220 research outputs found

    Applying asynchronous circuits in contactless smart cards

    Get PDF
    Abstract We have designe

    An asynchronous DES in contactless smartcard.

    Get PDF
    Siu, Pui-Lam.Thesis submitted in: August 2003.Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.Includes bibliographical references (leaves 104-109).Abstracts in English and Chinese.list of figures --- p.5list of tables --- p.7acknowledgements --- p.8abstract --- p.9Chapter 1. --- introduction --- p.12Chapter 1.1 --- Smart Card --- p.12Chapter 1.1.1 --- What is a smart card? --- p.12Chapter 1.1.2 --- How is a smart card different from the magnetic stripe card that I carry in my wallet? --- p.13Chapter 1.1.3 --- Why are interoperability and enforced standards crucial to widespread adoption of smart cards? --- p.13Chapter 1.1.4 --- Contact vs Contactless --- p.14Chapter 1.1.5 --- How secure and confidential contactless smart cards are? --- p.14Chapter 1.1.6 --- Contactless Smart Card Application Contactless smart cards are widely used in commercial fields as stored-value and secure storage cards --- p.14Chapter 1.1.7 --- What are the major benefits that Contactless smart cards offer to consumers? --- p.16Chapter 1.2 --- Design Motivation --- p.16Chapter 1.3 --- RF Part Interface --- p.17Chapter 1.4 --- Potential Advantages of Using Asynchronous Circuit --- p.19Chapter 1.5 --- Design Methodology for Asynchronous Circuit --- p.23Chapter 1.5.1 --- Difficulty and limitation of asynchronous design --- p.27Chapter 1.5.2 --- Asynchronous pipeline --- p.28Chapter 2. --- background theory --- p.32Chapter 2.1 --- Description of DES --- p.32Chapter 2.1.1 --- Outline of the Algorithm --- p.33Chapter 2.1.2 --- Initial Permutation --- p.35Chapter 2.1.3 --- Key Transformation --- p.35Chapter 2.1.4 --- Expansion Permutation --- p.37Chapter 2.1.5 --- S-box Substitution --- p.38Chapter 2.1.6 --- P-Box Permutation --- p.41Chapter 2.1.7 --- Final Permutation --- p.42Chapter 2.1.8 --- Decrypting DES --- p.43Chapter 2.1.9 --- Security of DES --- p.43Chapter 2.1.10 --- Weak Keys --- p.43Chapter 2.1.11 --- Algebraic Structure --- p.46Chapter 2.1.12 --- Key Length --- p.46Chapter 2.1.13 --- Number of Rounds --- p.48Chapter 2.1.14 --- Design of the S-Boxes --- p.48Chapter 3. --- rf part --- p.50Chapter 3.1 --- Power On --- p.51Chapter 3.2 --- Power Induction --- p.52Chapter 3.3 --- Limiter and Regulator --- p.54Chapter 3.4 --- Demodulation --- p.56Chapter 3.5 --- Modulation --- p.57Chapter 4. --- asynchronous circuit theory --- p.58Chapter 4.1 --- Potential Problem of Classical Asynchronous Pipeline --- p.58Chapter 4.2 --- The New Handshake Cell --- p.58Chapter 4.3 --- The Modified Asynchronous Pipeline Architecture --- p.60Chapter 4.4 --- Asynchronous Circuit Comparison --- p.65Chapter 5 --- implementation --- p.67Chapter 5.1 --- DES Implementation --- p.67Chapter 5.1.1 --- Power estimation of the asynchronous DES --- p.70Chapter 5.1.2 --- Modified Circuit --- p.73Type One --- p.73Type two --- p.76Chapter 5.1.3 --- Interface --- p.79Chapter 5.1.4 --- Shift Unit --- p.80Chapter 5.1.5 --- Multiplexer Unit --- p.82Chapter 5.1.6 --- Compression Unit --- p.83Chapter 5.1.7 --- Expansion Unit --- p.84Chapter 5.1.8 --- Xor Unit --- p.85Chapter 5.1.9 --- S_box Unit --- p.86Chapter 5.1.10 --- P-box unit --- p.88Chapter 5.1.11 --- Latch unit --- p.89Chapter 5.1.12 --- Transmission Unit --- p.90Chapter 5.2 --- Floor Plan Design --- p.90Chapter 6. --- result and discussion --- p.93Chapter 6.1 --- Simulation Result --- p.93Chapter 6.2 --- Measurement --- p.97Chapter 6.3 --- Comparison --- p.101Chapter 6.4 --- Conclusion --- p.101Chapter 7. --- reference --- p.104Chapter 8. --- appendix --- p.110Chapter 8.1 --- RF Part Implementation --- p.110Chapter 8.1.1 --- Full wave rectifying circuit --- p.110Chapter 8.1.2 --- "Limiting Circuit," --- p.111Chapter 8.1.3 --- Regulator circuit --- p.113Chapter 8.1.4 --- Demodulation circuit --- p.113Chapter 8.1.5 --- Simulation of the RF part --- p.115Chapter 8.2 --- New Technology for Designing a RF Interface --- p.117Chapter 8.2 --- Block Diagrams --- p.11

