Next Article in Journal
Combining MAMBA and Attention-Based Neural Network for Electric Ground-Handling Vehicles Scheduling
Next Article in Special Issue
Multi-Layered Security Framework Combining Steganography and DNA Coding
Previous Article in Journal
Research on Regional Collaborative Governance Between Central and Local Governments Under the Background of Green Innovation
Previous Article in Special Issue
A Generalized Framework for Adversarial Attack Detection and Prevention Using Grad-CAM and Clustering Techniques
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimizing Security of Radio Frequency Identification Systems in Assistive Devices: A Novel Unidirectional Systolic Design for Dickson-Based Field Multiplier

1
Computer Engineering Department, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia
2
King Salman Center for Disability Research, Riyadh 11614, Saudi Arabia
3
Electrical and Computer Engineering Department, University of Victroia, Victoria, BC V8P 5C2, Canada
*
Author to whom correspondence should be addressed.
Systems 2025, 13(3), 154; https://doi.org/10.3390/systems13030154
Submission received: 18 December 2024 / Revised: 19 February 2025 / Accepted: 21 February 2025 / Published: 25 February 2025

Abstract

:
The emergence of the Internet of Things (IoT) technologies has greatly enhanced the lives of individuals with disabilities by leveraging radio frequency identification (RFID) systems to improve autonomy and access to essential services. However, these advancements also pose significant security risks, particularly through side-channel attacks that exploit weaknesses in the design and operation of RFID tags and readers, potentially jeopardizing sensitive information. To combat these threats, several solutions have been proposed, including advanced cryptographic protocols built on cryptographic algorithms such as elliptic curve cryptography. While these protocols offer strong protection and help minimize data leakage, they often require substantial computational resources, making them impractical for low-cost RFID tags. Therefore, it is essential to focus on the efficient implementation of cryptographic algorithms, which are fundamental to most encryption systems. Cryptographic algorithms primarily depend on various finite field operations, including field multiplication, field inversion, and field division. Among these operations, field multiplication is especially crucial, as it forms the foundation for executing other field operations, making it vital for the overall performance and security of the cryptographic framework. The method of implementing field multiplication operation significantly influences the system’s resilience against side-channel attacks; for instance, implementation using unidirectional systolic array structures can provide enhanced error detection capabilities, improving resistance to side-channel attacks compared to traditional bidirectional multipliers. Therefore, this research aims to develop a novel unidirectional systolic array structure for the Dickson basis multiplier, which is anticipated to achieve lower space and power consumption, facilitating the efficient and secure implementation of computationally intensive cryptographic algorithms in RFID systems with limited resources. This advancement is crucial as RFID technology becomes increasingly integrated into various IoT applications for individuals with disabilities, including secure identification and access control.

1. Introduction

The integration of RFID technology into assistive applications has garnered significant attention in recent years, particularly as part of the broader IoT landscape. RFID systems have been recognized for their potential to enhance the autonomy of individuals with disabilities, facilitating improved access to essential services and support systems [1,2]. For instance, RFID technology can be employed in various assistive devices, such as smart canes for the visually impaired, which not only aid in navigation but also provide auditory feedback about the environment and nearby obstacles [1]. In addition to smart canes, RFID technology is applied in other assistive devices, such as wearable health monitors for individuals with chronic illnesses [3]. These devices can track vital signs and send data to caregivers or medical professionals, ensuring timely interventions when necessary. Furthermore, RFID tags can be attached to mobility aids, such as wheelchairs, to provide real-time location tracking, helping caregivers monitor their users’ movements and ensuring their safety [4].
RFID systems can effectively monitor the habits and activities of elderly individuals or those with disabilities, tracking the use of food, beverages, and medications to provide timely reminders and alerts that significantly improve users’ adherence to health regimens. Studies have shown that RFID systems achieve high specificity (0.9) and sensitivity (1) when monitoring user behavior, indicating their reliability in home environments [5]. Additionally, RFID technology facilitates automatic support and monitoring systems, enabling disabled individuals to live independently while ensuring timely assistance is available when needed. This is particularly relevant for people with chronic health conditions or cognitive impairments. By integrating RFID with the IoT, these systems can gather and analyse data to promote a safer living environment, thereby reducing reliance on family members and fostering greater social inclusion [6].
Another significant application of RFID is in assistive communication devices for individuals with speech impairments [7]. By using RFID-enabled tags, users can communicate their needs or thoughts by simply scanning the appropriate tag, which can trigger pre-recorded messages or alerts. Additionally, RFID technology can support individuals with autism by helping them navigate social scenarios through wearable devices that provide contextual information and cues [8].
RFID also plays a crucial role in improving urban accessibility for individuals with disabilities. By utilizing radio frequency technologies, researchers have proposed methods to analyze movement accessibility in cities, ensuring that urban spaces are designed to be more inclusive [9]. Additionally, RFID can aid in indoor navigation, providing sensory guidance for individuals with cognitive disabilities during daily tasks or in emergencies [10]. This application addresses the need for reliable indoor location services in environments like hospitals and public buildings.
One of the key advantages of RFID in assistive applications is its ability to enable the real-time tracking and monitoring of users [11]. This capability is particularly beneficial for elderly individuals or those with cognitive impairments, as it allows caregivers to monitor their activities and ensure their safety without being intrusive. Studies have shown that RFID-based systems can effectively track daily activities and provide alerts in case of unusual behavior, thereby enhancing the quality of care provided to these individuals. Moreover, RFID technology can facilitate communication between assistive devices and other smart systems within a user’s environment [12]. For example, RFID-enabled devices can interact with home automation systems to adjust lighting or temperature based on the user’s preferences or needs, promoting a more comfortable living environment. This interconnectedness is crucial for fostering independence among users, as it allows them to control their surroundings more effectively.
Despite the advantages provided by RFID systems, the advancement of this technology introduces significant security challenges that impact disabled individuals utilizing assistive devices. One major concern is eavesdropping, where unauthorized readers can intercept communications between RFID tags and readers, risking the compromise of disabled individuals’ sensitive information, such as personal identification and health-related data [13]. This vulnerability underscores the urgent need for comprehensive security measures to ensure the privacy and integrity of disabled users. Replay attacks pose another risk, allowing attackers to record and later replay valid communication between an RFID tag and reader to gain unauthorized access to assistive devices or sensitive information [14]. Cloning is also a concern, as attackers can capture data from an RFID tag, enabling them to create a duplicate tag and impersonate the original user, potentially leading to unauthorized access to services designed for individuals with disabilities [15]. Furthermore, denial-of-service (DoS) attacks can disrupt the normal functioning of RFID systems used in assistive devices by overwhelming them with requests or jamming communication signals, leaving users without essential support [16]. Man-in-the-middle attacks complicate matters further, as attackers can intercept and alter communication between the RFID tag and reader, leading to unauthorized access or data manipulation that could endanger the safety of disabled individuals relying on these technologies [17].
Among these threats, side-channel attacks have emerged as particularly concerning due to their ability to exploit vulnerabilities inherent in the physical design and operation of RFID systems [18,19]. Side-channel attacks target the physical implementation of RFID tags and readers, leveraging the information gained from the system’s physical characteristics to compromise sensitive information. For example, timing analysis allows attackers to infer sensitive information based on variations in the response times of the RFID system. Physical tampering involves manipulating the RFID tags themselves, enabling attackers to extract sensitive data or alter the functionality of the device. Such tactics not only threaten user privacy by exposing personal information but also severely limit the overall effectiveness of assistive technologies designed to improve the quality of life for individuals with disabilities.
Notably, side-channel attacks can undermine the security of devices like the RFID cane, which assists visually impaired users in navigating their surroundings. This device not only helps users determine their location but also communicates information via Bluetooth or ZigBee, enabling them to store destination names as audible messages. While the RFID cane significantly enhances navigation and fosters independence for visually impaired users, it simultaneously exposes them to a range of threats that can undermine its effectiveness and safety. These threats can enable malicious actors to gain unauthorized access to critical location data. Such vulnerabilities are particularly concerning in scenarios where reliable navigation is paramount, as compromised data could lead to dangerous situations or disorientation.
As RFID technologies increasingly integrate into the daily lives of disabled individuals, ensuring their security against multifaceted attacks is paramount for maintaining user trust and promoting safe independent living [20,21,22,23,24,25]. Significant strides have been made to enhance the security of RFID systems through various specialized solutions [26,27]. Among the most advanced methods currently employed, elliptic curve cryptography (ECC) stands out for its robust security features, offering strong protection with smaller key sizes. However, ECC often proves impractical for low-cost RFID tags due to its demanding computational requirements [25]. In response, lightweight protocols have emerged, specifically designed for resource-constrained environments. While these protocols aim to reduce computational overhead, they remain susceptible to impersonation and data interception, raising concerns about their efficacy in securing sensitive applications [28,29]. To address these vulnerabilities, several methods have been proposed, including the use of masking techniques to obscure sensitive data, the introduction of noise to disrupt power analysis, and the implementation of hardware countermeasures to protect against physical tampering. Recent developments, including group authentication strategies that align with established protocols and innovative approaches using permutation matrix encryption, aim to strike a balance between security and efficiency for cost-sensitive RFID systems [30]. However, many of these solutions assume secure communication channels between servers and readers, which might not be viable in mobile RFID applications.
To implement efficient cryptographic protocols that resist side-channel attacks, it is crucial to focus on the implementation of cryptographic algorithms to minimize data leakage, as they are central to most cryptographic protocols. The implementation of cryptographic algorithms, such as elliptic curve cryptography (ECC), mainly relies on several finite field operations, including field multiplication, field inversion, and field division [31,32,33,34,35,36,37,38,39,40,41,42]. Among these operations, field multiplication is particularly fundamental, serving as the backbone for other field operations that are essential for the performance and security of cryptographic algorithms. However, while leveraging the properties of finite fields enhances data security, the complexity involved in executing these operations can pose significant challenges, particularly for low-cost RFID devices that are often resource-constrained. These devices must navigate the delicate balance between maintaining robust security measures and accommodating the limitations of their hardware capabilities. The method used to implement finite field operations greatly impacts the resilience of RFID systems against side-channel attacks [43,44,45]. For instance, the bidirectional structure of systolic multipliers, commonly used in many implementations, often proves inadequate for developing multipliers with effective error-detection capabilities that improve resistance to side-channel attacks [45]. These multipliers must be resilient against various side-channel threats, particularly in elliptic curve cryptosystems, where the stakes for data security are particularly high. In contrast, a unidirectional systolic array structure presents a promising alternative, as it can be specifically designed to incorporate error detection mechanisms that bolster resistance to side-channel attacks [45]. Therefore, this research paper will focus on creating a novel unidirectional systolic array structure based on the Dickson basis multiplier, which is expected to demonstrate lower space and power usage compared to traditional methods. By addressing the challenges associated with data leakage and side-channel vulnerabilities, this study aims to produce efficient modular multipliers that facilitate the implementation of secure yet computationally intensive cryptographic algorithms like ECC. This advancement is particularly important as RFID technology continues to be integrated into several IoT applications for disabled people, from secure identification to access control and beyond.

