mm-Wave Passive Duplexers

The design of a duplexer for 5G/6G applications is extremely challenging; therefore, it requires significant innovations and improvements in existing design methodologies. In our proposed design, we have used a simple ring resonator with microstrip feed line. The proposed filtering technique is simple and by making minor changes, one can observe an exciting and useful phenomenon. One possible variation is the use of split-ring resonator instead of a ring resonator. 

An EIT, Fano, and Lorentz profiles can also be attained using the different combinations of the partial split-ring resonator and partial reflecting area in microstrip line. The effectiveness of such type of passive solutions is that their size is equal to or even smaller than that of the size of the feeding antenna which makes them suitable for mm-wave applications. All these methods have a common goal to reduce the size of the DoC.

Patents

Duplexers And Related Devices For 5G/6G And Subsequent Protocols, And For Mm-wave And Terahertz Applications

White-Papers

Duplexer for mm-Wave 5G & beyond Applications

Research Papers

Passive Duplexers for 5G mm-Wave Applications

CMOS True Random Number Generator

True Random Number Generators (TRNG) are required for various applications such as encryption in wireless communication systems to ensure secure communication. Satellites and base stations that communicate simultaneously with hundreds of devices, each device communicating at several Mbps or even up to Gbps, require random numbers at rates of several hundred Gbps to ensure secure communication. With the advent of 5G and MMIMO (Massive Multiple Input Multiple Output) technologies, the number of these devices is expected to explode due to an increased number of IoT devices connecting to the cloud, thereby mandating even higher rates of random number generation. Not only must these random numbers be supplied at ever-increasing rates, but they must also be statistically independent and robust to cyber-attacks in order to prevent security failures. These random number generators must also be easily integrable into the current chip technology without requiring extra cost or manufacturing steps and should also be energy efficient. Our TRNG can be easily implemented on chip and can generate high quality random bits at rates of up to several Gbps. Moreover, it can also be scaled down to lower rates for low power devices, making it feasible for a vast majority of applications.

White-Papers

A Circuit and System for a Very High Throughput True Random Number Generator (TRNG) for Next Generation Secure Hardware and Communication Systems

Research Papers

A High Throughput True Random Number Generator using Metastability and Chaos

Polar Modulator

A new class of passive polar modulators is proposed which can be manufactured using a standard CMOS or any other IC design technology. The proposed mm-wave polar modulator exhibits both phase and amplitude modulation, which can be combined to make a polar modulator using a single passive structure. Our method boasts excellent linearity and good power handling capability compared to the active class of modulators

White-Papers

Fano Based Passive Polar Moldulator for mm-Wave Applications (5G/6G and Radar )

Evolving Cryptography

As communication technology evolves and the world becomes more connected, the need for secure communications grows greater. Cryptographic Algorithms such as AES and RSA are widely used to secure two-way communications between clients and servers on the internet and are commonplace in high-security applications such as credit cards, military communications, etc. These algorithms require the use of a private key. In symmetric ciphers, this key is a “shared secret” known to both sender and receiver or exchanged through a key exchange method such as Diffie-Hellman key exchange. In the case of asymmetric ciphers, a pair of public and private keys are used. In either case, if the key is compromised, the security of communication is also compromised. We propose a novel approach of evolving cryptography through which the modules of an algorithm such as Confusion, Diffusion, and Key-Mixing, etc., are evolved to produce cryptographically secure Customized Encryptors. By evolving AES 128, our solution provides a cryptographic strength of 2908 while running at a fraction of the processing power of AES 256.

White -Papers

Evolving Cryptography

Randomness Inspector

In a communication device, an encryptor of a baseband processor is vulnerable to attacks that may compromise its strength. These attacks can be possible by introducing some cryptographically weak modules in an encryptor like S-Box, diffusion module, or running a few rounds of standard encryption algorithms. Further attacks can also be made possible by compromising the strength or size of the key used for the encryption of data. This invention incorporates an inspection module in a baseband processor, determining whether an encryptor of a communication device is compromised or not by evaluating the randomness gain on the stream of output data. A weak module within an encryptor can also be identified if an encryption algorithm gets compromised.

White -Papers

Randomness Inspector In a Broadband Processor

Satellite Geolocation

This invention describes a location finding system and method that uses Low Earth Orbiting satellites (LEOs) based Non-Terrestrial Network (NTN) to provide the accurate geolocation of a wireless communication device in advanced wireless communication systems such as 5G, 6G, and industry 4.0. The system uses precision clock signals of a UE and satellites in an NTN. Using the time of arrival method disclosed in the invention, a trusted satellite can compute the location of a UE by processing positioning signals. The proposed system and method enable reliable and secure location-based services on next generation smart computing and communication devices.

To access the file please enter the following details

First name:
Last name:
Institution Email: