56 research outputs found

    A versatile Montgomery multiplier architecture with characteristic three support

    Get PDF
    We present a novel unified core design which is extended to realize Montgomery multiplication in the fields GF(2n), GF(3m), and GF(p). Our unified design supports RSA and elliptic curve schemes, as well as the identity-based encryption which requires a pairing computation on an elliptic curve. The architecture is pipelined and is highly scalable. The unified core utilizes the redundant signed digit representation to reduce the critical path delay. While the carry-save representation used in classical unified architectures is only good for addition and multiplication operations, the redundant signed digit representation also facilitates efficient computation of comparison and subtraction operations besides addition and multiplication. Thus, there is no need for a transformation between the redundant and the non-redundant representations of field elements, which would be required in the classical unified architectures to realize the subtraction and comparison operations. We also quantify the benefits of the unified architectures in terms of area and critical path delay. We provide detailed implementation results. The metric shows that the new unified architecture provides an improvement over a hypothetical non-unified architecture of at least 24.88%, while the improvement over a classical unified architecture is at least 32.07%

    Optimization of 5-axis milling processes using process models

    Get PDF
    Productivity and part quality are extremely important for all machining operations, but particularly for 5-axis milling where the machine tool cost is relatively higher, and most parts have complex geometries and high quality requirements with tight tolerances. 5- axis milling, presents additional challenges in modeling due to more complex tool and workpiece interface geometry, and process mechanics. In this paper, modeling and optimization of 5-axis processes with cutting strategy selection are presented. The developed process models are used for cutting force predictions using a part-tool interface identification method which is also presented. Based on the model predictions and simulations, best cutting conditions are identified. Also, for finish process of a complex surface, machining time is estimated using three machining strategy alternatives. Results are demonstrated by example applications, and verified by experiments

    CFD Modelling of Two Different Cold Stores Ambient Factors

    Get PDF
    AbstractObjective of the research was to determine ambient temperature and relative humidity distributions of two different cold stores which have two different cooling systems. One of the cold store which is called as Cold store-I, has classical cooling system such as compressor, condenser and evaporator. Second called Cold store-II, has air conditioning system for cooling, cold air ventilation and aspiration systems, and humidification system. Computational fluid dynamics was used for modelling of distribution of temperature and relative humidity of cold store walls. Storage temperature and relative humidity were assumed 2°C and 90%, respectively. Boundary conditions were set as; Inlet-Surface of fluid inlet, Outlet-Surface of fluid outlet, and walls-solid, proof against flow of fluid. A tetrahedral mesh was created by using ANSYS 14.0 and calculation finished when accessing a solution. Turbulence was modelled using the k-ɛ (k-epsilon). Spatial distribution in two cold stores for two different cooling systems were modelled and evaluated in this research. Data determined from CFD models were compared for both cold stores. Cold store-II was better than Cold store-I because it has air distribution holes located on ceiling

    Design and implementation of a fast and scalable NTT-based polynomial multiplier architecture

    Get PDF
    In this paper, we present an optimized FPGA implementation of a novel, fast and highly parallelized NTT-based polynomial multiplier architecture, which proves to be effective as an accelerator for lattice-based homomorphic cryptographic schemes. As I/O operations are as time-consuming as NTT operations during homomorphic computations in a host processor/accelerator setting, instead of achieving the fastest NTT implementation possible on the target FPGA, we focus on a balanced time performance between the NTT and I/O operations. Even with this goal, we achieved the fastest NTT implementation in literature, to the best of our knowledge. For proof of concept, we utilize our architecture in a framework for Fan-Vercauteren (FV) homomorphic encryption scheme, utilizing a hardware/software co-design approach, in which polynomial multiplication operations are offloaded to the accelerator via PCIe bus while the rest of operations in the FV scheme are executed in software running on an off-the-shelf desktop computer. Specifically, our framework is optimized to accelerate Simple Encrypted Arithmetic Library (SEAL), developed by the Cryptography Research Group at Microsoft Research, for the FV encryption scheme, where large degree polynomial multiplications are utilized extensively. The hardware part of the proposed framework targets Xilinx Virtex-7 FPGA device and the proposed framework achieves almost 11x latency speedup for the offloaded operations compared to their pure software implementations

    Accelerating LTV based homomorphic encryption in reconfigurable hardware

    Get PDF
    After being introduced in 2009, the first fully homomorphic encryption (FHE) scheme has created significant excitement in academia and industry. Despite rapid advances in the last 6 years, FHE schemes are still not ready for deployment due to an efficiency bottleneck. Here we introduce a custom hardware accelerator optimized for a class of reconfigurable logic to bring LTV based somewhat homomorphic encryption (SWHE) schemes one step closer to deployment in real-life applications. The accelerator we present is connected via a fast PCIe interface to a CPU platform to provide homomorphic evaluation services to any application that needs to support blinded computations. Specifically we introduce a number theoretical transform based multiplier architecture capable of efficiently handling very large polynomials. When synthesized for the Xilinx Virtex 7 family the presented architecture can compute the product of large polynomials in under 6.25 msec making it the fastest multiplier design of its kind currently available in the literature and is more than 102 times faster than a software implementation. Using this multiplier we can compute a relinearization operation in 526 msec. When used as an accelerator, for instance, to evaluate the AES block cipher, we estimate a per block homomorphic evaluation performance of 442 msec yielding performance gains of 28.5 and 17 times over similar CPU and GPU implementations, respectively

