
The four stored outputs are then demuxed with the two random bits as select signals, as
before. The new output is reindexed against two newly generated random bits before
being sent on to the next set of intermediate logic, as shown in Fig. 1. The random bits
must be stored for four clocks cycles and used to generate g1–4 instead of changing on
each cycle. This restriction means that control logic is needed to orchestrate when new
random bits are needed and into which register block the intermediate outputs, g1–4, are
placed. The entire process is illustrated in Fig. 2. At clock cycle T , the incoming data
vector is converted to the dual-rail representation with r1 and r2. The new input bits, t,
are then sent to the first logic block. The output is then stored in register block 1. At clock
cycle, T + 1, the same input bits, t, are sent back to the same logic block but with some of
the inputs inverted. The outputs are stored in register
6. NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
Fig. 2. Conceptual dataflow diagram for TDM RECORD process showing the first round of data
processing.
7. NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
Fig. 3. COTS RECORD dataflow between the two chips.
block 2. This process is repeated two more times with the bits of t being inverted or not
inverted. Finally at clock cycle T +4, the register blocks are demuxed using r1 and r2 as
select signals. Here, r1 and r2 have not been allowed to change from cycle to cycle but
have been stored since cycle T . At clock cycle T + 5 the random bits are allowed to
change, the output of the register block is updated, and the process begins again. T
he security of the random bits is maintained with split manufacturing. The upper tier
would contain the control logic, the input multiplexers, registers with XOR gates, output
registers, and final demux. The bottom tier contains all of the intermediate logic. Storing
the random bits for four clock cycles does nothing to compromise the security. An
attacker would still need to wait until all four input data vectors have processed before
attempting to infer the random bit, at which time the bit would change just as in
sequential RECORD. TDM RECORD gives some obfuscation options that were not
8. NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
available with RECORD or sequential RECORD. First, sequential RECORD was
resistant to attackers inferring the random bits by reading the signals moving between
upper and lower tiers.
However, remote possibilities still existed of inferring the encoded data if the attacker
knew which combinational block was receiving which input vector, which input bits were
indexed against which random bits, and finally knew the indexing of the returning
register outputs. Fig. 2. shows Conceptual dataflow diagram for TDM RECORD process
showing the first round of data processing. By making use of the random number
generator/s (RNG) in TDM RECORD, the control logic can randomly change the order in
which the input vectors are presented to the logic. For example, the first iteration could
present the input vectors in normal order (1, 2, 3, and 4) but the next iteration could
present them in the order (2, 3, 1, and 4) and so on.
Second, to further frustrate attackers, the number of random bits can be increased.
Adding a third random bit was previously infeasible due to the excessive area and power
overhead. Now that third random bit would increase the number of input vector variations
by up to eight but at a very small cost to additional area and power. Only four additional
register blocks and alterations to the control logic are needed while at the
COTS application
RECORD in all its variations provides excellent protection against hardware Trojan
attacks. However, they are applicable only to custom ASIC chips. Quilt Packaging and 3-
D manufacturing are not cheap. The cost of manufacturing a RECORD or sequential
RECORD design would be many times the cost of a standard chip. While acceptable in
certain cases, these packaging options may be cost prohibitive in others. Many
9. NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
applications, especially military ones, are moving to COTS chips to meet specifications
and budget. These chips are even more susceptible to hardware Trojan injection since
there may not be any hardware security plan in mind when they are designed.
A recent paper has identified commercial parts as the number one area needing research
and a solution for preventing hardware Trojans attacks. The TDM RECORD process
presents an excellent opportunity to prevent data leakage when using COTS ICs. TDM
RECORD can be extended to a COTS chip by moving the TDM RECORD control logic
to a separate chip, such as an FPGA. The registers on the COTS chip cannot be moved
nor can they be individually accessed in most cases. Consequently, the TDM process of
injecting the appropriate data vectors into each intermediate logic block is no longer
applicable. The second chip of the COTS RECORD process must now send each of the
four input data vectors to the COTS chip and wait for the chip to fully complete its
operation. The process is shown in Fig. 3. In the case of a Data Encryption Standard
(DES) chip, this process would take 16 cycles to produce a final encoded output. That
output would then be stored in the control chip and the next of four input vectors would
be sent. While the four input vectors are being operated upon, only one set of random bits
is used and stored on the control chip. There is no need to send them to the COTS chip,
so they are safe from detection. When all four vectors have been processed, the control
chip will demux the results using the random bits as select signals and convert them back
to single rail before sending the final output to its original destination.
Advantages:
Overhead is reduced
Security is higher
Area and power savings is higher
References:
10. NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
[1] Y. Jin and Y. Makris, ―Hardware trojans in wireless cryptographic ICs,‖ IEEE Design Test Comput.,
vol. 27, no. 1, pp. 26–35, Jan./Feb. 2010.
[2] L. Lin, M. Kasper, T. Güneysu, C. Paar, and W. Burleson, ―Trojan side-channels: Lightweight
hardware trojans through side-channel engineering,‖ in Cryptographic Hardware and Embedded
Systems—CHES (Lecture Notes in Computer Science), vol. 5747. Berlin, Germany: Springer, 2009, pp.
382–395.
[3] K. Yang, M. Hicks, Q. Dong, T. Austin, and D. Sylvester, ―A2: Malicious hardware,‖ in Proc. IEEE
Symp. Secur. Privacy, San Jose, CA, USA, May 2016, pp. 18–37.
[4] C. A. Kamhoua, M. Rodriguez, and K. A. Kwiat, ―Testing for hardware trojans: A game-theoretic
approach,‖ in Decision and Game Theory for Security,‖ (Lecture Notes in Computer Science), vol.
8840. Cham, Switzerland: Springer, 2014, pp. 360–369. [
[5] M. Rostami, F. Koushanfar, and R. Karri, ―A primer on hardware security: Models, methods, and
metrics,‖ Proc. IEEE, vol. 102, no. 8, pp. 1283–1295, Aug. 2014.
[6] R. S. Chakraborty and S. Bhunia, ―Security against hardware trojan through a novel application of
design obfuscation,‖ in Proc. Int. Conf. Comput.-Aided Design (ICCAD), New York, NY, USA, Nov.
2009, pp. 113–116.
[7] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, ―Security analysis of integrated circuit
camouflaging,‖ in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2013, pp. 709–720.
[8] J. Rajendran, O. Sinanoglu, and R. Karri, ―Is split manufacturing secure?‖ in Proc. Conf. Design,
Autom. Test Europe, DATE, vol. 13, 2013, pp. 1259–1264.
[9] R. Dura, S. Hidalgo, R. Quijada, A. Raventos, and T. Francesc, ―The use of digital image processing
for IC reverse engineering,‖ in Proc. 11th Int. Multi-Conf. Syst., Signals Devices (SSD), Feb. 2014, pp.
1–4.
[10] D. E. Dilger. (Jan. 14, 2016). Apple A9 Chip fab TSMC Reports Record Earnings, Casting Further
Doubt on ‗Peak iPhone‘. [Online]. Available: http://appleinsider.com/articles/16/01/14/apple-a9- chip-
fab-tsmc-reports-record-earnings-casts-doubt-on-peak-iphone
11. NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
[11] T. E. Schulze, Y. Shi, C. Kamhoua, K. Kwiat, and S. Chang, ―RECORD: Temporarily randomized
encoding of combinational logic for resistance to data leakage from hardware trojan,‖ in Proc. Asian
HOST, Yilan, Taiwan, Dec. 2016, pp. 1–6.
[12] T. E. Schulze, K. Kwiat, C. Kamhoua, D. Beetner, L. Njilla, and Y. Shi, ―Combating data leakage
trojans in sequential circuits through randomized encoding,‖ in Proc. IEEE Dependable, Autonomic
Secure Comput. (DASC), Orlando, FL, USA, Nov. 2017, pp. 639–644.
[13] J. T. McDonald, Y. Kim, and D. Koranek, ―Deterministic circuit variation for anti-tamper
applications,‖ in Proc. 7th Annu. Workshop Cyber Secur. Inf. Intell. Res., 2011, Art. no. 68.