Preferred Language
Articles
/
joe-1161
Performance Evaluation of Scalar Multiplication in Elliptic Curve Cryptography Implementation using Different Multipliers Over Binary Field GF (2233)
...Show More Authors

This paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.

The first approach attains a performance index of approximately 0.217610202 when its realization is over Virtex-6 (6vlx130tff1156-3). It uses an interleaved multiplier with 3077 register slices, 4064 lookup tables (LUTs), 2837 flip-flops (FFs) at a maximum frequency of 221.6Mhz. This makes it more suitable for high-frequency applications. The second approach, which uses the Montgomery multiplier, produces a PI of approximately 0.2228157 when its implementation is on Virtex-4 (6vlx130tff1156-3). This approach utilizes 3543 slices, 2985 LUTs, 3691 FFs at a maximum frequency of 190.47MHz. Thus, it is found that the implementation of the second approach on Virtex-4 is more suitable for applications with a low frequency of about 86.4Mhz and a total number of slices of about 12305.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Engineering
Software Implementation of Binary BCH Decoder Using Microcontroller
...Show More Authors

In this paper a decoder of binary BCH code is implemented using a PIC microcontroller for code length n=127 bits with multiple error correction capability, the results are presented for correcting errors up to 13 errors. The Berkelam-Massey decoding algorithm was chosen for its efficiency. The microcontroller PIC18f45k22 was chosen for the implementation and programmed using assembly language to achieve highest performance. This makes the BCH decoder implementable as a low cost module that can be used as a part of larger systems. The performance evaluation is presented in terms of total number of instructions and the bit rate.

 

 

View Publication Preview PDF
Publication Date
Wed May 31 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Sets of Subspaces of a Projective Plane PG(2,q) Over Galois Field GF(q)
...Show More Authors

       In this thesis, some sets of subspaces of projective plane PG(2,q) over Galois field GF(q) and the relations between them by some theorems and examples can be shown.
 

View Publication Preview PDF
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Construction and Reverse Construction of the Complete Arcs in the Projective 3-Space Over Galois Field GF(2)
...Show More Authors

  The main purpose of this work is to find the complete arcs in the projective 3-space over Galois field GF(2), which is denoted by PG(3,2), by two methods and then we compare between the two methods

View Publication Preview PDF
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Mobility Models over UDP Traffic Pattern for MANET Using NS-2
...Show More Authors

  The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes,  different traffic rates, different traffic sources, different pause times and different simulation times .  A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Construction of Complete (k,n)-arcs in the Projective Plane PG(2,11) Over Galois Field GF(11), 3 ï‚£ n ï‚£ 11
...Show More Authors

        The purpose of this work is to construct complete (k,n)-arcs in the projective 2-space PG(2,q) over Galois field GF(11) by adding some points of index zero to complete (k,n–1)arcs 3 ï‚£ n ï‚£ 11.         A (k,n)-arcs is a set of k points no n + 1 of which are collinear.         A (k,n)-arcs is complete if it is not contained in a (k + 1,n)-arc

View Publication Preview PDF
Publication Date
Thu Dec 19 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the relationship between curve of Spee and dentofacial morphology in different skeletal patterns
...Show More Authors

Background: Curve of Spee (CS) is an anteroposterior anatomical curve established by the occlusal alignment of the teeth viewed in the sagittal plane. This occlusal curvature has clinical importance in orthodontics and other fields of dentistry. This study aimed to evaluate the relationship between the CS and dentofacial morphology of different skeletal patterns in both genders. Materials and Methods: Eighty six Iraqi Arab subjects (44females,42 males ) their age ranged from 17 -30 years, classified into: Skeletal I with normal occlusion(15 females and 15 males), skeletal II with CI II div 1 malocclusion (15 females and 15 males) and skeletal III with CI III malocclusion (14 females and 12 males). Forty one variables measured us

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Multipliers of an AT-algebra
...Show More Authors

In this work, we present the notion of a multiplier on AT-algebra and investigate several properties. Also, some theorems and examples are discussed.  The notions of the kernel and the image of multipliers are defined. After that, some propositions related to isotone and regular multipliers are proved. Finally, the Left and the Right derivations of the multiplier are obtained

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Randomness of Stream Cipher Digital Sequences in the Field GF(28)
...Show More Authors

     A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field  to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Performance Evaluation of IPv6 Header Compression over MPLS via Satellite
...Show More Authors

Broadband satellite is playing a main role in provision global coverage and onboard processing ability over IP networks to assess user applications. In order to lower the cost, get better security, solve IPv4 addressing limitation, expand the expected advantages of modern routing and mobility characteristics; the next-generation satellite systems ought to support IPv6 and seamlessly incorporate with terrestrial networks including wireless local loops. Satellite communication links have a number of limitations compared to terrestrial communications networks such as large delay and high header overhead for IPv6 consumes the bandwidth and causes lower transmission effectiveness; however, the quality of service (QoS) (such as delay, jitter,

... Show More
View Publication Preview PDF