Fig 6 - uploaded by Yuan Wen Hau
Content may be subject to copyright.
UML sequence diagram of User Terminal Initialization between CA and User

UML sequence diagram of User Terminal Initialization between CA and User

Source publication
Article
Full-text available
This paper presents the hardware-software co-design of an elliptic curve cryptographic (ECC) system-on-chip (SoC) implementation of a mutual authentication protocol for network/data communication systems. Designing such computationally intensive cryptosystems, particularly for resource-constrained embedded applications using the conventional regist...

Contexts in source publication

Context 1
... the functionality of the data communication application has been decomposed to CA, user terminal, and server, respectively, a UML sequence diagram is required to describe the data flow of the system application. Fig. 6 shows the UML sequence diagram example of CTF model of ECC-SoC for the user terminal initialization process shown in Fig. 2(a). Each system in the data communication application is represented as a sequence element. The system application is carried out by a series of function calls executed sequentially in each ISS of CA, user ...
Context 2
... operations. The functionality of an ECC-SoC is partitioned into HW and SW MoCs. As a result, the UML sequence diagram is also required to model the data exchanges among the MoCs via function call by the ISS within a ECC-SoC. Fig. 9 shows the simplified sequence diagram example of the ECC_public_key_pair_generation() of User_ECC_SoC as shown in Fig. 6. It is based on ECDSA key pair generation operation, which consists of multiple lower-level functions. In this sequence diagram, only the ISS and HW MoCs are represented as sequence elements. The function calls can either be a SW MoC simulated by GPEP, or as a FW that sends instructions to a HW MoC. When a higher level HW MoC is trying ...