2. RFID-Based IoT-Assistive System

Figure 1 illustrates a client–server model specifically designed for an RFID-based IoT telehealth system aimed at assisting individuals with disabilities, which may include hearing loss, blindness, limited mobility, or speech impairments. On the client side, individuals with disabilities are assumed to be located in various settings, such as remote clinics, emergency transport services, or in-home care situations. On the server side, healthcare professionals and caregivers connect to the RFID server using Internet-enabled mobile devices ( M 1 , M 2 , , M n ) . RFID tags ( T 1 , T 2 , , T n ) facilitate communication and sensing between these individuals and the RFID reader, subsequently relaying data through a gateway G. This gateway plays a vital role in securely transmitting and receiving information from the Internet cloud and serves as a hardware root-of-trust (HRoT) with fog computing capabilities.
The square blocks on the RFID tags signify the implementation of the ECC encryption algorithm, which effectively safeguards the data stored within these tags through advanced cryptographic techniques. By employing ECC, the RFID system ensures that the information exchanged between tags and readers is encrypted, thus protecting sensitive data from unauthorized access and maintaining user privacy. Furthermore, the proposed compact unidirectional systolic multiplier structure, which constitutes the core operation in ECC, plays a pivotal role in enhancing the implementation of the ECC encryption algorithm on resource-constrained tags. This approach improves error detection capabilities and hence significantly enhances resistance to side-channel attacks, thereby strengthening the overall security framework of the system. Such resilience is essential in thwarting potential exploits that could compromise user data, especially in environments where physical security cannot be guaranteed. Consequently, the remainder of this paper will focus on the methodology utilized to extract the intended unidirectional and compact systolic multiplier. This investigation is critical for facilitating the implementation of secure, yet computationally intensive, ECC encryption algorithms within the RFID system, ensuring both efficiency and robust security.
It is crucial to consider the impact of deploying the encryption module on RFID tags in terms of data generation, compatibility with existing hardware or commercial off-the-shelf (COTS) devices, and cost implications for large-scale implementations. Integrating ECC into RFID tags may lead to a slight increase in generated data due to encryption overhead. However, the system effectively manages this through efficient data management techniques. At the sensor level, strategies such as data filtering, prioritization algorithms, and event-triggered transmission focus on essential information, ensuring that only significant data—like critical changes in vital signs—are transmitted [46]. Meanwhile, at the gateway level, aggregation techniques summarize data from multiple sensors, allowing devices like smart wheelchairs to efficiently track speed, direction, and obstacles while sending only relevant information to the cloud. This minimizes bandwidth usage while enhancing system responsiveness and user-friendliness [47,48].
Importantly, the incorporation of ECC does not compromise compatibility with existing hardware and COTS devices. Although encryption may increase data volume, the system’s management techniques keep overall data within acceptable limits for standard processing capabilities, ensuring data manageability and interoperability [47,48,49]. For instance, a user’s smart door lock can receive encrypted data from an RFID-enabled mobility aid, enhancing secure access control and navigation safety for individuals. In terms of financial considerations, while implementing ECC may introduce initial hardware costs, these should be viewed in the context of large-scale deployments [50]. The upfront investment may be higher, but the benefits—such as improved data security and privacy—are especially valuable for vulnerable populations. Additionally, the efficiency of the gateway in managing data can significantly reduce the need for costly processing power in the cloud as the system scales, thus mitigating the overall cost impact [47,48].

3. Literature Review

The efficiency of finite field multiplication is significantly influenced by the choice of base representations for elements in GF( 2 m ). Various representations, including polynomial basis (PB), normal basis (NB), dual basis (DB), and redundant basis (RB), each provide distinct advantages tailored to different applications [43,44,45]. Among various representations, the normal basis (NB) offers several compelling advantages, particularly in cryptographic applications. One of the primary strengths of normal bases is their exceptional efficiency in squaring operations. This efficiency arises from the ability to perform squaring through simple cyclic shifts, which require minimal computational resources and time. Such operations are crucial in cryptographic protocols, where squaring is frequently utilized, making normal bases particularly advantageous for high-speed computations. In addition to their efficiency in squaring, normal bases provide a degree of uniformity in element representation. This uniformity contributes to a more regular pattern in arithmetic operations, enabling predictable performance that simplifies hardware optimization. Such predictability is essential in designing efficient digital circuits, where consistent timing and resource usage are key considerations. In contrast, other bases, like polynomial basis (PB), can introduce variability in operational complexity, complicating the design and optimization processes for hardware applications [51,52,53,54,55].
Despite their strengths, normal bases do have limitations, particularly concerning element multiplication. The multiplication process in a normal basis can be more complex than in other representations. This added complexity can hinder the overall performance, especially in applications that require frequent multiplications. To overcome these challenges, specialized forms of normal basis, such as optimal normal basis (ONB) and Gaussian normal basis (GNB), have been developed. These variations aim to improve the multiplication efficiency while retaining the advantageous properties of normal bases.
In light of the limitations associated with normal bases, the Dickson basis presents a strong alternative for constructing efficient finite field multipliers. The space complexity of Dickson-based multipliers is generally comparable to that of ONB multipliers, making this approach particularly suitable for environments with limited resources. Researchers, including Hasan and Negre [43], have explored lightweight Dickson polynomials—such as binomials and trinomials—to enhance multiplier performance. Chiou et al. [44] have also made significant contributions by developing high-throughput bidirectional systolic array multipliers that utilize the Dickson basis, demonstrating its practical applications in cryptography. However, the bidirectional structure often found in existing designs, such as those by Chiou [44], presents challenges when integrating effective error-detection mechanisms. These mechanisms are vital for protecting against side-channel attacks, which can exploit weaknesses in elliptic curve cryptography. This challenge highlights the necessity for robust architectures that can seamlessly incorporate security features without compromising performance. In contrast, the authors of [45] proposed a unidirectional systolic array structure for the Dickson basis multiplier, allowing for the integration of robust error-detection mechanisms, but its quadratic area complexity makes it unsuitable for use in compact, ultra-low power devices like RFID tags.
The selection of irreducible polynomials is crucial to the performance of finite field multipliers, serving as the foundation for the arithmetic operations involved. This choice can significantly impact the overall efficiency [51,52,53,54,55]. While irreducible trinomials and pentanomials are often preferred for their operational advantages, generic polynomial-based multipliers remain relevant across various applications due to their versatility. Additionally, all irreducible polynomials, though less commonly employed, can still provide valuable benefits in specific contexts, facilitating the design of efficient multipliers [56,57,58]. This diversity in polynomial selection contributes to the adaptability and effectiveness of finite field multiplication in different technological environments.
The methods of implementation can lead to a variety of multiplier architectures, each with distinct characteristics. For example, bit-serial multipliers are characterized by their compact size and significant power savings, although they require multiple clock cycles to complete a single multiplication operation [32,59,60]. Conversely, bit-parallel multipliers can deliver results in a single clock cycle, but they typically incur higher hardware costs and power consumption [34,35,38,61,62,63,64,65,66]. In the realm of very large-scale integration (VLSI), systolic and semi-systolic array designs are increasingly preferred due to their modularity and capability for concurrent processing. These designs lend themselves well to high-speed operations and can efficiently utilize available hardware resources.
Numerous researchers have focused on optimizing systolic and semi-systolic multipliers for binary extension fields GF( 2 m ). For instance, innovative error-detecting semi-systolic array multipliers have been introduced by scholars like Lee and Chiou [32,67], while Huang et al. [33] have concentrated on enhancing time and space efficiency in their designs. Additionally, the work of Choi and Lee [35] on systolic array architectures, which enables simultaneous multiplication and squaring operations, has significantly enhanced the performance of modular exponentiation while minimizing hardware overhead. Their integration of least-significant-bit-(LSB)-first multiplication techniques further contributes to operational efficiency.
Recent advancements in multiplier architectures have focused on enhancing efficiency and speed, particularly for cryptographic applications that demand rapid computations. Chiou et al. [44] introduced a semi-systolic array multiplier that significantly reduces time complexity, making it highly effective for fast multiplication tasks. Building on this, Lee [68,69] developed semi-systolic Montgomery modular multipliers that leverage dual levels of systolic computation to improve area efficiency and minimize latency—critical factors for VLSI designs. This dual-level approach facilitates efficient parallel processing and pipelining, greatly boosting the performance of modular multiplication. Additionally, Mathe and Boppana [70] proposed a versatile multiplier architecture capable of handling both parallel and serial inputs, optimizing the performance across different operand types. Ibrahim [42] contributed by designing one-dimensional bit-serial and bit-parallel systolic array structures specifically for computations in GF( 2 m ), which enhance resource utilization and are particularly suited for tasks like error correction codes and cryptography. Pillutla and Boppana [53] further advanced the field by introducing a polynomial basis systolic multiplier targeting specific field sizes, reflecting a trend toward specialized architectures. Lee’s use of a Toeplitz matrix–vector representation has simplified the complexity of Montgomery-based bit-parallel multipliers, resulting in more efficient designs [64]. Sarmadi’s two-dimensional parallel systolic multiplier [65], based on the Montgomery algorithm, achieved a high performance while minimizing space requirements, allowing for the simultaneous processing of multiple operations and improving throughput. Mathe [66] enhanced this by implementing interleaving multiplication techniques in a two-dimensional parallel systolic multiplier structure, effectively balancing high performance with optimized resource management. Together, these innovations represent a concerted effort to develop adaptable multiplier architectures that meet the changing demands of modern cryptography while improving overall performance and resource efficiency in hardware implementations.

