18 research outputs found

    Efficient Implementation on Low-Cost SoC-FPGAs of TLSv1.2 Protocol with ECC_AES Support for Secure IoT Coordinators

    Get PDF
    Security management for IoT applications is a critical research field, especially when taking into account the performance variation over the very different IoT devices. In this paper, we present high-performance client/server coordinators on low-cost SoC-FPGA devices for secure IoT data collection. Security is ensured by using the Transport Layer Security (TLS) protocol based on the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite. The hardware architecture of the proposed coordinators is based on SW/HW co-design, implementing within the hardware accelerator core Elliptic Curve Scalar Multiplication (ECSM), which is the core operation of Elliptic Curve Cryptosystems (ECC). Meanwhile, the control of the overall TLS scheme is performed in software by an ARM Cortex-A9 microprocessor. In fact, the implementation of the ECC accelerator core around an ARM microprocessor allows not only the improvement of ECSM execution but also the performance enhancement of the overall cryptosystem. The integration of the ARM processor enables to exploit the possibility of embedded Linux features for high system flexibility. As a result, the proposed ECC accelerator requires limited area, with only 3395 LUTs on the Zynq device used to perform high-speed, 233-bit ECSMs in 413 µs, with a 50 MHz clock. Moreover, the generation of a 384-bit TLS handshake secret key between client and server coordinators requires 67.5 ms on a low cost Zynq 7Z007S device

    Novel Area-Efficient and Flexible Architectures for Optimal Ate Pairing on FPGA

    Full text link
    While FPGA is a suitable platform for implementing cryptographic algorithms, there are several challenges associated with implementing Optimal Ate pairing on FPGA, such as security, limited computing resources, and high power consumption. To overcome these issues, this study introduces three approaches that can execute the optimal Ate pairing on Barreto-Naehrig curves using Jacobean coordinates with the goal of reaching 128-bit security on the Genesys board. The first approach is a pure software implementation utilizing the MicroBlaze processor. The second involves a combination of software and hardware, with key operations in FpF_{p} and Fp2F_{p^{2}} being transformed into IP cores for the MicroBlaze. The third approach builds on the second by incorporating parallelism to improve the pairing process. The utilization of multiple MicroBlaze processors within a single system offers both versatility and parallelism to speed up pairing calculations. A variety of methods and parameters are used to optimize the pairing computation, including Montgomery modular multiplication, the Karatsuba method, Jacobean coordinates, the Complex squaring method, sparse multiplication, squaring in Gϕ6Fp12G_{\phi 6}F_{p^{12}}, and the addition chain method. The proposed systems are designed to efficiently utilize limited resources in restricted environments, while still completing tasks in a timely manner.Comment: 13 pages, 8 figures, and 5 table

    Preconditioned conjugate gradient methods for absolute value equations

    Get PDF
    We investigate the NP-hard absolute value equations (AVE), AxBx=bAx-B|x| =b, where A,BA,B are given symmetric matrices in Rn×n, bRn\mathbb{R}^{n\times n}, \ b\in \mathbb{R}^{n}. By reformulating the AVE as an equivalent unconstrained convex quadratic optimization, we prove that the unique solution of the AVE is the unique minimum of the corresponding quadratic optimization. Then across the latter, we adopt the preconditioned conjugate gradient methods to determining an approximate solution of the AVE. The computational results show the efficiency of these approaches in dealing with the AVE

    Chemical characteristics and cancer risk assessment of smokeless tobacco used in Tunisia (neffa)

    Get PDF
    Introduction: neffa, a form of air-dried smokeless tobacco used in North Africa, is spuriously perceived as a lower risk alternative to smoking. The objective of this study was to provide information on some harmful constituents of neffa and to use them for cancer risk assessment. Methods: a high-performance liquid chromatography method coupled with fluorescence detector was used to determine polycyclic aromatic hydrocarbons (PAHs) in one sample of neffa. An atomic absorption spectrometry was performed to determine the concentrations of lead and cadmium in three samples of neffa. The levels of toxicants found in neffa were used to assess for lifetime cancer risk as advocated by the US Environment Protection Agency. Results: the determination of PAHs in neffa allowed the identification of phenanthrene and anthracene. However, the higher molecular weight PAHs such as Benzo(a)Pyrene (B(a)P) were not detected. The concentrations of cadmium and lead varied between 1.3 to 2.8μg/g and 1.7 to 4.6μg/g respectively. Cancer risk for cadmium and lead varied between 4.2E-03 to 9.3E-03 and 2.5E-06 to 6.4E-06 respectively. Cancer risk for Cd exceeded the range of 10E-04 to 10E-06 of an acceptable risk. Conclusion: neffa is not a healthy alternative for overcoming smoking addiction. It contains mineral and organic pulmonary toxicants. This study could serve as a scientific basis to inform consumers about the products´ toxicity and help them to quit smokeless tobacco (SLT) use

    Preconditioned conjugate gradient methods for absolute value equations

    No full text
    We investigate the NP-hard absolute value equations (AVE), AxBx=bAx-B|x| =b, where A,BA,B are given symmetric matrices in Rn×n, bRn\mathbb{R}^{n\times n}, \ b\in \mathbb{R}^{n}. By reformulating the AVE as an equivalent unconstrained convex quadratic optimization, we prove that the unique solution of the AVE is the unique minimum of the corresponding quadratic optimization. Then across the latter, we adopt the preconditioned conjugate gradient methods to determining an approximate solution of the AVE. The computational results show the efficiency of these approaches in dealing with the AVE

    Impact of Transportation Costs on the Establishment of an Industrial Symbiosis Network

    No full text
    The challenges related to natural resource depletion and environmental issues stimulate businesses to look for solutions to overcome them. One of the leading strategies that have emerged from the practical implementation of the circular economy concept is industrial symbiosis, which aims to reduce material extraction and consumption by using the waste (co-product) of one company as input for production processes of another company. This study aims to provide a more profound insight into industrial symbiosis (IS) modeling by considering the transport system impact. To this end, a hybrid approach based on agent-based modeling and system dynamics is presented to comprehensively capture the complexity of interactions between companies and their related impacts on transportation. A case study and numerical example are discussed to validate the proposed approach and related model. The results demonstrate that the development of IS, as expected, is significantly influenced by the transport system

    Efficient Implementation on Low-Cost SoC-FPGAs of TLSv1.2 Protocol with ECC_AES Support for Secure IoT Coordinators

    No full text
    Security management for IoT applications is a critical research field, especially when taking into account the performance variation over the very different IoT devices. In this paper, we present high-performance client/server coordinators on low-cost SoC-FPGA devices for secure IoT data collection. Security is ensured by using the Transport Layer Security (TLS) protocol based on the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite. The hardware architecture of the proposed coordinators is based on SW/HW co-design, implementing within the hardware accelerator core Elliptic Curve Scalar Multiplication (ECSM), which is the core operation of Elliptic Curve Cryptosystems (ECC). Meanwhile, the control of the overall TLS scheme is performed in software by an ARM Cortex-A9 microprocessor. In fact, the implementation of the ECC accelerator core around an ARM microprocessor allows not only the improvement of ECSM execution but also the performance enhancement of the overall cryptosystem. The integration of the ARM processor enables to exploit the possibility of embedded Linux features for high system flexibility. As a result, the proposed ECC accelerator requires limited area, with only 3395 LUTs on the Zynq device used to perform high-speed, 233-bit ECSMs in 413 µs, with a 50 MHz clock. Moreover, the generation of a 384-bit TLS handshake secret key between client and server coordinators requires 67.5 ms on a low cost Zynq 7Z007S device
    corecore