Preferred Language
Articles
/
bsj-4033
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by proposing a more efficient design for the hardware implementation of ECDSA. The design raised the throughput to 0.08207 Mbit/s, leading to an increase of 6.95% from the existing design. It also includes the design and implementation of the Universal Asynchronous Receiver Transmitter (UART) module. The present work is based on a 163-bit key-size over Koblitz curve k-163 and secure hash function SHA-1. A serial module for the underlying modular layer, high-speed architecture of Koblitz point addition and Koblitz point multiplication have been considered in this work, in addition to utilising the carry-save-multiplier, modular adder-subtractor and Extended Euclidean module for ECDSA protocols. All modules are designed using VHDL and implemented on the platform Virtex5 xc5vlx155t-3ff1738. Signature generation requires 0.55360ms, while its validation consumes 1.10947288ms. Thus, the total time required to complete both processes is equal to 1.66ms and the maximum frequency is approximately 83.477MHZ, consuming a power of 99mW with the efficiency approaching 3.39 * 10-6.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
The impact of e-learning on the cognitive level in the Corona crisis: أسماء غازي عبد

E-learning is a necessity imposed by the Corona pandemic, which has disrupted various educational institutions in the world, but some of these institutions have not been affected and education has continued with them, due to their flexible educational system that was able to employ technology in the continuity of the educational process in the so-called e-learning, because It has characteristics that make it the most suitable alternative to avoid the consequences of the Corona pandemic and its damage to the educational process, as e-learning is one of the modern methods that contribute to enhancing the effectiveness of the learner, and enabling him to assume greater responsibility compared to traditional education, so the learner becomes

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Symmetry Group for Solving Elliptic Euler-Poisson-Darboux Equation

The aim of this article is to study the solution of  Elliptic Euler-Poisson-Darboux equation, by using the symmetry of Lie Algebra of orders two and three, as a contribution in partial differential equations and their solutions.

Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Sep 01 2008
Journal Name
Al-khwarizmi Engineering Journal
New Adaptive Data Transmission Scheme Over HF Radio

Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.

An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Laser
Parametric Optimization for Fatigue Life of 6061-T6 Aluminum Thin Sheets Processed with High-Speed Laser Shock Peening

Abstract: Aluminum alloys grade 6061-T6 are characterized by their excellent properties and processing characteristics which make them ideal for varieties of industrial applications under cyclic loading, aluminum alloys show less fatigue life than steel alloys of similar strength. In the current study, a nanosecond fiber laser of maximum pulse energy up to 9.9 mJ was used to apply laser shock peening process (LSP) on aluminum thin sheets to introduce residual stresses in order to enhance fatigue life under cyclic loading Box-Behnken design (BBD) based on the design of experiments (DOE) was employed in this study for experimental design data analysis, model building and optimization The effect of working parameters spot size (ω), scannin

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Mechanisms of Social Change in the Era of Digital Communication and its Effects on the Communicative Message

When sites of new communication occurs which represents the merit of the development of communication technology which is characterized by the services of ( facebook-twiter-corapora-youtube-mass space-friendster-flicker-willnecked in addition to the direct services for viber-whatsup-telgram-and chat on) play important role in changing the infrastructure of Arabic societies which are consideredas closed and not changeable societies during near period and the significance of this study comes from the importounce of this subject which is considered as anew trend of the age on the field of media and public response and acceptance inspite of what is known about Arabic society-it doesn’t accept change-this occurance is associated with terms

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Applying A* Path Planning Algorithm Based on Modified C-Space Analysis

In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons

... Show More
Crossref (4)
Crossref
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Digital Media and its Role in Marketing Artistic Products " A Field Study": احمد عبد الستار حسين

This research addresses a problem manifested in a main question: what is the role of the digital media in marketing the artistic products? in order to determine the role played by the digital media in  the disclosure and promotion of  the artistic product, its price and places of distribution, as the basic elements of the marketing mixture. 

                This is a descriptive research in which the researcher used the survey method to check the opinions of a sample chosen according to the (proportion) method from the research community represented by instructors and students of the college of Fine Arts- University of Dayala. 

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Productive role in the financial performance of the banking: An Empirical Study in a sample of Iraqi banks

Abstract :

The research aims to study the basic concepts of banking productivity and discuss different approaches to study what ends to identify the most important possible standards applied to measured within the Iraqi banking environment as well as research into the causes of low and high Iraqi banking productivity and identify possible treatments to curb those reasons as to ensure the rise. And in line with the research problem, which states what is the level of productivity and what are the causes of decline and the rise in private banking research sample individually. And what the Iraqi private banks and what is the relationship between performance and the impact of productivity change in the perform

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF