13 research outputs found

    Thermodynamic Investigation of NaClO3 Solubility in the Mixed Solvent Medium and the Related Ion – Pair Formation at Different Temperatures

    Get PDF
    Using the evaporating method, the solubility of sodium chlorate was determined in the various mixed solvents (water + ethanol + propanol) at various temperatures. The results showed that the solubility of NaClO3 decreases with increasing the mass percent of ethanol and propanol. On the other hand, the solubility of NaClO3 increases with increasing the temperature. In addition, the equilibrium constant of ion pair formation, KIP, for the reaction Na+(aq) + ClO3-(aq) -->Na+ClO3- (Ion Pair) was estimated upon Fuoss contact ion pair model and then, the values of ion-pair concentrations were determined by using the extended Debye-HĂŒckel model and iteration calculations in various mixed solvents and various temperatures . Finally the value of thermodynamic solubility product constant, Ksp(th), and the values ∆H°, ∆S° and ∆G° of ion-pair formation were estimated in the mixed solvent media

    Adsorption of Ni(II) and Cd(II) Ions from Aqueous Solutions by Modified Surface of Typha latifolia L. Root, as an Economical Adsorbent

    No full text
    ABSTRACT The modified surface of Typha latifolia L. root (MSTL), as an alternative economical adsorbent, was used for the removal of Ni (II) and Cd(II) ions from aqueous solutions. The effect of initial pH, initial concentration of metal ion, and contact time was investigated in a batch system at room temperature. The kinetics data could be fitted well by pseudo-second-order model with correlation coefficient values greater than 0.99. The mechanism of adsorption process was tested by fitting the experimental data by intraparticle diffusion kinetic and Boyd kinetic equations. The adsorption data could be fitted well by Langmuir and Freundlich adsorption isotherms. The maximum adsorption capacity of MSTL was determined to be 37.31 mg g -1 for Ni 2+ and 28.90 mg g -1 for Cd 2+ at room temperature when the initial concentration of both metal ion was 100 mg/L, and the pH of the solution was 5.00 and 4.00 for Ni 2+ and Cd 2+ , respectively. It has been suggested that the MSTL can be successfully applied for the removal of toxic heavy metal ions such as Ni 2+ and Cd 2+ from aqueous solutions

    Fault Diagnosis Schemes for Secure Lightweight Cryptographic Block Cipher RECTANGLE Benchmarked on FPGA

    No full text
    The security and reliability of cryptosystems are endangered with natural occurring and malicious injected faults by leakage of the information. Efficient trade off among minimum performance and implementation metrics and high level of security for cryptosystems in constrained applications has led to proposed error detection schemes for lightweight block ciphers. These ciphers provide low-cost confidentiality in terms of low hardware complexity and fast implementation. In this paper, we propose fault diagnosis schemes for an efficient lightweight block cipher, RECTANGLE, to ensure high level of security with low hardware overhead incorporated for error detection. This cipher offers efficient performance in both hardware and software implementation using bit-slice techniques. To the best of authors\u27 knowledge, no prior error detection scheme has been presented in literature for RECTANGLE to date. The proposed error detection schemes that are provided for the S-box layer, Player, and for the round structures with 80-bit or 128-bit key sizes, are benchmarked on field-programmable gate array (FPGA) hardware platform to assess their suitability. The error coverage of these schemes is close to 100% (assessed with fault injection simulation) and the induced overheads are low, increasing the reliability of the hardware architectures of RECTANGLE

    Fault Detection Architectures for Post-Quantum Cryptographic Stateless Hash-Based Secure Signatures Benchmarked on ASIC

    No full text
    Symmetric-key cryptography can resist the potential post-quantum attacks expected with the not-so-faraway advent of quantum computing power. Hash-based, code-based, lattice-based, and multivariate-quadratic equations are all other potential candidates, the merit of which is that they are believed to resist both classical and quantum computers, and applying “Shor’s algorithm”—the quantum-computer discrete-logarithm algorithm that breaks classical schemes—to them is infeasible. In this article, we propose, assess, and benchmark reliable constructions for stateless hash-based signatures. Such architectures are believed to be one of the prominent post-quantum schemes, offering security proofs relative to plausible properties of the hash function; however, it is well known that their confidentiality does not guarantee reliable architectures in the presence natural and malicious faults. We propose and benchmark fault diagnosis methods for this post-quantum cryptography variant through case studies for hash functions and present the simulations and implementations results (through application-specific integrated circuit evaluations) to show the applicability of the presented schemes. The proposed approaches make such hash-based constructions more reliable against natural faults and help protecting them against malicious faults and can be tailored based on the resources available and for different reliability objectives

    Reliable and Error Detection Architectures of Pomaranch for False-Alarm-Sensitive Cryptographic Applications

    No full text
    Efficient cryptographic architectures are used extensively in sensitive smart infrastructures. Among these architectures are those based on stream ciphers for protection against eavesdropping, especially when these smart and sensitive applications provide life-saving or vital mechanisms. Nevertheless, natural defects call for protection through design for fault detection and reliability. In this paper, we present implications of fault detection cryptographic architectures (Pomaranch in the hardware profile of European Network of Excellence for Cryptology) for smart infrastructures. In addition, we present low-power architectures for its nine-to-seven uneven substitution box [tower field architectures in GF(33)]. Through error simulations, we assess resiliency against false-alarms which might not be tolerated in sensitive intelligent infrastructures as one of our contributions. We further benchmark the feasibility of the proposed approaches through application-specific integrated circuit realizations. Based on the reliability objectives, the proposed architectures are a step-forward toward reaching the desired objective metrics suitable for intelligent, emerging, and sensitive applications

    Fault Diagnosis Schemes for Low-Energy Block Cipher Midori Benchmarked on FPGA

    No full text
    Achieving secure high-performance implementations for constrained applications such as implantable and wearable medical devices are a priority in efficient block ciphers. However, security of these algorithms is not guaranteed in the presence of malicious and natural faults. Recently, a new lightweight block cipher, Midori, has been proposed that optimizes the energy consumption besides having low latency and hardware complexity. In this paper, fault diagnosis schemes for variants of Midori are proposed. To the best of the authors\u27 knowledge, there has been no fault diagnosis scheme presented in the literature for Midori to date. The fault diagnosis schemes are provided for the nonlinear S-box layer and for the round structures with both 64-bit and 128-bit Midori symmetric key ciphers. The proposed schemes are benchmarked on a field-programmable gate array and their error coverage is assessed with fault-injection simulations. These proposed error detection architectures make the implementations of this new low-energy lightweight block cipher more reliable
    corecore