    Shared dissociative identity disorder and defector alter personality: controlled human syndrome and the objectification trap phenomenon as a gaslighting form based on dissociative narcissism from the perspective of dissoanalysis theory and dissoanalytic psychohistory

    No full text
    In today's age of global dissociation, it has become necessary to deal with the social and clinical aspects of dissociation, which is a "psychosocial denial experience" in terms of ideational, emotional, relational, behavioral and sensory aspects. In dysfunctional nations experiencing psychosocial denial, democracy unfortunately functions as the majority's freedom to make wrong decisions. The freedom of the majority to make wrong decisions creates "dissociative and misanthropic masses" and causes "universal violence circulation" and despotism to prevail. Dissoanalysis and "Ozturk's Pervasive and Reversible Dissociative Fusion Theory" define the universal circulation of violence as a reversible "dissociative violence oscillation" associated with trauma, which spreads from individual to society and from society to individual. The submissive mode associated with the experience of connecting to their oppressors and dictators is contagious; it spreads from traumatized and dysfunctional individuals to dissociated and dysfunctional societies, creating fused interpersonal relationships and both conformist and sadomasochistic masses. The dissoanalytic school defines the phenomenon of dissociation, which is most closely related to chronic, complex and cumulative traumatic experiences, which can transform from the individual to the social dimension and from the social dimension to the individual dimension in the face of oppression, and even be experienced simultaneously in the individual and social dimensions, both in relational and psychosociopolitical contexts. Dissoanalytic psychohistory, which continues its development rapidly in parallel with the principles of dissoanalysis and modern psychotraumatology, has far outstripped the stable and dogmatic schools of psychiatry, psychology, and history with its integrative solution-oriented approaches and effective psychosocial prevention strategies towards the phenomenon of trauma-related dissociation and individual and mass obedience cycles against oppression. In this original article, Ozturk defined the phenomenon of "objectification trap", "controlled human syndrome" and "shared dissociative identity disorder" as the triple pillar of fused bilateral relations dominated by reversible dominative and submissive modes from the perspective of dissoanalysis theory and dissoanalytic psychohistory. [Med-Science 2023; 12(2.000): 495-521

    Low Power Elliptic Curve Cryptography

    Get PDF
    This M.S. thesis introduces new modulus scaling techniques for transforming a class of primes into special forms which enable efficient arithmetic. The scaling technique may be used to improve multiplication and inversion in finite fields. We present an efficient inversion algorithm that utilizes the structure of a scaled modulus. Our inversion algorithm exhibits superior performance to the Euclidean algorithm and lends itself to efficient hardware implementation due to its simplicity. Using the scaled modulus technique and our specialized inversion algorithm we develop an elliptic curve processor architecture. The resulting architecture successfully utilizes redundant representation of elements in GF(p) and provides a low-power, high speed, and small footprint specialized elliptic curve implementation. We also introduce a unified Montgomery multiplier architecture working on the extension fields GF(p), GF(2) and GF(3). With the increasing research activity for identity based encryption schemes, there has been an increasing need for arithmetic operations in field GF(3). Since we based our research on low-power and small footprint applications, we designed a unified architecture rather than having a seperate hardware for GF{3}. To the best of our knowledge, this is the first time a unified architecture was built working on three different extension fields

    Dissoanalytic Psychohistory: Dissoanalysis of the Traumatic History of Humanity and the Construction of a New Societal Reality

    No full text
    In the face of all the limitations and criticisms regarding the recognition of consciousness as a psychosocial "singularity experience", the construction of "Dissoanalysis Theory: Psychocommunal Therapy" centered on "multiple consciousness system", "multiple reality perception" and "multiple memory phenomenon", that is, a new societal reality, has become an indispensability. Based on trauma and dissociation studies, i.e. modern psychotraumatology paradigms and modalities, the "Dissoanalysis Theory", structured by Ozturk with the aim of creating a functional society consisting of empathetic, prudent, just, peaceful, and capable individuals, made it possible for the emergence of "dissoanalytic psychohistory" from a psychosocial perspective. Dissoanalytic psychohistory is intervention therapy for psychosocial crises! "Dissoanalytic psychohistory" structured by Ozturk within the framework of the dissoanalytic school is defined as a branch of science that does researches on childhood traumas, psychosocial perceptions of childhood, chronic oppressions, child-rearing styles, dysfunctional families, dysfunctional generations, intergenerational transmission of trauma, intergenerational transfer of psychopathology, psychocommunal dissociation, dominant leaders and mass violence and develops strategies focused on especially preventing childhood traumas and wars. Dissoanalytic psychohistory, emphasizing that the neutralization of dysfunctional generations and the future can be achieved by the administration of "psychocommunal therapy" of all nations in the world, is an original psychology theory that consists of a holistic synthesis of modern psychotraumatology and psychohistory paradigms with the study of intergenerational transmission of trauma and intergenerational transfer of psychopathology. Dissoanalytic psychohistory, which is the dissoanalysis of the traumatic history of humanity and the construction of a new societal reality, both analyzes and integrates the dissociative components of societies with absolute reality. Dissoanalytic psychohistory creates development-oriented shifts, "dissociative revolutions", "integrative psychosocial movements" and "mass predictions" and even functional and healthy new society profiles by raising awareness of masses of human about their actions. [Med-Science 2023; 12(1.000): 303-18