    Synchronous handshake circuits

    Get PDF
    We present the synchronous implementation of handshake circuits as an extra feature in the otherwise asynchronous design flow based on Tangram. This synchronous option can be used in the mapping onto FPGAs or as a fallback option to provide a circuit that is easier to test and integrate in a synchronous environment. When single-rail and synchronous realizations of the same handshake circuit are compared, the synchronous versions typically require fewer state-holding elements, occupy less area, have similar performance, but consume significantly more power (in the examples studied up to a factor four). Synchronous handshake circuits provide a means to study clock-gating techniques based on the synthesis starting from a behavioral-level specification. In addition, the study provides hints as to where the asynchronous handshake circuits may be optimized further

    The survey on Near Field Communication

    Get PDF
    PubMed ID: 26057043Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem.Publisher's Versio

    MongoDB Based Real-Time Monitoring Heart Rate Using Websocket For Remote Healthcare

    Get PDF
    With the gradual development of Industry 4.0, the internet of things (IoT) concept has become an even more current and fundamental study topic. Consisting of devices and objects with communication capability, IoT is a network that uses internet infrastructure, especially for data collection, display, decision-making, control, and optimization of processes. Recently, patient tracking systems have become even more critical with Covid19 and have diversified in health for IoT topics such as biomedical device tracking and disease diagnosis. Within the scope of this study, a prototype of a patient tracking system was developed over the sensor in order to contribute to the biomedical field. We aimed to observe real-time heart rates using WebSockets to demonstrate its use in the medical field via the web application. Monitoring the heart rate using a WebSocket can help doctors make faster and better diagnoses. The current technology study instantly collected the patient's heart rhythm with the pulse sensor. The pulse data collected in real time was then transferred to a web platform with the NodeMCU ESP 8266 board. With this platform, the patient was monitoring in real-time. With the opportunities provided by the study, the doctor implemented an application monitors the instantaneous pulse of the patients

    THE DEVELOPMENT OF STUDENT ATTENDANCE SYSTEM FOR UNIVERSITI TEKNOLOGI PETRONAS

    Get PDF
    This project is about the portable student attendance system used to record digitally student’s attendance in class. This system is dedicated to Universiti Teknologi PETRONAS students which use their matrix cards as medium for recognition. It is chosen to shorten the time of recording attendance compared to the manual method. The student attendance system can be practiced using Radio Frequency Identification (RFID) as a medium for data recording. The microchip-embedded cards use RFID reader to record the attendance in class. This system involves the circuit fabrication as well as the programming. It is found that this system is suitable for students’ attendance purpose as well as replacing the existing inefficient method

    Embedded Systems Based on Open Source Platforms

    Get PDF
    Ways and possibilities for design, implementation and application of microcomputer-based embedded systems using open source hardware and software platforms are considered, proposed and described. It is proposed to use open source hardware and software microcomputer-based technologies for design and implementation of embedded systems in many practical needs and applications. Main advantages and possibilities of application and implementation of such embedded systems are considered and described. Two practically designed and implemented systems performing needed data acquisition and control are presented and described. Used technologies for realization of the systems and embedded applications of the solutions are described. Open source microcomputer boards, appropriate sensors, actuators and additional electronics are used for implementation of the systems hardware. Open source tools and programs and LINUX operating system are used for implementation of the systems software. Modular approach is applied in the systems design and realization. Easy system expandability, simplifying maintenance and adaptation of the system to user requirements and needs are enabled with such approach. Balance between functionality and cost of the systems was also achieved. Optimization according to user requirements and needs, low consumption of electrical energy and low cost of the system are main advantages of such systems compared with standard embedded systems. These systems are optimized and specialized systems for specific needs and requirements of users

    Near Field Communication: From theory to practice

    Get PDF
    This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML are demonstrated with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.Publisher's Versio

    Side-channel attacks and countermeasures in the design of secure IC's devices for cryptographic applications

    Get PDF
    Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. Sensible data are ciphered by a secure key by which only the key holder can get the data. For this reason, to protect the cipher key against possible attacks becomes a main issue. The research activities in hardware cryptography are involved in finding new countermeasures against various attack scenarios and, in the same time, in studying new attack methodologies. During the PhD, three different logic families to counteract Power Analysis were presented and a novel class of attacks was studied. Moreover, two different activities related to Random Numbers Generators have been addressed
    • …
    corecore