3.1. Paper Contribution

This paper introduces a novel unidirectional systolic array structure for the Dickson basis multiplier, aiming to achieve reduced space and power consumption compared to traditional unidirectional and bidirectional designs. The unidirectional nature of our architecture simplifies modifications, allowing for the integration of robust error-detection mechanisms that enhance resistance against side-channel attacks — an essential feature for supporting secure elliptic curve cryptography across various technological domains. As the need for secure communications grows in our increasingly digital landscape, these advancements are critical for ensuring the confidentiality and integrity of sensitive information. Unlike previous research, which often relied on ad hoc methods that overlooked the optimization of key performance factors such as latency, throughput, and power consumption, our approach focuses on the careful selection of scheduling and projection functions to create an architecture tailored to the specific needs of the target application. This mathematical framework enables a systematic analysis of the multiplier structure, leading to refined performance characteristics.
The proposed multiplier structure significantly boasts lower area complexity compared to existing two-dimensional designs, with a linear complexity O ( m ) as opposed to the quadratic complexity O ( m 2 ) seen in many known architectures. This reduction results in considerable savings in physical space and energy consumption, making the construction more efficient and cost-effective. Notably, the performance of our multiplier remains competitive, maintaining comparable temporal delays as two-dimensional constructions to ensure rapid computation. Furthermore, the modular design and local connectivity of the processing elements (PEs) enhance its suitability for VLSI implementation by minimizing wire delays and improving data transmission efficiency. The significant space and power savings provided by our multiplier structure make it an attractive solution for compact RFID systems with limited resources, effectively addressing the challenges of resource-constrained environments while enabling the integration of advanced functionalities without compromising performance or energy efficiency. Such advancements are vital as RFID technology becomes more deeply integrated into a variety of IoT applications aimed at enhancing the lives of individuals with disabilities. This integration plays a crucial role in enabling secure identification and access control, which are essential for promoting independence and accessibility. By implementing robust and efficient cryptographic algorithms within these systems, we can ensure that sensitive information remains protected while providing disabled users with the necessary tools to navigate their environments safely and securely. As the demand for inclusive technology continues to grow, the development of such secure solutions will be instrumental in fostering an environment where individuals with disabilities can fully participate in society.

3.2. Paper Organization

The remainder of this paper is structured as follows. In Section 4, we provide a concise overview of the Dickson basis, highlighting its significance and application in multiplier design. Section 5 offers an in-depth analysis of the dependency graphs (DGs) related to the described Dickson-based multiplier. This section explores the complex relationships and interdependencies among various operations within the multiplier methodology, clarifying how these components interact and influence overall performance. By examining the DG, we uncover valuable insights into data flow and identify the critical paths that impact execution efficiency. Section 6 details the architecture and implementation of the proposed systolic Dickson basis multiplier, discussing its innovative features and expected performance benefits. In Section 7, we conduct a comparative analysis of the performance metrics for various multipliers, including Dickson basis multipliers. This analysis evaluates their efficiency and suitability specifically for RFID-based IoT applications aimed at assisting disabled individuals. Finally, Section 8 presents a summary of our findings and outlines potential directions for future research.

4. Dickson Basis Multiplier in GF( 2 m )

Let R be a ring and b be an element of R ( b R ). The h t h Dickson polynomial of the ( l + 1 ) t h kind, denoted as D h , l ( α , b ) , is significant in algebra and number theory. It is defined by the following equation [43,44,45]:
D h , l ( α , b ) = i = 1 h 2 h l i h i h i i ( b ) i α h 2 i
Here, h 2 indicates the floor function applied to h 2 , while h i i signifies the number of ways to select i combinations from h i distinct items. To simplify matters, we will consider the h t h Dickson polynomial of the first kind (where l = 0 ), which is defined as follows:
D h ( α , b ) = i = 1 h 2 h h i h i i ( b ) i α h 2 i
where D 0 ( α , b ) = 2 and D 1 ( α , b ) = α for the cases when h = 0 and h = 1 , respectively. Building upon the equations provided, the Dickson polynomials can be computed recursively using the following relationships:
D i ( α , b ) = 2 if i = 0 , α if i = 1 , α D i 1 ( α , b ) b D i 2 ( α , b ) if i 2
Within the finite field G F ( 2 ) , we focus on the h t h Dickson polynomial where b = 1 , specifically denoted as D h ( α , 1 ) . Let θ i = D i ( α , 1 ) for each integer i. The Dickson basis formed by an irreducible polynomial G of degree m in G F ( 2 ) can be defined in the following manner: Θ = { θ 1 , θ 2 , . . . , θ m } . For instance, we have θ 1 = α , θ 2 = α 2 , and θ 3 = α 3 + α , illustrating the structure of the basis elements. Consequently, an element X G F ( 2 m ) can be expressed as X = x 1 θ 1 + x 2 θ 2 + · + x m θ m , where x i G F ( 2 ) for 1 i m . By leveraging the inherent properties of GF( 2 m ), we can reformulate Equation (3) to more effectively highlight these characteristics. This reformulation can be expressed in the following way:
θ i = 0 if i = 0 , α if i = 1 , α θ i 1 + θ i 2 if i 2
An irreducible polynomial G is termed a Dickson binomial when expressed as a two-term polynomial of the form G = θ m + 1 , which is significant for its simplicity and efficiency in cryptographic applications. It is classified as a Dickson trinomial if it takes the form G = θ m + θ s + 1 , where 1 s m 2 , allowing for more complex interactions that enhance security. Both Dickson binomials and trinomials are widely used to achieve the goals of lightweight cryptography, which aims to optimize the performance while ensuring security, especially in resource-constrained environments. This research will specifically focus on the application of Dickson binomials in lightweight cryptographic systems.
Dickson Basis Multiplication Process: Let the Dickson basis be represented, as mentioned before, as Θ = { θ 1 , θ 2 , , θ m } , and consider the irreducible binomial defined by G = θ m + 1 for the purpose of generating various elements. The elements X , Y , Z in the finite field GF( 2 m ) can be expressed in terms of the basis as follows: X = x 1 θ 1 + x 2 θ 2 + + x m θ m , Y = y 1 θ 1 + y 2 θ 2 + + y m θ m , Z = z 1 θ 1 + z 2 θ 2 + + z m θ m , where x i , y i , z i are elements belonging to G F ( 2 ) for 1 i m . Furthermore, the element Z is defined as the product of X and Y computed under modulo G, which can be represented as Z = X × Y mod G . This formulation is crucial for various applications in the context of lightweight cryptography.
According to the findings presented in [43,45], when the irreducible binomial G = θ m + 1 is utilized for generating elements, it can be established that the relationship θ m + i = θ i + θ m i holds true for all integers i 0 . Consequently, the product Z can be calculated using this relationship as follows:
Z = X Y = i , j = 1 m x i y j θ i + j + i , j = 1 m x i y j θ | i j |
Equation (5) can be reformulated in matrix form, which is essential for the accurate design of a unidirectional systolic multiplier. The product Z is derived from three distinct matrix–vector products [43,45], specifically denoted as Z 1 , Z 2 , and Z 3 , as demonstrated in Equation (6).
Z = x m x m 1 x m 2 x 1 x 1 x m x m 1 x 2 x 2 x 1 x m x 3 x m 1 x m 2 x m 3 x m × y 1 y 2 y 3 y m Z 1 + 0 x 1 x 2 x m 1 0 0 x 1 x m 2 0 0 0 x m 3 0 0 0 0 × y 1 y 2 y 3 y m Z 2 + x m 1 0 x m 1 x 2 x m 2 x m 1 0 x 3 x m 3 x m 2 x m 1 x 4 0 x 1 x 2 x m 1 × y m y m 1 y m 2 y 1 Z 3

5. Constructing Dependency Graphs

To gain clearer insight into the computational dependencies and patterns described in Equation (6), we can utilize dependency graphs (DGs) for representation. It is important to note that the three matrix–vector products Z 1 , Z 2 , and Z 3 in Equation (6) share the same computational framework but differ in the sequence of input elements provided to the computing unit. To illustrate this distinction, we will create a DG for each matrix–vector product.
Figure 2 depicts DG for the matrix–vector product Z 1 . In this figure, the inputs of the DG are arranged in specific orientations to enhance the computation process. Below is a detailed explanation of the input directions and their associated signals:
  • Horizontal flow: This flow is specifically assigned to the input signals y i , where 1 i m . These signals are strategically introduced into the dependency graph (DG) from the left side, ensuring a clear pathway for processing them effectively.
  • Top input entry: The top section of the DG serves as the initial input location for the zero values of the Z 1 signals ( z 1 j , for 1 j m ). In Section 6, we will provide a detailed explanation of how to properly set up Z 1 by clearing the flip-flops that control its output, thus preparing the system for accurate computation from the outset.
  • Diagonal connectors: The diagonal connectors depicted at the left edges of the input nodes are utilized to incorporate the input signals x j 1 and x m i + 1 , where 2 j m and 1 i m . This design choice facilitates the effective integration of these signals into the computation, enhancing the overall functionality of the DG.
In the context of the DG, the temporary partial results related to matrix–vector product Z 1 are computed at each node, allowing for a step-by-step accumulation of data. These partial results are subsequently transmitted to the nodes located in the next row of the graph, ensuring that each computation builds upon the previous one. This operation continues iteratively until the final row at the base of the DG is attained, effectively capturing all necessary calculations. At the base of the DG, the resultant output bits of Z 1 are generated, representing the culmination of the entire computation process.
In a similar manner, the inputs of the DG illustrated in Figure 3 are organized in specific orientations to optimize the computational process of matrix–vector product Z 2 . By structuring the inputs thoughtfully, we can enhance the efficiency of data handling. Let us examine the input orientations and their associated signals in detail:
  • Horizontal flow: This orientation is also designated for the input signals y i , where 1 i m . These signals are introduced into the DG from the left side.
  • Top input entry: The upper section of the DG serves as the access point for the initial zero values of the Z 2 signals ( z 2 j , for 1 j m ). In Section 6, we will detail how to internally initialize Z 2 by clearing the flip-flops associated with its output at the beginning of the computation.
  • Diagonal connectors: The diagonal lines illustrated at the left edges of the input nodes are utilized to incorporate the initial zero inputs of the signal x j 1 and signal x i 1 , where 2 j m and 1 i m .
Within the DG, the temporary partial results related to the output bits of the matrix–vector product Z 2 are computed at each node. These partial results are then transmitted to the nodes in the next row, ensuring that each computation builds upon the previous one. This iterative process continues until the final row at the base of the DG is reached, effectively capturing all necessary calculations. At the base of the DG, the resulting output bits for Z 2 are generated.
In a comparable fashion, the inputs of the dependency graph (DG) shown in Figure 4 are structured in specific orientations to optimize the computational workflow for the matrix–vector product Z 3 . By strategically arranging the inputs, we can significantly improve the efficiency of processing. Let us explore the input orientations and their corresponding signals in more detail:
  • Horizontal flow: This flow is designated for the input signals y m i + 1 , where 1 i m . These signals come from the left side of the DG, facilitating a seamless progression of data.
  • Top input entry: The top section of the DG functions as the entry point for the initial zero values of the Z 3 signals ( z 3 j , for 1 j m ). In Section 6, we will explain how to set up Z 3 by clearing the flip-flops that control its outputs at the start of the computation. This step ensures that the system initializes correctly, paving the way for accurate calculations.
  • Diagonal connectors: The diagonal connectors illustrated at the left edges of the input nodes are employed to input the coefficients of the signals x m j and x m i , where 1 i , j m . It is essential to highlight that the coefficient input x m is consistently set to zero, which is vital for maintaining calculation accuracy.
Throughout the DG, the temporary partial results associated with the output bits of the variable Z 3 are calculated at each node. These results are then passed on to the subsequent nodes in the next row, ensuring that each computation relies on the results from the prior step. This iterative mechanism persists until the final row at the base of the DG is reached, effectively capturing all necessary computations. At the base of the DG, the output bits corresponding to variable Z 3 are produced.
The overall product Z is achieved by combining the resulting output bits from the products Z 1 , Z 2 , and Z 3 . This combination is essential for combining the contributions from each product to form the overall result. To carry out this operation, two-input XOR gates are employed, which effectively handle the binary addition.

6. Unidirectional Dickson-Based Systolic Multiplier Structure Construction

In this section, we employ the method outlined in [71,72,73] to develop the unidirectional systolic multiplier design. This methodology involves scheduling and node projection techniques, which are applied to the DGs to develop an efficient parallel multiplier structure based on the chosen Dickson basis multiplication technique. We will apply this methodology to the DGs shown in Figure 2, Figure 3 and Figure 4. As we notice the DGs have exactly the same structure but with feeding input coefficients in a different order. Therefore, the applied methodology will result in the same systolic array structure for the three matrix–vector products of Z 1 , Z 2 , Z 3 .

6.1. Scheduling Function

Let us take a closer look at the data points (nodes) represented in DG illustrated in Figure 2. Each data point is denoted as Q ( i , j ) = [ i j ] , where i and j correspond to specific indices that reflect the operations within the multiplier algorithm. To establish the order in which each node should be executed, we employ a scheduling vector denoted as Ψ = [ ψ 0 ψ 1 ] . This vector serves as a tool for organizing the execution sequence. Additionally, we utilize a scheduling function, represented by Π ( Q ) , which plays a crucial role in determining how the points in the DG are processed. The definition of this scheduling function is as follows:
Π ( Q ) = Ψ p ρ = i ψ 0 + j ψ 1 ρ
where Q signifies the position vector [ i j ] , and ρ is a scalar value that is essential for the scheduling mechanism. The inclusion of ρ ensures that all nodes in the DG are allocated positive time values, which is critical for establishing a valid execution sequence. By assigning ρ 0 , we create a reference point that guarantees that each node in the DG illustrated in Figure 2 receives a positive time value. This strategy not only avoids the assignment of negative time values but also streamlines the scheduling of operations, ultimately improving the algorithm’s efficiency and effectiveness.
The scheduling vector Ψ = [ ψ 0 ψ 1 ] is subject to certain constraints that govern the execution order of the nodes. One crucial constraint dictates that nodes located at Q = [ i j ] must be executed only after the nodes at Q = [ i 1 j ] have been completed. This ensures a proper flow of operations and prevents any potential conflicts in the execution sequence. This requirement can be formalized as the following inequality:
Π ( Q = [ i j ] ) > Π ( Q = [ i 1 j ] )
When considering the coordinate values of Ψ , this inequality can be formulated as:
i ψ 0 + j ψ 1 > ( i 1 ) ψ 0 + j ψ 1 ψ 0 > 0
The above constraint imposed on the scheduling vector Ψ guarantees that the time value allocated to a node at Q = [ i j ] exceeds that of the node at Q = [ i 1 j ] . By adhering to this constraint, we can achieve the required execution order of the nodes in the DG. This ensures that operations dependent on prior computations are executed in the correct sequence, thereby maintaining the integrity and efficiency of the overall algorithm.
Furthermore, there is a timing requirement that stipulates that the operations assigned to the nodes at Q = [ i j + 1 ] must be carried out only after the operations at Q = [ i 1 j ] have been completed. This constraint is critical for maintaining the correct flow of computations, as it ensures that any dependencies associated with these nodes are respected. Mathematically, this can be expressed as:
Π ( Q = [ i j + 1 ] ) > Π ( Q = [ i 1 j ] )
When we formulate the relationships in terms of the coordinate values of Ψ , we derive the following equations.
i ψ 0 + j ψ 1 + ψ 1 > i ψ 0 ψ 0 + j ψ 1 ψ 1 > ψ 0
This inequality establishes a timing boundary on the scheduling vector Ψ . It ensures that the time assigned to a node at Q = [ i j + 1 ] exceeds the time assigned to the node at Q = [ i 1 j ] . This stipulation is critical for maintaining the correct order of operations within the DG. By adhering to this guideline, we can uphold the necessary dependencies, allowing computations to be executed in the proper sequence.
By analyzing the inequalities (9) and (11), we can identify appropriate scheduling vectors. The feasible choice for an effective scheduling vector, which delivers the optimal design in the context of resource-limited RFID designs, is:
Ψ = [ 1 0 ]
By employing the scheduling function on the DGs presented in Figure 2, Figure 3 and Figure 4, we derive the same scheduling vector discussed earlier (Equation (12)). The timing of the nodes after this scheduling vector is applied is illustrated in Figure 5, Figure 6 and Figure 7. A detailed observation of these figures indicates that the output signals z 1 j , z 2 j , and z 3 j (for 1 j m ) are generated at the same time after the m clock cycles.

6.2. Projection Function

Based on the findings of Gebali [71], the projection function is fundamental in the process of converting a large set of DG nodes, represented as Q ( i , j ) , into a single processing element denoted as Q ¯ . This transformation is critical for simplifying the complexity of the system. By interconnecting these processing elements, one can effectively create a systolic or semi-systolic array. The mathematical formulation of the projection function can be articulated as follows:
Q ¯ = Y Q
In this equation, the projection matrix is denoted by Y . A critical step in deriving this matrix involves identifying its null space, which is referred to as Ω . Understanding the properties of this null space is essential for ensuring that the projection matrix functions as intended. As highlighted in [71], it is necessary to impose a specific constraint on the projection vector Ω to maintain both the accuracy and effectiveness of the projection process. This constraint can be articulated as follows:
Ψ Ω 0
This constraint plays a vital role in ensuring that each processing element carries out its specific tasks at different times. This method of time separation allows for effective multiplexing, which in turn optimizes resource usage and significantly improves overall system performance.
In light of the condition specified in Equation (14) and the provided scheduling vector Ψ = [ 1 0 ] , along with the necessity for a bit-parallel systolic structure, we can identify the appropriate projection vector that meets these requirements. The formulation of this projection vector can be represented as follows:
Ω = [ 1 0 ]
This designated projection vector ensures compliance with the condition described in Equation (14) for both the scheduling vector Ψ and the projection vector Ω . As a result, it plays a crucial role in facilitating the creation of a unidirectional bit-parallel systolic structure that possesses the desired attributes. This alignment between the vectors is essential for achieving optimal performance in the system.
The projection matrix, denoted by Y , can be established by recognizing that Ω serves as the null space for Y . This relationship is crucial as it allows us to articulate the projection matrix in the following manner:
Y = [ 0 1 ]
This matrix serves to demonstrate how the original group of DG nodes is converted into a single processing element. By establishing this mapping, we can efficiently streamline the processing tasks, ensuring that multiple nodes are effectively represented within one computational unit. This transformation is essential for optimizing performance and resource allocation in the system.

6.3. Extracting the Unidirectional Systolic Multiplier Design

The functions Π ( Q ) and Q ¯ ( Q ) associated with each node Q ( i , j ) in the dependency graphs illustrated in Figure 2, Figure 3 and Figure 4 can be constructed by integrating the vectors Ψ = [ 1 0 ] and Y = [ 0 1 ] into the Equations (7) and (13). This integration facilitates a systematic representation of the computational relationships and scheduling requirements of the nodes. The resulting functions, Π ( p ) and Q ¯ ( Q ) , play a vital role in optimizing the overall performance of the system, ensuring that each operation is executed in the correct sequence. These functions can subsequently be defined as follows:
Π ( Q ) = i Q ¯ ( Q ) = j
By applying the derived functions Π ( Q ) = i and Q ¯ ( p ) = j to the nodes represented in the DGs of Figure 2, Figure 3 and Figure 4, we can successfully create a unidirectional bit-parallel systolic multiplier configuration. This design is particularly advantageous for executing high-performance multiplication operations. As shown in Figure 8, the structure consists of three unidirectional one-dimensional systolic arrays, each working in conjunction to enhance processing speed. Within each array, m processing elements (PEs) are arranged in a linear configuration, allowing for streamlined data flow and efficient computation. This arrangement not only optimizes resource utilization but also significantly boosts the overall performance of the multiplication process.
The top systolic array is dedicated to calculating the output bits of the matrix–vector product Z 1 . As illustrated in Figure 9, the combinational logic schematic for the standard processing element ( PE j ) is designed to perform essential calculations, generating bits based on its input. This PE’s combinational logic includes AND gate, XOR gate, with square boxes representing latches and triangles indicating tri-state buffers. The first processing element ( PE 1 ), illustrated in Figure 10, retains the structural characteristics of the standard processing element ( PE j ) but omits the tri-state buffers, reflecting its distinct operational requirements. Specifically, PE 1 does not necessitate a selection mechanism between the input signals routed to the x i n port and the intermediate signals allocated to the x s port. This design choice effectively streamlines the architecture of PE 1 by eliminating the tri-state buffers, thereby enhancing its operational efficiency. This adjustment not only results in a more efficient systolic array but also significantly reduces the area overhead while enhancing overall performance by removing unnecessary computations and simplifying the logic structure, thus improving the speed and reliability of the system.
The central systolic array, as shown in Figure 8, is specifically designed to calculate the output bits of the matrix–vector product Z 2 . In this array, each PE performs designated tasks to generate these bits based on the incoming data it receives from neighbor elements. This arrangement ensures efficient data processing and flow throughout the system. Notably, both the standard processing element ( PE j ) and the first processing element ( PE 1 ) exhibit an identical structural design to the PEs utilized in the top systolic array. This structural consistency is clearly illustrated in Figure 9 and Figure 10, respectively, highlighting the uniformity in design, which facilitates easier integration and optimization within the overall architecture.
The lowermost systolic array, as shown in Figure 8, is specifically tasked with calculating the output bits of the matrix–vector product Z 3 . Every PE within this array executes specific calculations to produce these bits based on the incoming data it receives from adjacent elements. Importantly, both PE j and PE 1 share the same structural design as those in the top and central systolic arrays, ensuring compatibility and efficiency. This similarity in design is clearly illustrated in Figure 9 and Figure 10, respectively, highlighting a uniform architecture that facilitates seamless integration and significantly enhances the overall efficiency of the entire system. By maintaining this consistent structure across the various arrays, we can effectively optimize the performance and streamline the processing tasks involved, leading to improved computational speed and reliability.
In Figure 8, it is clearly indicated that the initial bits for the products Z 1 , Z 2 , and Z 3 are all initialized to zero. This important observation creates a valuable opportunity for optimization, particularly concerning area and delay complexities within the system. By strategically clearing the D z flip-flops, dedicated in Figure 9 and Figure 10, at the appropriate times during operation, we can enhance the overall efficiency. When these flip-flops are cleared, the required zero values can be directly provided to the input of the XOR gate. This streamlined approach not only simplifies the logic design but also removes the necessity for additional circuitry to compute those values, thereby significantly improving both the performance and reliability of the entire computational architecture.
The offered unidirectional linear and parallel systolic multiplier introduces a substantial enhancement over conventional two-dimensional parallel systolic designs, especially when considering its area complexity. Unlike traditional two-dimensional architectures, which typically exhibit a quadratic area complexity O ( m 2 ) , the novel multiplier achieves a more favorable linear area complexity O ( m ) . This significant improvement leads to a much more efficient utilization of available resources, which is essential for optimizing overall hardware performance. When this new design is compared to the Montgomery and Dickson two-dimensional parallel systolic structures referenced in [44,45,68,69], it becomes evident that the proposed multiplier excels in terms of space efficiency. The reduction in area complexity not only enhances the effective usage of hardware but also establishes the proposed structure as a superior option in terms of area efficiency. Furthermore, when evaluated against parallel multipliers that utilize traditional field multiplication techniques, such as those mentioned in [33,34,44,65,66,74,75], the new multiplier shows significant advantages in area performance. Detailed findings and performance metrics that highlight these advancements will be presented in the results section, effectively demonstrating the recommended multiplier’s superiority in both area and energy efficiency.
The configuration of the newly designed unidirectional parallel systolic multiplier, depicted in Figure 8, utilizes a systematic approach for input signal allocation and processing. Initially, input signals x j 1 , 0, and x m j , where 1 j m , are assigned to PE j across the top, central, and bottom systolic arrays, respectively. This careful assignment ensures that each PE receives the specific inputs necessary for its computations, allowing for optimal performance throughout the multiplication process. Sequentially, input signals x m i + 1 (for 1 i m ) are fed into the first PE of the top systolic array, while signals x i 1 are directed to the first PE in the central systolic array. Similarly, the first PE ( PE 1 ) in the bottom systolic array receives input signals x m i . This sequential feeding of inputs is crucial for maintaining the flow of data and ensuring that each PE can perform its calculations in a timely manner. Additionally, input signals y i (for 1 i m ) are sequentially fed to the first PE ( PE 1 ) of both the top and central systolic arrays, passing through all regular PEs. In the bottom systolic array, input signals y m i + 1 (for 1 i m ) follow the same path through PE 1 and all subsequent standard PEs ( PE j ), further reinforcing the structured flow of data.
After m clock cycles, the resulting coefficient bits—denoted as z 1 j , z 2 j , and z 3 j (for 1 j m )—are made available concurrently at the outputs of all PEs. This parallel output mechanism allows for efficient retrieval of results from each systolic array, significantly reducing the time required to obtain the final output. Finally, at clock cycle m, the final product bits z j (for 1 j m ) are calculated by adding the corresponding bits of z 1 j , z 2 j , and z 3 j using 2-input XOR gates. This addition process effectively consolidates the outputs into the final product representation, ensuring that the multiplication results are both accurate and efficiently generated.
The functioning of the analyzed unidirectional bit-parallel systolic multiplier configuration can be detailed in the following steps, which outline the specific processes and interactions that contribute to its efficient performance in multiplication tasks.
  • Setup: In the first clock cycle, the latches D z illustrated in Figure 9 and Figure 10 are cleared, resulting in the coefficient bits z being initialized to zero. This crucial step eliminates any previous data, preparing the system for fresh computations. Simultaneously, the control signal s is enabled ( s = 1 ), which facilitates the flow of input signals assigned to the port x i n —specifically x j 1 , 0, and x m j , for 1 j m —through the top tri-state buffer shown in Figure 9. This ensures that the signals are accurately routed to their respective PEs. Additionally, during this clock period, the initial bits of the signals x m i + 1 , x i 1 , and x m i (for 1 i m ) are introduced to the appropriate first PE (PE1) in each systolic array via the port x i n depicted in Figure 10, initiating the computation process.
  • Processing: From the second clock cycle onward, continuing through clock cycle m, the control signal s is turned off ( s = 0 ). This change allows the temporary signals x s to be processed through the standard PEs ( PE j ), enabling the calculation of values assigned to the z port of the systolic arrays. During these clock cycles, it is essential for the remaining bits of the signals x m i + 1 , x i 1 , and x m i (for 1 i m ) to be fed sequentially into the appropriate first PE ( PE 1 ) of the upper, central, and bottom systolic arrays through port x i n . This structured input ensures a continuous and efficient flow of data throughout the system.
  • Final Output: At the conclusion of the operation, specifically during clock cycle m, the output bits of the product Z, denoted as z j (for 1 j m ), are generated at the outputs of the final row of XOR gates illustrated in Figure 8. This concurrent generation of outputs marks the successful completion of the multiplication process, allowing for immediate access to the results.

7. Results Overview and Analysis

This section focuses on a comparative analysis of the explored unidirectional systolic multiplier against several prominent systolic and semi-systolic multiplier configurations from the literature [44,45,68,69,74]. The analysis is organized into two subsections. The first subsection examines the resource utilization and processing time of the offered design architecture in relation to those of competing architectures. By thoroughly analyzing these complexities, we aim to provide insights into resource utilization and performance speed. In the second subsection, we will confirm our complexity analysis through real implementation. By deploying the recommended design in an actual setting, we can assess its true performance and compare it to the anticipated complexities. This implementation will guarantee that our analysis accurately captures the behavior of the multiplier in real-world applications.

7.1. Complexity Analysis

Following a detailed analysis of the unidirectional systolic construction illustrated in Figure 8, it becomes clear that the design encompasses a total of 3 m PEs, each of which plays a crucial role in the overall functionality of the system. Within these PEs, there is a variety of logic components, specifically 3 m AND gates, 3 m XOR gates, 0 multiplexers (MUXes), and 6 m latches. These components work together in synergy to execute the necessary computations required within each PE.
To obtain the final result bits, which are represented as z j , an additional group of 2 m XOR gates is utilized specifically for this purpose. These gates are tasked with adding the corresponding bits from z 1 j , z 2 j , and z 3 j , where 1 j m , thereby facilitating the accumulation of results. Consequently, the overall quantity of XOR gates required in the architecture sums to 5 m . This total comprehensively accounts for both the XOR gates present within the PEs and the extra gates utilized for the bit addition operations.
In order to evaluate the efficiency of the suggested multiplier with respect to speed, it is essential to determine the critical path delay (CPD). The critical path is defined as the most extended route within the circuit that dictates the total delay experienced during operation. In this particular instance, the critical path comprised two two-input XOR gates, which contribute a delay represented as 2 T X .
Examining the functionality of the multiplier configuration, it is important to highlight that the suggested multiplier achieves its ultimate results in an m clock periods. This indicates that the complete computation, starting at the beginning of the multiplication to the delivery of the output bits, occurs within m clock cycles. Such information is essential for assessing both the efficiency and speed of the multiplier, enabling a thorough evaluation of its performance in real-world scenarios.
Table 1 offers an in-depth analysis that contrasts the suggested unidirectional parallel systolic multiplier with various established parallel systolic and semi-systolic multiplier designs [44,45,68,69,74]. This examination focuses on three pivotal criteria: the utilization of components such as gates, multiplexers (MUXs), and latches; the associated latency for each multiplier design; and the critical path delay (CPD), which influences overall performance.
The findings indicate a notable difference in space complexity between the proposed configuration and the existing designs. Specifically, the multiplier layouts referenced in the literature exhibit a space complexity of O ( m 2 ) , suggesting that their component requirements increase quadratically as the input size m grows. Conversely, the unidirectional systolic multiplier demonstrates a more favorable linear space complexity of O ( m ) , highlighting a significant reduction in resource consumption. This efficiency is particularly relevant for RFID-Based IoT applications for disabled people, where constraints on both resource availability and physical space are common challenges. Moreover, the analysis shows that all designs under consideration share the same time complexity of O ( m ) . This consistency indicates that the proposed systolic multiplier can deliver computational efficiency on par with existing designs while consuming far fewer resources. Such a balance between performance and resource utilization makes the proposed arrangement an attractive solution for practical applications, especially in scenarios where efficient resource management is crucial.
The explored systolic multiplier configuration presents a range of benefits that enhance its applicability for RFID-based IoT applications for disabled people. One of the primary advantages is its compact design, which minimizes the area requirements and optimizes the use of existing hardware resources. This efficient use of space not only contributes to a smaller physical footprint but also positively influences critical performance metrics. As a result of this space efficiency, both the area–delay product (ADP) and the power–delay product (PDP) of the multiplier are improved. These enhancements lead to a superior overall performance and increased energy efficiency, making the proposed layout a compelling choice for applications where resource constraints and power consumption are significant considerations.
The advantages of the proposed multiplier configuration are reinforced by the real implementation results showcased in Table 2. These findings substantiate the assertions related to reduced space complexity and enhancements in both the area–delay product (ADP) and power–delay product (PDP). By achieving lower resource utilization without sacrificing performance, the proposed layout delivers significant tangible benefits. This is particularly relevant for RFID-based IoT applications for disabled individuals, where considerations such as power consumption, efficient area utilization, and overall operational efficiency are paramount.