    Efficient and Tamper-Resilient Architectures for Pairing Based Cryptography

    No full text
    Identity based cryptography was first proposed by Shamir in 1984. Rather than deriving a public key from private information, which would be the case in traditional public key encryption schemes, in identity based schemes a user's identity plays the role of the public key. This reduces the amount of computations required for authentication, and simplifies key-management. Efficient and strong implementations of identity based schemes are based around easily computable bilinear mappings of two points on an elliptic curve onto a multiplicative subgroup of a field, also called pairing. The idea of utilizing the identity of the user simplifies the public key infrastructure. However, since pairing computations are expensive for both area and timing, the proposed identity based cryptosystem are hard to implement. In order to be able to efficiently utilize the idea of identity based cryptography, there is a strong need for an efficient pairing implementations. Pairing computations could be realized in multiple fields. Since the main building block and the bottleneck of the algorithm is multiplication, we focused our research on building a fast and small arithmetic core that can work on multiple fields. This would allow a single piece of hardware to realize a wide spectrum of cryptographic algorithms, including pairings, with minimal amount of software coding. We present a novel unified core design which is extended to realize Montgomery multiplication in the fields GF(2^n), GF(3^m), and GF(p). Our unified design supports RSA and elliptic curve schemes, as well as identity based encryption which requires a pairing computation on an elliptic curve. The architecture is pipelined and is highly scalable. The unified core utilizes the redundant signed digit representation to reduce the critical path delay. While the carry-save representation used in classical unified architectures is only good for addition and multiplication operations, the redundant signed digit representation also facilitates efficient computation of comparison and subtraction operations besides addition and multiplication. Thus, there is no need for transformation between the redundant and non-redundant representations of field elements, which would be required in classical unified architectures to realize the subtraction and comparison operations. We also quantify the benefits of unified architectures in terms of area and critical path delay. We provide detailed implementation results. The metric shows that the new unified architecture provides an improvement over a hypothetical non-unified architecture of at least 24.88 % while the improvement over a classical unified architecture is at least 32.07 %. Until recently there has been no work covering the security of pairing based cryptographic hardware in the presence of side-channel attacks, despite their apparent suitability for identity-aware personal security devices, such as smart cards. We present a novel non-linear error coding framework which incorporates strong adversarial fault detection capabilities into identity based encryption schemes built using Tate pairing computations. The presented algorithms provide quantifiable resilience in a well defined strong attacker model. Given the emergence of fault attacks as a serious threat to pairing based cryptography, the proposed technique solves a key problem when incorporated into software and hardware implementations. In this dissertation, we also present an efficient accelerator for computing the Tate Pairing in characteristic 3, based on the Modified Duursma Lee algorithm

    Trauma based alliance model therapy

    No full text
    Trauma Based Alliance Model Therapy (TBAMT) was developed by Ozturk for the psychotherapy of dissociative identity disorder. Alliance with alter personalities is an important issue in TBAMT model. TBAMT, which is specific to dissociative identity disorder, was structured based on professional experiences of Ozturk, who has been working intensively and only with this psychiatric diagnosis group for long years in order to shorten the duration of the treatment period. Thus, it can also be considered as short-term psychotherapy of dissociative identity disorder. TBAMT is also recognized as the alter personality alliance model. TBAMT is generally a trauma centered, strategic, both crisis intervention and an integrated psychotherapy method focused on the processing of trauma following the alliance of the host and alter personalities in dissociative identity disorder. TBAMT is based on eight main phases linked to each other; multifocal therapeutic alliance, short-term and efficient trauma practice, integrative intervention and control for crises, missions and strategic functions of host and alter personalities, solution-oriented approaches towards insecure attachment and psychopathogenic family dynamics, correction of different time perceptions and cognitive distortions of host and alter personalities, integration; fusions made via the host and post-integrative psychotherapy providing autonomy. Every basic phase has three-week periods and the treatment of dissociative identity disorder is completed nearly in six months. [Med-Science 2021; 10(2.000): 631-50
    corecore