-
Interacting Kerr-Newman Electromagnetic Fields
Authors:
Sajad Aghapour,
Lars Andersson,
Kjell Rosquist,
Tomasz Smołka
Abstract:
In this paper, we study some of the properties of the $G \to 0$ limit of the Kerr-Newman solution of Einstein-Maxwell equations. Noting Carter's observation of the near equality between the $g = 2$ gyromagnetic ratio in the Kerr-Newman solution and that of the electron, we discuss additional such coincidences relating to the Kerr-Newman multipoles and properties of the electron. In contrast to the…
▽ More
In this paper, we study some of the properties of the $G \to 0$ limit of the Kerr-Newman solution of Einstein-Maxwell equations. Noting Carter's observation of the near equality between the $g = 2$ gyromagnetic ratio in the Kerr-Newman solution and that of the electron, we discuss additional such coincidences relating to the Kerr-Newman multipoles and properties of the electron. In contrast to the Coulomb field, this spinning Maxwell field has a finite Lagrangian. Moreover, by evaluating the Lagrangian for the superposition of two such Kerr-Newman electromagnetic fields on a flat background, we are able to find their interaction potential. This yields a correction to the Coulomb interaction due to the spin of the field.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Efficient Algorithm Level Error Detection for Number-Theoretic Transform Assessed on FPGAs
Authors:
Kasra Ahmadi,
Saeed Aghapour,
Mehran Mozaffari Kermani,
Reza Azarderakhsh
Abstract:
Polynomial multiplication stands out as a highly demanding arithmetic process in the development of post-quantum cryptosystems. The importance of number-theoretic transform (NTT) extends beyond post-quantum cryptosystems, proving valuable in enhancing existing security protocols such as digital signature schemes and hash functions. Due to the potential for errors to significantly disrupt the opera…
▽ More
Polynomial multiplication stands out as a highly demanding arithmetic process in the development of post-quantum cryptosystems. The importance of number-theoretic transform (NTT) extends beyond post-quantum cryptosystems, proving valuable in enhancing existing security protocols such as digital signature schemes and hash functions. Due to the potential for errors to significantly disrupt the operation of secure, cryptographically-protected systems, compromising data integrity, and safeguarding against side-channel attacks initiated through faults it is essential to incorporate mitigating error detection schemes. This paper introduces algorithm level fault detection schemes in NTT multiplication, representing a significant enhancement compared to previous research. We evaluate this through the simulation of a fault model, ensuring that the conducted assessments accurately mirror the obtained results. Consequently, we attain a notably comprehensive coverage of errors. Finally, we assess the performance of our efficient error detection scheme on FPGAs to showcase its implementation and resource requirements. Through implementation of our error detection approach on Xilinx/AMD Zynq Ultrascale+ and Artix-7, we achieve a comparable throughput with just a 9% increase in area and 13% increase in latency compared to the original hardware implementations.
△ Less
Submitted 2 March, 2024;
originally announced March 2024.
-
Efficient Fault Detection Architectures for Modular Exponentiation Targeting Cryptographic Applications Benchmarked on FPGAs
Authors:
Saeed Aghapour,
Kasra Ahmadi,
Mehran Mozaffari Kermani,
Reza Azarderakhsh
Abstract:
Whether stemming from malicious intent or natural occurrences, faults and errors can significantly undermine the reliability of any architecture. In response to this challenge, fault detection assumes a pivotal role in ensuring the secure deployment of cryptosystems. Even when a cryptosystem boasts mathematical security, its practical implementation may remain susceptible to exploitation through s…
▽ More
Whether stemming from malicious intent or natural occurrences, faults and errors can significantly undermine the reliability of any architecture. In response to this challenge, fault detection assumes a pivotal role in ensuring the secure deployment of cryptosystems. Even when a cryptosystem boasts mathematical security, its practical implementation may remain susceptible to exploitation through side-channel attacks. In this paper, we propose a lightweight fault detection architecture tailored for modular exponentiation, a building block of numerous cryptographic applications spanning from classical cryptography to post quantum cryptography. Based on our simulation and implementation results on ARM Cortex-A72 processor, and AMD/Xilinx Zynq Ultrascale+, and Artix-7 FPGAs, our approach achieves an error detection rate close to 100%, all while introducing a modest computational overhead of approximately 7% and area overhead of less than 1% compared to the unprotected architecture. To the best of our knowledge, such an approach benchmarked on ARM processor and FPGA has not been proposed and assessed to date.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities
Authors:
Saleh Darzi,
Kasra Ahmadi,
Saeed Aghapour,
Attila Altay Yavuz,
Mehran Mozaffari Kermani
Abstract:
The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols, necessitating the development of secure post-quantum (PQ) schemes. Hence, we conduct a comprehensive study on various PQ approaches, covering the constructional design, structural vulnerabilities, and offer security assessments, implementation evaluations, and a particular focus on side-channel att…
▽ More
The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols, necessitating the development of secure post-quantum (PQ) schemes. Hence, we conduct a comprehensive study on various PQ approaches, covering the constructional design, structural vulnerabilities, and offer security assessments, implementation evaluations, and a particular focus on side-channel attacks. We analyze global standardization processes, evaluate their metrics in relation to real-world applications, and primarily focus on standardized PQ schemes, selected additional signature competition candidates, and PQ-secure cutting-edge schemes beyond standardization. Finally, we present visions and potential future directions for a seamless transition to the PQ era.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
An Efficient Authentication Protocol for Smart Grid Communication Based on On-Chip-Error-Correcting Physical Unclonable Function
Authors:
Masoud Kaveh,
Mohammad Reza Mosavi,
Diego Martin,
Saeed Aghapour
Abstract:
Security has become a main concern for the smart grid to move from research and development to industry. The concept of security has usually referred to resistance to threats by an active or passive attacker. However, since smart meters (SMs) are often placed in unprotected areas, physical security has become one of the important security goals in the smart grid. Physical unclonable functions (PUF…
▽ More
Security has become a main concern for the smart grid to move from research and development to industry. The concept of security has usually referred to resistance to threats by an active or passive attacker. However, since smart meters (SMs) are often placed in unprotected areas, physical security has become one of the important security goals in the smart grid. Physical unclonable functions (PUFs) have been largely utilized for ensuring physical security in recent years, though their reliability has remained a major problem to be practically used in cryptographic applications. Although fuzzy extractors have been considered as a solution to solve the reliability problem of PUFs, they put a considerable computational cost to the resource-constrained SMs. To that end, we first propose an on-chip-error-correcting (OCEC) PUF that efficiently generates stable digits for the authentication process. Afterward, we introduce a lightweight authentication protocol between the SMs and neighborhood gateway (NG) based on the proposed PUF. The provable security analysis shows that not only the proposed protocol can stand secure in the Canetti-Krawczyk (CK) adversary model but also provides additional security features. Also, the performance evaluation demonstrates the significant improvement of the proposed scheme in comparison with the state-of-the-art.
△ Less
Submitted 23 July, 2023;
originally announced July 2023.
-
Helicity, Spin, and Infra-zilch of Light: a Lorentz Covariant Formulation
Authors:
Sajad Aghapour,
Lars Andersson,
Kjell Rosquist
Abstract:
In this paper, a novel conserved Lorentz covariant tensor, termed the helicity tensor, is introduced in Maxwell theory. The conservation of the helicity tensor expresses the conservation laws contained in the helicity array, introduced by Cameron et al., including helicity, spin, and the spin-flux or infra-zilch. The Lorentz covariance of the helicity tensor is in contrast to previous formulations…
▽ More
In this paper, a novel conserved Lorentz covariant tensor, termed the helicity tensor, is introduced in Maxwell theory. The conservation of the helicity tensor expresses the conservation laws contained in the helicity array, introduced by Cameron et al., including helicity, spin, and the spin-flux or infra-zilch. The Lorentz covariance of the helicity tensor is in contrast to previous formulations of the helicity hierarchy of conservation laws, which required the non-Lorentz covariant transverse gauge. The helicity tensor is shown to arise as a Noether current for a variational symmetry of a duality-symmetric Lagrangian for Maxwell theory. This symmetry transformation generalizes the duality symmetry and includes the symmetry underlying the conservation of the spin part of the angular momentum.
△ Less
Submitted 18 February, 2021; v1 submitted 23 December, 2020;
originally announced December 2020.