7.2. Implementation Findings

The introduced systolic multiplier design was rigorously evaluated in comparison with existing systolic and semi-systolic multiplier implementations [44,45,68,69,74] through a thorough approach. The modeling and implementation of the various multiplier setups were accomplished using the VHDL programming language, which facilitates precise hardware description. For synthesis, the process utilized the Synopsis Design Compiler along with the Nangate library (15 nm, 0.8 V), renowned for providing accurate estimations of area, delay, and power consumption at a granular level.
In order to verify that the designs met functional specifications, an extensive validation process was carried out using ModelSim’s simulation tools. This phase included the development of elaborate testbenches tailored to assess a wide range of operational scenarios, thereby confirming the reliability of outputs under different conditions. The rigorous nature of this verification was essential in identifying potential issues early on, ensuring that only designs that passed all functional tests proceeded to the synthesis stage, thereby optimizing the overall development workflow.
The synthesis phase is essential for converting the VHDL code of each multiplier design into a gate-level netlist, a task efficiently handled by the Synopsys Design Compiler. This critical process translates high-level design specifications into a format ready for physical implementation, ensuring that the designs can be effectively realized in hardware. The resulting gate-level netlists provide a detailed representation of the logical structure, facilitating further optimization and analysis in the subsequent stages of the design flow. This compiler leveraged the Nangate library, which supplies critical technology-specific parameters, including gate dimensions, interconnect delays, and power attributes, essential for achieving the accurate and efficient synthesis tailored to the specific technology node. During this phase, the design compiler optimized the netlist according to predefined constraints such as area and power requirements, ensuring that the final implementation not only met performance targets but also adhered to design specifications. This optimization process is crucial for enhancing the overall functionality and reliability of the multiplier layouts.
Once the synthesis is completed, key performance metrics—namely area, delay, and power consumption—are extracted from the synthesized netlists. Analyzing these metrics provides valuable insights into the efficiency of each design, enabling a robust comparison that highlight the strengths and weaknesses of the various multiplier configurations in real-world applications.
The synthesized results for the recommended unidirectional systolic multiplier design, alongside existing configurations [44,45,68,69,74], are detailed in Table 2 for a field size of m = 283 . This table encapsulates critical performance metrics, including area, delay, power consumption, area–delay product (ADP), and power–delay product (PDP), all derived from the synthesis outputs. Figure 11, Figure 12, Figure 13, Figure 14 and Figure 15 illustrate bar charts on a logarithmic scale that compare the performance metrics of area, power consumption, delay, ADP, and PDP for the suggested unidirectional multiplier design alongside existing competitive designs. These charts effectively showcase the advantages and limitations of the new design, providing valuable insights into its performance across different criteria.
A thorough analysis of the data presented in Table 2 and Figure 11 and Figure 12 reveals that the recommended unidirectional systolic multiplier demonstrates remarkable improvements in both space efficiency and power usage when compared to existing designs. Specifically, the reduction in space utilization is striking, ranging from 99.6% to 99.8%, which highlights a dramatic decrease in the hardware resources required. Furthermore, power consumption improvements are equally impressive, with reductions between 94.2% and 96.9%. These results underscore a significant enhancement in energy efficiency, making the proposed design particularly advantageous for applications where resource constraints are a critical consideration.
An important observation regarding the proposed design is that it demonstrates a marginally higher delay when compared to several existing configurations, as shown in Figure 13. This increased delay is largely attributed to the moderately larger latency and elevated CPD observed in the proposed layout. The CPD, which indicates the longest delay path within the multiplier circuit, plays a crucial role in determining overall performance. However, despite this minor increase in delay, the proposed design maintains a level of computational efficiency that is comparable to other options in terms of time complexity. This characteristic ensures its suitability for a wide range of practical applications, where performance requirements are balanced with other design considerations.
From Table 2 and Figure 14 and Figure 15, we observed that the suggested unidirectional systolic multiplier arrangement demonstrates significant advantages in terms of the ADP and PDP, two critical design parameters that reflect the trade-offs between area, delay, and power consumption. Notably, the proposed design achieves impressive reductions in ADP, ranging from 99.5% to 99.9% across the compared designs. This indicates not only a substantial enhancement in overall performance but also improved resource utilization. In addition, the PDP improvements are striking, with reductions ranging from 92.8% to 98.8%. These figures underscore the energy efficiency benefits of the proposed configuration. Given these results, the unidirectional bit-parallel systolic multiplier emerges as an ideal choice for deployment in resource-constrained RFID-based IoT applications for individuals with disabilities, where the efficient use of resources is paramount.
Based on the previous analysis, the proposed multiplier design effectively combines significant space and power savings with a delay comparable to competing designs, ensuring efficient computation and responsiveness in time-sensitive applications. Furthermore, it achieves substantial reductions in both the ADP and PDP, indicating enhanced overall performance and efficiency. These improved metrics reflect effective hardware utilization and greater energy efficiency, making the design particularly well suited for resource-constrained RFID tags that require optimized performance and extended battery life.
Considering these factors, the introduced unidirectional bit-parallel systolic multiplier is an excellent choice for cryptographic protocols in RFID tags with limited resources, as it optimizes the space and power consumption while delivering efficient performance, making it particularly suitable for RFID-based IoT applications aimed at assisting disabled individuals. Importantly, the introduced unidirectional systolic structure can be easily reconfigured to incorporate error detection capabilities, thereby enhancing its resistance to side-channel attacks. This enhances the functionality and security of devices such as smart mobility aids and health monitoring systems, ensuring that sensitive data remain secure without compromising battery life. The compact nature of the design allows for integration into small, user-friendly RFID tags, facilitating seamless interactions and enabling features like real-time location tracking and personalized assistance services. By improving the performance of RFID tags, the proposed multiplier not only reinforces secure communications but also significantly enhances the quality of life for disabled individuals, contributing to greater independence and empowerment through advanced assistive technologies.

8. Key Findings and Conclusions

This study concentrates on the creation of an innovative and high-performing unidirectional systolic array configuration for Dickson-basis multiplication within the binary extension field. The methodology involves deriving a DG for the chosen multiplier. By implementing appropriate scheduling and node projection functions for each node in the DG, we successfully construct a practical unidirectional bit-parallel systolic multiplier. This cutting-edge design facilitates rapid and efficient multiplication operations using the Dickson method. One of the primary benefits of this unidirectional systolic arrangement is its notably reduced space complexity. Unlike earlier parallel designs that exhibit quadratic space requirements, this new layout achieves linear space complexity, representing a significant enhancement in resource efficiency, particularly for VLSI applications. The complexity analysis indicates that this multiplier occupies a considerably smaller area, further confirming its efficiency and feasibility for implementation. To assess the performance of the proposed design, we synthesized both this new layout and previously developed multiplier architectures using the ASIC CMOS library. The synthesis results highlighted significant reductions in area and power, while key metrics such as power–delay product and area–delay product showed notable improvements, reinforcing the efficiency of the proposed architecture. Consequently, the findings support the conclusion that this multiplier framework is well suited for cryptographic protocols in RFID tags with limited resources, effectively optimizing both space and power consumption. It also allows for enhanced error detection capabilities, improving the functionality of devices such as smart mobility aids and health monitoring systems for individuals with disabilities. Looking ahead, the design can be adapted to include error detection features, further increasing its resilience against side-channel attacks.

Author Contributions

Conceptualization, A.I.; methodology, A.I. and F.G.; software, A.I.; validation, A.I.; formal analysis, A.I.; investigation, A.I.; resources, A.I.; data curation, A.I.; writing—original draft preparation, A.I.; writing—review and editing, A.I. and F.G.; visualization, A.I.; supervision, A.I.; project administration, A.I. and F.G.; funding acquisition, A.I. All authors have read and agreed to the published version of the manuscript.

Funding

King Salman Center for Disability Research, Research Group No. KSRG-2024-207.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors extend their appreciation to the King Salman Center for Disability Research for funding this work through Research Group no KSRG-2024-207.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
RFIDRadio Frequency Identification
IoTInternet of Things
COTSCommercial Off-The-Shelf
ADPArea–Delay Product
PDPPower–Delay Product
VHDLVery High-Speed Integrated Circuit Hardware Description Language
ASICApplication Specific Integrated Circuit
ECCElliptic Curve Cryptography
DGDependency Graph
CPDCritical Path Delay

