{"id":406,"date":"2023-04-24T23:42:17","date_gmt":"2023-04-24T23:42:17","guid":{"rendered":"https:\/\/nau.edu\/research\/?page_id=406"},"modified":"2024-12-12T19:50:06","modified_gmt":"2024-12-12T19:50:06","slug":"multi-functional-units-for-ternary-computing","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/multi-functional-units-for-ternary-computing\/","title":{"rendered":"Multi-Functional Units for Ternary Computing"},"content":{"rendered":"<div class=\"nau-block nau-block-left-nav-top-bound\">\n    \t<button id=\"left-nav-toggle-btn\" onclick=\"toggleNav();\">\n\t\tON THIS PAGE \n\t\t<i id=\"chevron-icon\" class=\"fas fa-solid fa-chevron-down\"><\/i>\n\t<\/button>\n\t<div id=\"left-nav-menu-track\">\n\t\t<div id=\"left-nav-wrapper\">\n\t\t\t<div class=\"rfi-above-anchor-tags\">\n\t\t\t\t<div class=\"ri-container\">\n\t\t\t\t\t<a href=\"https:\/\/nau.edu\/admissions\/request-information\/\" id=\"request-info\" class=\"btn bg-true-blue left-nav-menu-bottom-button display-mobile\">Request info&nbsp;&nbsp;<\/a>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div id=\"left-nav-menu\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"menu-section backcolor\">\n\t\t\t\t\t<div class=\"header\">\n\t\t\t\t\t\tHOW CAN WE HELP?\t\t\t\t\t<\/div>\n\t\t\t\t\t<ul class=\"responsive-icons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"tel:928-523-4620\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-phone.svg\" alt=\"Telephone:\"> 928-523-4620<\/a>\n\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"mailto:nauinnovations@nau.edu\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-email.svg\" alt=\"Email:\"><span class=\"left-nav-email\"> nauinnovations&#8203;@nau.edu <\/span><\/a><\/li>\n\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<section class=\"nau-block left-nav-section\"><header class=\"entry-header\"><div class=\"breadcrumb\"><ol class=\"breadcrumbs\"><li><a href=\"https:\/\/in.nau.edu\">IN<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li><a href=\"https:\/\/in.nau.edu\/research\">Research<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li class=\"current\">Pages<\/li><\/ol><\/div><h1 class=\"entry-title text-left \">Multi-Functional Units for Ternary Computing<\/h1><hr class=\"h1-hr  text-left \" role=\"none\"><\/header><!-- .entry-header --><\/section><!-- <section class=\"nau-block left-nav-section grid-md-12\">\n    <header class=\"entry-header\">\n        <h1 class=\"entry-title text-left \" tabindex=\"0\" id=\"h1-first\">Dummy H1<\/h1>\n        <hr class=\"h1-hr  text-left \" role=\"none\">\n    <\/header>\n<\/section> -->\n\n<section class=\"nau-block left-nav-section grid-md-12\">\n    <div class=\"page-content\">\n        \n\n<h2 class=\"wp-block-heading\">Description<\/h2>\n\n\n\n<p>This technology uses ternary states for implementing security systems. A multi-factor cryptographic authentication computing system receives an instruction that is encoded using binary or ternary codes. Based on the determination between binary and ternary instructions, the system routes the instructions to the first or second functional units. One computing device executes binary instructions, while another executes ternary instructions. The system then generates a giant ternary key as a combination of multiple authentication keys, such as passwords, pin codes, and physical unclonable function (PUF) challenges. The longest key is kept as the original binary stream, while the following keys are converted into a decimal data stream and used to insert ternary states inside the original binary stream with an edit distance algorithm.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Additional information<\/h2>\n\n\n\n<section  \n    class=\"nau-block nau-block-panels   \" \n    data-layout_mobile=\"groupLayout-Stack gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_tablet=\"groupLayout-Stack gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_desktop=\"groupLayout-Tabs gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_xl=\"groupLayout-Tabs gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\">\n\n    <div class=\"background-wrapper\">\n        <div class=\"block-main-content\">\n            \n            \n                            <div class=\"tab-nav\" role=\"tablist\" aria-label=\"Tabs for  articles\">\n                                                \n                        <button data-panel=\"panel--0\"\n                            role=\"tab\"\n                            aria-controls=\"panel--0\"\n                            class=\"active bg-true-blue bg-none\"\n                            tabindex=\"0\">Patent number and inventor<\/button>\n                                                \n                        <button data-panel=\"panel--1\"\n                            role=\"tab\"\n                            aria-controls=\"panel--1\"\n                            class=\"after-active bg-true-blue bg-none\"\n                            tabindex=\"-1\">Potential applications<\/button>\n                                                \n                        <button data-panel=\"panel--2\"\n                            role=\"tab\"\n                            aria-controls=\"panel--2\"\n                            class=\" bg-true-blue bg-none\"\n                            tabindex=\"-1\">Benefits and advantages<\/button>\n                                                \n                        <button data-panel=\"panel--3\"\n                            role=\"tab\"\n                            aria-controls=\"panel--3\"\n                            class=\" bg-true-blue bg-none\"\n                            tabindex=\"-1\">Case number and licensing status<\/button>\n                                    <\/div>\n            \n            \n            \n            <div class=\"panel-wrapper\">\n                \n                                \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--0\"\n                            id=\"panel--0\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Patent number and inventor<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>16\/492,562<\/p>\n<p>Paul Flikkema and Bertrand Cambou<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--1\"\n                            id=\"panel--1\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Potential applications<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>This technology is designed for use with cryptographic systems and authentication methods.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--2\"\n                            id=\"panel--2\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Benefits and advantages<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>Generally, ternary computers have not been successful in the marketplace because they are not as efficient as devices utilizing binary code computation. Native ternary codes executed on native ternary computers outperform legacy codes when dedicated to strengthening cybersecurity. This technology replaces the monolithic arithmetic logic unit (ALU) of a general-purpose computer with a set of multi-functional units. At least one unit executes binary instructions while another unit is set up to execute ternary instructions, and a giant ternary key is generated from PUF challenges used to authenticate a device. This method reduces the efficiency of sequential attacks by eliminating partial authentications with a single factor. The entropy of a giant ternary key can be much higher than the entropy (i.e., randomness rate) of separate binary keys combined.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--3\"\n                            id=\"panel--3\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Case number and licensing status<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>2017-023<\/p>\n<p>This invention is available for licensing.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                                                <\/div>\n\n                    <\/div>\n    <\/div>\n<\/section>\n\n    <\/div>\n<\/section>\n\n<div class=\"nau-block nau-block-left-nav-bottom-bound\">\n\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":276,"featured_media":1278,"parent":59,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-406","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/users\/276"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/comments?post=406"}],"version-history":[{"count":14,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/406\/revisions"}],"predecessor-version":[{"id":6169,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/406\/revisions\/6169"}],"up":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media\/1278"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media?parent=406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}