Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

غزل

کاغذی تھیں جلا کے رکھ دی ہیں
تجھ کو اب دل سے دیکھنا ہے مجھے
آج دیکھا ہے بے حجاب اُس کو
دیکھنا اِن میں خواب آئیں گے
صبر میرا شعار ٹھہرا ہے
ساری چڑیاں اڑا کے رکھ دی ہیں
اپنی آنکھیں چھپا کے رکھ دی ہیں
ساری باتیں بھلا کے رکھ دی ہیں
میں نے آنکھیں سلا کے رکھ دی ہیں
خواہشیں سب دبا کے رکھ دی ہیں

تقارب عقائد کے لئے علمائے اہل سنت کی کاوشیں (ایک تحقیقی و تجزیاتی مطالعہ) The Efforts of Ahl al-Sunnah Scholars for Convergence of Beliefs (An Exploratory and Analytical Study)

There are many beliefs in the sects that are common, while the differences are very small and minor. The differences are usually of a sectarian, ijtihad and preferential nature. But the false powers are using these sectarian differences to spread extremist thinking, which is a poison for the Muslim Ummah. Closeness is essential for the survival of the Muslim faith. This unity should not be temporary but should be a message of intellectual and spiritual, material well-being, spiritual maturity and evolution of mental development and unity should be universal. No matter how much the two groups disagree, there are many commonalities. It is important for convergent beliefs to cultivate commonalities rather than divisive ones. So that the atmosphere of hatred is reduced and an atmosphere of unity is created. The history of Islam bears witness to the fact that the Imams, jurists, narrators and commentators have differed on a number of issues. Despite this difference, love, goodwill, brotherhood and unity prevailed. For such interfaith tolerance and harmony, mutual respect is also necessary. Key words: Convergence of beliefs,  Unity and solidarity,   Interdisciplinary, Shared, Sub-differences, Universal

Ultralight Weight Cryptography for Low Cost Passive Frid Tags

Radio Frequency IDentification (RFID) is one of the most promising identification schemes in the field of pervasive systems. Non-line of sight capability makes RFID systems more protuberant than its contended systems (such as barcode, magnetic tape etc.). RFID systems mainly consist of three main components: tag, reader and the backend database. A tag is a small electronic chip (transponder) implanted on an object which needs to be identified. A reader scans the tags, collects identification information and forwards this information towards the backend database (server) for the final verification. Security and privacy are the two major concerns of RFID based identification systems which are associated with the tag’s cost. On the basis of the tag’s cost and computational capabilities, the RFID tags can be classified into two types: high and low cost tags. Our research work focuses on low cost RFID tags. High cost tags are resourceful enough to support traditional cryptographic algorithms and primitives such as AES, hash functions, stream ciphers etc. for security. These conventional cryptographic algorithms and primitives have excessive power, memory and silicon (chip) area requirements; which are transcendent from the low cost tag’s computational capabilities. Hence, a new field ultralightweight cryptography has been introduced to ensure the security of low cost RFID tags in recent years. Ultralightweight cryptography avoids the use of costly operations and supports only simple T-functions and some special purpose ultralightweight primitives for the security. This research examines the security issues of low cost RFID systems and makes five contributions. First, we perform the security analysis of numerous Ultralightweight Mutual Authentication Protocols (UMAPs) and discuss the pitfalls in the design of these protocols. Secondly, we present a sophisticated security model to validate the security claims of the UMAPs and cryptanalyze four eminent UMAPs (EMAP, SASI, Yeh et al. and RAPP). We use Recursive Linear Cryptanalysis (RLC) on SASI protocol and quasi linear cryptanalysis on Yeh et al. to retrieve tag’s secret ??. Further desynchronization and two Denial of Service (DoS) attacks on RAPP protocol have also been highlighted. Thirdly, we propose three new UMAPs (RCIA, SASI using Recursive Hash and KMAP) which are robust against all possible existing attacks. Moreover, a counter based methodology has also been assimilated with GOASSMER protocol and R2AP to avoid multiple DoS attacks and traceability attacks. Since the proper hardware implementation of such UMAPs has been long neglected, hence it is unclear that whether such protocols are practically compatible with low cost RFID tags having limited on-chip hardware compatibility or not. We therefore present an efficient hardware implementation of proposed UMAPs for EPC-C1G2 tags using both FPGA and ASIC design flows as our fourth contribution. The simulation and synthesis results of the proposed optimized hardware architecture show the compatibility of the proposed UMAPs with extremely low cost RFID tags. The low cost RFID tags don’t support conventional cryptographic primitives such as on-chip random number generators and conventional hash functions due to resource constraints. We propose two new primitives, Rot and Recursive Hash, to generate the Pseudorandom Numbers which result in Ultralightweight Pseudorandom Number Generators (UPRNGs). We analyze their performance analysis, statistical properties and the efficient hardware implementation to validate their practical feasibility with the low cost RFID tags.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.