Citations

... Each has different underlying field arithmetic computation. Field arithmetic over prime field mainly involves big integer modular arithmetic, whereas field arithmetic over binary field is based on polynomial arithmetic [40]. ...
Thesis
Digital communications systems are the most indispensable part of our life. So, the improving performance of coding transmitter channels is essential. The transmitted data through communication channels have different levels of secrecy or privacy that could be compromised. So, securing data against different attacks is a very important issue. The confidentiality and reliability standards of communication systems play an important role, especially for military applications. Information security is responsible for defending the transferred data from an unauthorized access. This thesis concerns with the data confidentiality service, which is needed for retaining the transferred data unrevealed to an unauthorized user. Cryptography is the employed security mechanism to accomplish the task of data confidentiality. Elliptic curve cryptography uses to conceal the digital data content to ensure its privacy. It is belonging to the public key cryptosystem family which achieves high-level security. The main weakness of this family is the lagging for processing time and the needing to supplementary memory. The main idea of the proposed approach is to eliminate the classical encoding schedule process, improving the rapidity, and remove the supplementary memory. The combining of elliptic curve cryptography with the modified Hill cipher technique utilize to achieve the objective of this thesis.Digital communications systems are the most indispensable part of our life. So, the improving performance of coding transmitter channels is essential. The transmitted data through communication channels have different levels of secrecy or privacy that could be compromised. So, securing data against different attacks is a very important issue. The confidentiality and reliability standards of communication systems play an important role, especially for military applications. Information security is responsible for defending the transferred data from an unauthorized access. This thesis concerns with the data confidentiality service, which is needed for retaining the transferred data unrevealed to an unauthorized user. Cryptography is the employed security mechanism to accomplish the task of data confidentiality. Elliptic curve cryptography uses to conceal the digital data content to ensure its privacy. It is belonging to the public key cryptosystem family which achieves high-level security. The main weakness of this family is the lagging for processing time and the needing to supplementary memory. The main idea of the proposed approach is to eliminate the classical encoding schedule process, improving the rapidity, and remove the supplementary memory. The combining of elliptic curve cryptography with the modified Hill cipher technique utilize to achieve the objective of this thesis.
... Each has different underlying field arithmetic computation. Field arithmetic over prime field mainly involves big integer modular arithmetic, whereas field arithmetic over binary field is based on polynomial arithmetic [40]. ...
Thesis
Full-text available
Digital communications systems are the most indispensable part of our life. So, the improving performance of coding transmitter channels is essential. The transmitted data through communication channels have different levels of secrecy or privacy that could be compromised. So, securing data against different attacks is a very important issue. The confidentiality and reliability standards of communication systems play an important role, especially for military applications. Information security is responsible for defending the transferred data from an unauthorized access. This thesis concerns with the data confidentiality service, which is needed for retaining the transferred data unrevealed to an unauthorized user. Cryptography is the employed security mechanism to accomplish the task of data confidentiality. Elliptic curve cryptography uses to conceal the digital data content to ensure its privacy. It is belonging to the public key cryptosystem family which achieves high-level security. The main weakness of this family is the lagging for processing time and the needing to supplementary memory. The main idea of the proposed approach is to eliminate the classical encoding schedule process, improving the rapidity, and remove the supplementary memory. The combining of elliptic curve cryptography with the modified Hill cipher technique utilize to achieve the objective of this thesis.
... As the keys size is very small, processing overheads are automatically reduced [12]. The Key size for 160 bit ECC system provides security strength comparable to a 1024 bits RSA cryptosystem [21,33,34]. ...
Article
Full-text available
Cryptographic protocols are the backbone of information security. Unfortunately the security of several important components of these protocols can be neglected. This causes violation of personal privacy and threats to democracy. Integration of biometrics with cryptography can overcome this problem. In this paper an enhanced session key agreement protocol which uses the data derived from iris signature is suggested to improve the security of biometric based applications like e-Passport, e-Driving license, etc. The authenticity and security properties of the proposed protocol are analyzed using ProVerif tool and demonstrate it satisfies the intended properties.
... SoC is an embedded system where the complete hardware system for a target application is integrated in a single chip (Hau et al. 2011) offering many benefits including lower hardware cost and power consumption. These benefits make SoC the best architecture for real time embedded systems having tight design constraints such as used in medical electronic devices. ...
Article
In this paper, a mathematical modelling concept is used to analyse the glucose-insulin interaction in managing Type 1 Diabetes Mellitus (T1DM). The Hovorka model has been chosen to design the glucose kinetics, so that the relationship between reactions of insulin to blood glucose concentration can be observed. This mathematical model implements a nonlinear ordinary differential equation where each parameter represents specific functions. The meal and exogenous insulin bolus are the two inputs in this mathematical model for prediction of glucose levels. The analysis of this model is done by using C++ programming language which is the first step towards system-on-chip (SoC) implementation for real time simulation based analysis of glucose-insulin dynamics.
Article
Embedded hardware accelerator with limited resources is increasingly employed in security areas. To accelerate system-on-chip (SoC) design, an efficient HW/SW co-design approach and validation platform become extremely important. The Electronic System Level Simulator (ESL) based on SystemC is the primary solution for fast hardware modeling and verification. However, most existing simulators cannot achieve a better trade-off between accuracy and performance, and none of the specific ESL simulators are proposed for cryptographic SoCs. To this end, this brief proposes a virtual prototype (VP) with integrated cryptographic accelerators for a cryptographic SoC based on RISC-V to accelerate the functional and performance simulation of the SoC. The VP is designed as an extensible and configurable platform dedicated to cryptographic SoC using an efficient HW/SW co-design approach. To accurately emulate real hardware, the flexible AHB-TLM interface and core timing model are presented. Compared to the RTL simulation, our custom VP performs about 10–450 times faster than the RTL simulation, and the simulation error is only about 4%. Our code is available at https://github.com/LX-IC/VP .
Conference Paper
This paper presents a methodology for speeding up the design and verification of process of artificial neural networks (ANNs) in system-on-chip (SoC) hardware with the help of co-simulation. Application of advanced design methodologies for complex designs such as ANNs are important in todays fast moving hardware design industry. However, it is difficult to fully verify the functionality of ANNs when designed in hardware. Most forms of ANN require the use of complex training algorithms, which are difficult to implement in a testbench even with the help of modern interfaces such as SystemVerilog's DPI-C. The neural network topology selected as the case study for this paper are evolvable block-based neural networks (BbNNs). The case studies employed during the verification process are the XOR problem, driver drowsiness classification, and heart arrhythmia classification. The proposed methodology significantly reduces the verification time required for the design of hardware-based neural networks. This allows complex models applicable a variety of applications to be quickly designed, such as industrial motor controllers or fuzzy systems.
Article
This paper describes the implementation of a reconfigurable hardware-based genetic algorithm (HGA) accelerator using the hardware-software (HW/SW) co-design methodology. This HGA is coupled with a unique TRNG that extracts random jitters from a phase lock loop (PLL) to ensure proper GA operation. It is then applied and benchmarked with several case studies, which include the optimization of a simple fitness function, a constrained Michalewicz function, and the tuning of parameters in finger-vein biometrics. A HGA solution is necessary in systems that demand high performance during the optimization process. However, implementations that are completely designed in hardware will result in a very rigid architecture, making it difficult to reconfigure the system for use in different applications. This paper aims to solve this issue by proposing a HGA design that provides reconfigurability and flexibility by moving problem-dependent processes into software. The prototyping platform used is an Altera Stratix II EP2S60 FPGA prototyping board with a clock frequency of 50 MHz. The HW/SW co-design technique is applied, and system partitioning is done based on aspects such as system constraints, operational intensity, process sequencing, hardware logic utilization, and reconfigurability. Experimental results show that the proposed HGA outperforms equivalent software implementations compiled with an open-sourced C++ GA component library (GAlib) running on the same prototyping platform by 102 times at most. In the final case study, the application of the proposed HGA in tunable parameter optimization in finger-vein biometrics improved the matching rate, reducing the equal error rate (EER) value from 1.004% down to 0.101%.