-
The Zilch Electromagnetic Conservation Law Revisited
Authors:
Sajad Aghapour,
Lars Andersson,
Kjell Rosquist
Abstract:
It is shown that the zilch conservation law arises as the Noether current corresponding to a variational symmetry of a duality-symmetric Maxwell Lagrangian. The action of the corresponding symmetry generator on the duality-symmetric Lagrangian, while non-vanishing, is a total divergence as required by the Noether theory. The variational nature of the zilch conservation law was previously known onl…
▽ More
It is shown that the zilch conservation law arises as the Noether current corresponding to a variational symmetry of a duality-symmetric Maxwell Lagrangian. The action of the corresponding symmetry generator on the duality-symmetric Lagrangian, while non-vanishing, is a total divergence as required by the Noether theory. The variational nature of the zilch conservation law was previously known only for some of the components of the zilch tensor, notably the optical chirality. By contrast, our analysis is fully covariant and is therefore valid for all components of the zilch tensor. The analysis is presented here for both real and complex versions of duality-symmetric Maxwell Lagrangians.
△ Less
Submitted 20 January, 2021; v1 submitted 18 April, 2019;
originally announced April 2019.
-
Helicity and spin conservation in Maxwell theory and Linearized Gravity
Authors:
Sajad Aghapour,
Lars Andersson,
Reebhu Bhattacharyya
Abstract:
A duality symmetric formulation of linearized gravity has been introduced by Barnett and used to show the conservation of helicity. However, the relation between helicity and spin as well as the separate conservation of the spin and orbital parts of angular momentum, which is known to hold in Maxwell theory, was not considered. These conservation laws are known to follow from the conservation of t…
▽ More
A duality symmetric formulation of linearized gravity has been introduced by Barnett and used to show the conservation of helicity. However, the relation between helicity and spin as well as the separate conservation of the spin and orbital parts of angular momentum, which is known to hold in Maxwell theory, was not considered. These conservation laws are known to follow from the conservation of the so-called helicity array, an analog of the zilch tensor, which includes helicity, spin, and spin-flux or infra-zilch. In the present paper we prove the conservation of spin and orbital angular momentum for linearized gravity on Minkowski space, and construct the analog of the helicity array for linearized gravity.
△ Less
Submitted 4 September, 2019; v1 submitted 8 December, 2018;
originally announced December 2018.
-
On variational principle and canonical structure of gravitational theory in double-foliation formalism
Authors:
Sajad Aghapour,
Ghadir Jafari,
Mehdi Golshani
Abstract:
In this paper, we analyze the variation of the gravitational action on a bounded region of spacetime whose boundary contains segments with various characters, including null. We develop a systematic approach to decompose the derivative of metric variations into orthogonal and tangential components with respect to the boundary and express them in terms of variations of geometric objects associated…
▽ More
In this paper, we analyze the variation of the gravitational action on a bounded region of spacetime whose boundary contains segments with various characters, including null. We develop a systematic approach to decompose the derivative of metric variations into orthogonal and tangential components with respect to the boundary and express them in terms of variations of geometric objects associated with the boundary hypersurface. We suggest that a double-foliation of spacetime provides a natural and useful set-up for treating the general problem and clarifies the assumptions and results in specialized ones. In this set-up, we are able to obtain the boundary action necessary for the variational principle to become well-posed, beside the canonical structure of the theory, while kee** the variations quite general. Especially, we show how one can remove the restrictions imposed on the metric variations in previous works due to the assumption that the boundary character is kept unaltered. As a result, we find that on null boundaries a new canonical pair which is related to the change in character of the boundary. This set-up and the calculation procedure are stated in a way that can be applied to other more generalized theories of gravity.
△ Less
Submitted 1 September, 2018; v1 submitted 22 August, 2018;
originally announced August 2018.
-
Black Hole Entropy from Entropy of Hawking Radiation
Authors:
Sajad Aghapour,
Kamal Hajian
Abstract:
We provide a simple way for calculating the entropy of a Schwarzschild black hole from the entropy of its Hawking radiation. To this end, we show that if a thermodynamic system loses its energy only through the black body radiation, its loss of entropy is always 3/4 of the entropy of the emitted radiation. This proposition enables us to relate the entropy of an evaporating black hole to the entrop…
▽ More
We provide a simple way for calculating the entropy of a Schwarzschild black hole from the entropy of its Hawking radiation. To this end, we show that if a thermodynamic system loses its energy only through the black body radiation, its loss of entropy is always 3/4 of the entropy of the emitted radiation. This proposition enables us to relate the entropy of an evaporating black hole to the entropy of its Hawking radiation. Explicitly, by calculating the entropy of the Hawking radiation emitted in the full period of evaporation of the black hole, we find the Bekenstein-Hawking entropy of the initial black hole.
△ Less
Submitted 12 November, 2016; v1 submitted 9 March, 2016;
originally announced March 2016.