References

  1. Semary, H.; Al-Karawi, K.A.; Abdelwahab, M.M.; Elshabrawy, A. A Review on Internet of Things (IoT)-Related Disabilities and Their Implications. J. Disabil. Res. 2024, 3, 20240012. [Google Scholar] [CrossRef]
  2. Giannakas, F.; Troussas, C.; Krouska, A.; Voyiatzis, I.; Sgouropoulou, C. Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack. Inf. Secur. J. A Glob. Perspect. 2023, 32, 371–382. [Google Scholar] [CrossRef]
  3. Wambui, N. Medical Identification and Sensing Technology for Assisting and E-Health Monitoring Systems for Disabled and Elderly Persons. J. Biomed. Sustain. Healthc. Appl. 2022, 2, 9–17. [Google Scholar] [CrossRef]
  4. Al-karawi, K.A. Internet of Things (IoT) about Disabilities: Disabilities in relation to the Internet of Things (IoT). ScienceOpen Preprints 2023. [Google Scholar] [CrossRef]
  5. Ando, B.; Baglio, S.; Castorina, S.; Crispino, R.; Marletta, V. An assistive technology solution for user activity monitoring exploiting passive RFID. Sensors 2020, 20, 4954. [Google Scholar] [CrossRef] [PubMed]
  6. Shah, S.A.; Fioranelli, F. RF sensing technologies for assisted daily living in healthcare: A comprehensive review. IEEE Aerosp. Electron. Syst. Mag. 2019, 34, 26–44. [Google Scholar] [CrossRef]
  7. Wang, J.; Pan, C.; Jin, H.; Singh, V.; Jain, Y.; Hong, J.I.; Majidi, C.; Kumar, S. Rfid tattoo: A wireless platform for speech recognition. Proc. Acm Interact. Mob. Wearable Ubiquitous Technol. 2019, 3, 1–24. [Google Scholar] [CrossRef]
  8. Sula, A.; Spaho, E.; Matsuo, K.; Barolli, L.; Xhafa, F.; Miho, R. A new system for supporting children with autism spectrum disorder based on IoT and P2P technology. Int. J. Space-Based Situated Comput. 2014, 4, 55–64. [Google Scholar] [CrossRef]
  9. Gilart-Iglesias, V.; Mora, H.; Pérez-delHoyo, R.; García-Mayor, C. A computational method based on radio frequency technologies for the analysis of accessibility of disabled people in sustainable cities. Sustainability 2015, 7, 14935–14963. [Google Scholar] [CrossRef]
  10. García-Catalá, M.; Rodriguez-Sánchez, M.C.; Martín-Barroso, E. Survey of indoor location technologies and wayfinding systems for users with cognitive disabilities in emergencies. Behav. Inf. Technol. 2022, 41, 879–903. [Google Scholar] [CrossRef]
  11. Ray, P.P.; Dash, D.; De, D. A systematic review and implementation of IoT-based pervasive sensor-enabled tracking system for dementia patients. J. Med Syst. 2019, 43, 1–21. [Google Scholar] [CrossRef]
  12. Vrančić, A.; Zadravec, H.; Orehovački, T. The Role of Smart Homes in Providing Care for Older Adults: A Systematic Literature Review from 2010 to 2023. Smart Cities 2024, 7, 1502–1550. [Google Scholar] [CrossRef]
  13. Jellen, I. Towards Security and Privacy in Networked Medical Devices and Electronic Healthcare Systems. Master’s Thesis, California Polytechnic State University, San Luis Obispo, CA, USA, 2020. [Google Scholar]
  14. Khan, M.A.; Ullah, S.; Ahmad, T.; Jawad, K.; Buriro, A. Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol. Sensors 2023, 23, 5518. [Google Scholar] [CrossRef] [PubMed]
  15. Miniaoui, S.; Muammar, S.; Lubamba, C.; Fachkha, C. Comparing cyber physical systems with RFID applications: Common attacks and countermeasure challenges. Int. J. Bus. Inf. Syst. 2022, 40, 540–559. [Google Scholar] [CrossRef]
  16. Maiwada, U.D.; Imran, S.A.; Danyaro, K.U.; Janisar, A.A.; Salameh, A.; Sarlan, A.B. Security Concerns of IoT Against DDoS in 5G Systems. Int. J. Electr. Eng. Comput. 2024, 6, 98–105. [Google Scholar] [CrossRef]
  17. Patel, N.; Singh, A. Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem. Int. J. Next-Gener. Comput. 2023, 14, 400. [Google Scholar] [CrossRef]
  18. Chen, Y.; Yu, J.; Kong, L.; Zhu, Y. A Comprehensive Survey of Side-Channel Sound Sensing Methods. IEEE Internet Things J. 2024, 12, 1554–1578. [Google Scholar] [CrossRef]
  19. Ozmen, M.O.; Farrukh, H.; Celik, Z.B. Physical Side-Channel Attacks against Intermittent Devices. Proc. Priv. Enhancing Technol. 2024, 3, 461–476. [Google Scholar] [CrossRef]
  20. Ahmad Awan, K.; Ud Din, I.; Al-Huqail, A.A.; Almogren, A. SecuTwin for All: Enhancing Disability-focused Healthcare Through Secure Digital Twin Technology and Connected Health Monitoring. J. Disabil. Res. 2024, 3, 20240093. [Google Scholar] [CrossRef]
  21. Lee, T.F.; Lin, K.W.; Hsieh, Y.P.; Lee, K.C. Lightweight cloud computing-based RFID authentication protocols using PUF for e-healthcare systems. IEEE Sens. J. 2023, 23, 6338–6349. [Google Scholar] [CrossRef]
  22. Das, S.; Namasudra, S.; Deb, S.; Ger, P.M.; Crespo, R.G. Securing iot-based smart healthcare systems by using advanced lightweight privacy-preserving authentication scheme. IEEE Internet Things J. 2023, 10, 18486–18494. [Google Scholar] [CrossRef]
  23. He, D.; Zeadally, S. An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J. 2014, 2, 72–83. [Google Scholar] [CrossRef]
  24. Fan, K.; Jiang, W.; Li, H.; Yang, Y. Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans. Ind. Inform. 2018, 14, 1656–1665. [Google Scholar] [CrossRef]
  25. Qiu, S.; Xu, G.; Ahmad, H.; Wang, L. A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems. IEEE Access 2017, 6, 7452–7463. [Google Scholar] [CrossRef]
  26. Fizza, K.; Jayaraman, P.P.; Banerjee, A.; Auluck, N.; Ranjan, R. IoT-QWatch: A novel framework to support the development of quality-aware autonomic IoT applications. IEEE Internet Things J. 2023, 10, 17666–17679. [Google Scholar] [CrossRef]
  27. Khadka, G.; Ray, B.; Karmakar, N.C.; Choi, J. Physical-layer detection and security of printed chipless RFID tag for internet of things applications. IEEE Internet Things J. 2022, 9, 15714–15724. [Google Scholar] [CrossRef]
  28. Vijaykumar, V.; Sekar, S.R.; Jothin, R.; Diniesh, V.; Elango, S.; Ramakrishnan, S. Novel Light Weight Hardware Authentication Protocol for Resource Constrained IOT Based Devices. IEEE J. Radio Freq. Identif. 2024, 8, 31–42. [Google Scholar] [CrossRef]
  29. Shihab, S.; AlTawy, R. Lightweight authentication scheme for healthcare with robustness to desynchronization attacks. IEEE Internet Things J. 2023, 10, 18140–18153. [Google Scholar] [CrossRef]
  30. Wang, Y.; Liu, R.; Gao, T.; Shu, F.; Lei, X.; Wu, Y.; Gui, G.; Wang, J. A novel RFID authentication protocol based on a block-order-modulus variable matrix encryption algorithm. arXiv 2024, arXiv:2312.10593. [Google Scholar]
  31. Chen, C.C.; Lee, C.Y.; Lu, E.H. Scalable and Systolic Montgomery Multipliers Over GF(2m). IEICE Trans. Fundam. 2008, E91-A, 1763–1771. [Google Scholar] [CrossRef]
  32. Chiou, C.W.; Lee, C.Y.; Deng, A.W.; Lin, J.M. Concurrent error detection in Montgomery multiplication over GF(2m). Ieice Trans. Fundam. Electron. Commun. Comput. Sci. 2006, E89-A, 566–574. [Google Scholar] [CrossRef]
  33. Huang, W.T.; Chang, C.H.; Chiou, C.W.; Chou, F.H. Concurrent error detection and correction in a polynomial basis multiplier over GF(2m). IET Inf. Secur. 2010, 4, 111–124. [Google Scholar] [CrossRef]
  34. Kim, K.W.; Jeon, J.C. Polynomial Basis Multiplier Using Cellular Systolic Architecture. IETE J. Res. 2014, 60, 194–199. [Google Scholar] [CrossRef]
  35. Choi, S.; Lee, K. Efficient systolic modular multiplier/squarer for fast exponentiation over GF(2m). IEICE Electron. Express 2015, 12, 1–6. [Google Scholar] [CrossRef]
  36. Reyhani-Masoleh, A. A new bit-serial architecture for field multiplication using polynomial bases. In Proceedings of the 7th International Workshop Cryptographic Hardware Embedded Systems (CHES 2008), Washington, DC, USA, 10–13 August 2008; pp. 300–314. [Google Scholar]
  37. Abdulrahman, E.A.H.; Reyhani-Masoleh, A. High-Speed Hybrid-Double Multiplication Architectures Using New Serial-Out Bit-Level Mastrovito Multipliers. IEEE Trans. Comput. 2016, 65, 1734–1747. [Google Scholar] [CrossRef]
  38. Kim, K.W.; Jeon, J.C. A semi-systolic Montgomery multiplier over GF(2m). IEICE Electron. Express 2015, 12, 1–6. [Google Scholar] [CrossRef]
  39. Ibrahim, A. Novel Bit-Serial Semi-Systolic Array Structure for Simultaneously Computing Field Multiplication and Squaring. IEICE Electron. Express 2019, 16, 20190600. [Google Scholar] [CrossRef]
  40. Kim, K.W.; Lee, J.D. Efficient unified semi-systolic arrays for multiplication and squaring over GF(2m). Electron. Express 2017, 14, 1–10. [Google Scholar]
  41. Kim, K.W.; Kim, S.H. Efficient bit-parallel systolic architecture for multiplication and squaring over GF(2m). IEICE Electron. Express 2018, 15, 1–6. [Google Scholar] [CrossRef]
  42. Ibrahim, A. Efficient Parallel and Serial Systolic Structures for Multiplication and Squaring Over GF(2m). Can. J. Electr. Comput. Eng. 2019, 42, 114–120. [Google Scholar] [CrossRef]
  43. Hasan, A.; Negre, C. Low space complexity multiplication over binary fields with Dickson polynomial representation. IEEE Trans. Comput. 2010, 60, 602–607. [Google Scholar] [CrossRef]
  44. Chiou, C.W.; Lee, C.M.; Sun, Y.S.; Lee, C.Y.; Lin, J.M. High-throughput Dickson basis multiplier with a trinomial for lightweight cryptosystems. IET Comput. Digit. Tech. 2018, 12, 187–191. [Google Scholar] [CrossRef]
  45. Chiou, C.; Sun, Y.S.; Lee, C.M.; Liou, J.Y. Low-complexity unidirectional systolic Dickson basis multiplier for lightweight cryptosystems. Electron. Lett. 2019, 55, 28–30. [Google Scholar] [CrossRef]
  46. Kolios, P.; Panayiotou, C.; Ellinas, G.; Polycarpou, M. Data-driven event triggering for IoT applications. IEEE Internet Things J. 2016, 3, 1146–1158. [Google Scholar] [CrossRef]
  47. El-Rashidy, N.; El-Sappagh, S.; Islam, S.R.; M. El-Bakry, H.; Abdelrazek, S. Mobile health in remote patient monitoring for chronic diseases: Principles, trends, and challenges. Diagnostics 2021, 11, 607. [Google Scholar] [CrossRef] [PubMed]
  48. Fazel, E.; Najafabadi, H.E.; Rezaei, M.; Leung, H. Unlocking the power of mist computing through clustering techniques in IoT networks. Internet Things 2023, 22, 100710. [Google Scholar] [CrossRef]
  49. Karygiannis, T.; Eydt, B.; Barber, G.; Bunn, L.; Phillips, T. Guidelines for securing radio frequency identification (RFID) systems. NIST Spec. Publ. 2007, 80, 1–154. [Google Scholar]
  50. Batina, L.; Guajardo, J.; Kerins, T.; Mentens, N.; Tuyls, P.; Verbauwhede, I. Public-key cryptography for RFID-tags. In Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW’07), White Plains, NY, USA, 19–23 March 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 217–222. [Google Scholar]
  51. Pillutla, S.R.; Boppana, L. Area-efficient low-latency polynomial basis finite field GF(2m) systolic multiplier for a class of trinomials. Microelectron. J. 2020, 97, 104709. [Google Scholar] [CrossRef]
  52. Imana, J.L. LFSR-Based Bit-Serial GF(2m) Multipliers Using Irreducible Trinomials. IEEE Trans. Comput. 2020, 70, 156–162. [Google Scholar]
  53. Pillutla, S.R.; Boppana, L. Low-latency area-efficient systolic bit-parallel GF(2m) multiplier for a narrow class of trinomials. Microelectron. J. 2021, 117, 105275. [Google Scholar] [CrossRef]
  54. Li, Y.; Cui, X.; Zhang, Y. An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials. IEEE Trans. Comput. 2021, 71, 736–742. [Google Scholar] [CrossRef]
  55. Li, Y.; Zhang, Y.; He, W. Fast hybrid Karatsuba multiplier for type II pentanomials. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2020, 28, 2459–2463. [Google Scholar] [CrossRef]
  56. Meher, P.K.; Lou, X. Low-Latency, Low-Area, and Scalable Systolic-Like Modular Multipliers for GF(2m) Based on Irreducible All-One Polynomials. IEEE Trans. Circuits Syst. I Regul. Pap. 2016, 64, 399–408. [Google Scholar] [CrossRef]
  57. Mohaghegh, S.; Yemiscoglu, G.; Muhtaroglu, A. Low-Power and Area-Efficient Finite Field Multiplier Architecture Based on Irreducible All-One Polynomials. In Proceedings of the 2020 IEEE International Symposium on Circuits and Systems (ISCAS), Seville, Spain, 12–14 October 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–5. [Google Scholar]
  58. Zhang, Y.; Li, Y. Efficient Hybrid GF(2m) Multiplier for All-One Polynomial Using Varied Karatsuba Algorithm. IEICE Trans. Fundam. Electron. Comput. Sci. 2021, 104, 636–639. [Google Scholar] [CrossRef]
  59. Zhou, B.B. A New Bit Serial Systolic Multiplier over GF(2m). IEEE Trans. Comput. 1988, 37, 749–751. [Google Scholar] [CrossRef]
  60. Fenn, S.T.J.; Taylor, D.; Benaissa, M. A Dual Basis Bit Serial Systolic Multiplier for GF(2m). Integr. VLSI J. 1995, 18, 139–149. [Google Scholar] [CrossRef]
  61. Lee, C.Y.; Lu, E.H.; Lee, J.Y. Bit-Parallel Systolic Multipliers for GF(2m) Fields Defined by All-One and Equally-Spaced Polynomials. IEEE Trans. Comput. 2001, 50, 358–393. [Google Scholar]
  62. Lee, C.Y.; Lu, E.H.; Sun, L.F. Low-Complexity Bit-Parallel Systolic Architecture for Computing AB2 + C in a Class of Finite Field GF(2m). IEEE Trans. Circuits Syst. II 2001, 50, 519–523. [Google Scholar]
  63. Lee, C.Y.; Chiou, C.W. Efficient Design of Low-Complexity Bit-Parallel Systolic Hankel Multipliers to Implement Multiplication in Normal and Dual Bases of GF(2m). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2005, E88-A, 3169–3179. [Google Scholar] [CrossRef]
  64. Lee, C.Y. Low-latency bit-pararallel systolic multiplier for irreducible xm + xn + 1 with GCD(m,n) = 1. IEICE Trans. Fund. Elect. Commun. Comp. Sci. 2008, 55, 828–837. [Google Scholar]
  65. Bayat-Sarmadi, S.; Farmani, M. High-Throughput Low-Complexity Systolic Montgomery Multiplication Over GF(2m) Based on Trinomials. IEEE Trans. Circuits Syst. II 2015, 62, 377–381. [Google Scholar]
  66. Mathe, S.E.; Boppana, L. Bit-parallel systolic multiplier over GF(2m) for irreducible trinomials with ASIC and FPGA implementations. IET Circuits Devices Syst. 2018, 12, 315–325. [Google Scholar] [CrossRef]
  67. Lee, C.Y.; Chiou, C.W.; Lin, J.M. Concurrent error detection in a polynomial basis multiplier over GF(2m). J. Electron. Test. 2006, 22, 143–150. [Google Scholar] [CrossRef]
  68. Lee, K. Resource and Delay Efficient Polynomial Multiplier over Finite Fields GF(2m). J. Korea Soc. Digit. Ind. Inf. Manag. 2020, 16, 1–9. [Google Scholar]
  69. Lee, K. Low Complexity Systolic Montgomery Multiplication over Finite Fields GF(2m). J. Korea Soc. Digit. Ind. Inf. Manag. 2022, 18, 1–9. [Google Scholar]
  70. Mathe, S.E.; Boppana, L. Design and Implementation of a Sequential Polynomial Basis Multiplier over GF(2m). KSII Trans. Internet Inf. Syst. 2017, 11, 2680–2700. [Google Scholar]
  71. Gebali, F. Algorithms and Parallel Computers; John Wiley: New York, NY, USA, 2011. [Google Scholar]
  72. Ibrahim, A.; Gebali, F. Scalable and Unified Digit-Serial Processor Array Architecture for Multiplication and Inversion over GF(2m). IEEE Trans. Circuits Syst. I Regul. Pap. 2017, 22, 2894–2906. [Google Scholar] [CrossRef]
  73. Ibrahim, A.; Alsomani, T.; Gebali, F. New Systolic Array Architecture for Finite Field Inversion. IEEE Can. J. Electr. Comput. Eng. 2017, 40, 23–30. [Google Scholar] [CrossRef]
  74. Chiou, C.W.; Lin, J.M.; Lee, C.Y.; Ma, C.T. Novel Mastrovito Multiplier over GF(2m) Using Trinomial. In Proceedings of the 2011 5th International Conference on Genetic and Evolutionary Computing (ICGEC), Kitakyushu, Japan, 29 August–1 September 2011; pp. 237–242. [Google Scholar]
  75. Ibrahim, A.; Gebali, F.; Bouteraa, Y.; Tariq, U.; Ahanger, T.; Alnowaiser, K. Compact Bit-Parallel Systolic Multiplier Over GF(2m). IEEE Can. J. Electr. Comput. Eng. 2021, 44, 199–205. [Google Scholar] [CrossRef]
Figure 1. RFID-Based IoT Assistive System.
Figure 1. RFID-Based IoT Assistive System.
Systems 13 00154 g001
Figure 2. DG of computing matrix–vector product Z 1 .
Figure 2. DG of computing matrix–vector product Z 1 .
Systems 13 00154 g002
Figure 3. DG of computing matrix–vector product Z 2 .
Figure 3. DG of computing matrix–vector product Z 2 .
Systems 13 00154 g003
Figure 4. DG of computing matrix–vector product Z 3 .
Figure 4. DG of computing matrix–vector product Z 3 .
Systems 13 00154 g004
Figure 5. Scheduling time for Z 1 .
Figure 5. Scheduling time for Z 1 .
Systems 13 00154 g005
Figure 6. Scheduling time for Z 2 .
Figure 6. Scheduling time for Z 2 .
Systems 13 00154 g006
Figure 7. Scheduling time for Z 3 .
Figure 7. Scheduling time for Z 3 .
Systems 13 00154 g007
Figure 8. Unidirectional systolic parallel multiplier configuration.
Figure 8. Unidirectional systolic parallel multiplier configuration.
Systems 13 00154 g008
Figure 9. Schematic representation of PE j in systolic arrays.
Figure 9. Schematic representation of PE j in systolic arrays.
Systems 13 00154 g009
Figure 10. Schematic representation of PE 1 in systolic arrays.
Figure 10. Schematic representation of PE 1 in systolic arrays.
Systems 13 00154 g010
Figure 11. Area results.
Figure 11. Area results.
Systems 13 00154 g011
Figure 12. Power results.
Figure 12. Power results.
Systems 13 00154 g012
Figure 13. Delay results.
Figure 13. Delay results.
Systems 13 00154 g013
Figure 14. Area-Delay Product (ADP) Results.
Figure 14. Area-Delay Product (ADP) Results.
Systems 13 00154 g014
Figure 15. Power-delay product (PDP) results.
Figure 15. Power-delay product (PDP) results.
Systems 13 00154 g015
Table 1. Investigation of space and time complexities in suggested and competing multipliers.
Table 1. Investigation of space and time complexities in suggested and competing multipliers.
DesignANDXORMUXLatchLatencyCPDAreaTime
Complexity Complexity
Chiou [44] m 2 3 m 2 + 2 m 0 3 m 2 + 4 m m + 1 T A + 3 T X O ( m 2 ) O ( m )
Chiou [45] m 2 m 2 + m 0 3 m 2 m + 2 T A + T X O ( m 2 ) O ( m )
Lee [68] m 2 + m m 2 + 2 m 0 1.6 m 2 + 4 m ( m + 7 ) / 2 T A + T X O ( m 2 ) O ( m )
Lee [69] m 2 + m m 2 + ( 7 m + 1 ) / 2 0 2.1 m 2 + 6.5 m ( m + 7 ) / 2 T A + T X O ( m 2 ) O ( m )
Chiou [74] m 2 m 2 + m m 2 m 2 + 3 m m + 1 T A + T X + T M O ( m 2 ) O ( m )
Proposed 3 m 5 m 0 6 m m 2 T X O ( m ) O ( m )
Table 2. Evaluating the efficiency of different multiplier configurations for m = 283 .
Table 2. Evaluating the efficiency of different multiplier configurations for m = 283 .
MultipliermADPADPPDPA SavingP SavingADP SavingPDP Saving
[Kgates] [ns] [mW] (%) (%) (%) (%)
Chiou [44]2836082.615.6202.395,117.03162.799.896.999.998.8
Chiou [45]2834276.39.8169.741,720.31655.399.796.299.897.7
Lee  [68]2832631.24.8109.512,562.2522.699.694.299.592.8
Lee [69]2833771.24.8140.418,005.1670.399.795.599.694.3
Chiou [74]2833273.612.8130.641,904.41671.499.795.199.897.7
Proposed28310.75.96.463.837.9----
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ibrahim, A.; Gebali, F. Optimizing Security of Radio Frequency Identification Systems in Assistive Devices: A Novel Unidirectional Systolic Design for Dickson-Based Field Multiplier. Systems 2025, 13, 154. https://doi.org/10.3390/systems13030154

AMA Style

Ibrahim A, Gebali F. Optimizing Security of Radio Frequency Identification Systems in Assistive Devices: A Novel Unidirectional Systolic Design for Dickson-Based Field Multiplier. Systems. 2025; 13(3):154. https://doi.org/10.3390/systems13030154

Chicago/Turabian Style

Ibrahim, Atef, and Fayez Gebali. 2025. "Optimizing Security of Radio Frequency Identification Systems in Assistive Devices: A Novel Unidirectional Systolic Design for Dickson-Based Field Multiplier" Systems 13, no. 3: 154. https://doi.org/10.3390/systems13030154

APA Style

Ibrahim, A., & Gebali, F. (2025). Optimizing Security of Radio Frequency Identification Systems in Assistive Devices: A Novel Unidirectional Systolic Design for Dickson-Based Field Multiplier. Systems, 13(3), 154. https://doi.org/10.3390/systems13030154

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop