KEY NETWORK BANDWIDTH ESTIMATE

Author(s):  
O. A. Ostroumov ◽  
A. D. Sinyuk

The tasks of secure generating, distributing, and delivering keys to telecommunications systems correspondents that use cryptographic methods to protect information, along with accounting tasks, use order, and keys destruction are fundamental to the key life cycle task list. Traditionally, they are solved using secure communication channels, which is not economical, not always timely and in certain conditions impossible. The alternatives are key negotiation methods by transmitting information over open communication channels. The information efficiency accurate estimates are represented for some methods of open key agreement between two legitimate correspondents. They are not known for the network key formation conditions. The study purpose: an evidence-based search for potential evaluations of the open network key generation information effectiveness. The results: based on a set of represented results (including problem statement, intruder models development, channel connectivity, coder, decoder, system of quality indicators and key forming method requirements, key generation method, the network key generation asymptotic information efficiency index, proof key capacity theorem), an asymptotic information efficiency index estimate of a network key forming was made, which the key network bandwidth measurement based on the information exchange on a binary broadcast channel of communication with the component channels described by discrete symmetric channels models is proposed. Besides, Broadcast channel entropy function influence on the estimate is investigated. The pattern determining the network key forming possibility that meets the requirements is identified. The connection of the results with known scientific research is identified. The areas for further research are identified. The practical significance: the obtained results develop the wellknown scientific results in the field of the open key agreement theory and can be useful to specialists in the design and construction field of promising key management subsystems of modern cryptographic information protection systems that provide a closed telecommunication systems information exchange.

2018 ◽  
Vol 7 (1.7) ◽  
pp. 10
Author(s):  
R H Aswathy ◽  
N Malarvizhi

The broad vision of IoT focuses the highly increasing the electronic devices and application in which leads to the growth of technology. The enormous amounts of constrained devices are interlinked, communicate and coordinate with each other to fulfill its tackier mainly concentrate on low energy, Resource constraint, self-organization and short range of communication. In this heterogeneous environment of Antiprivacy and security are the greatest challenge. The secure information exchange is most critical pitfall to ensure the system security. In this paper we discussed and analyzed about various security algorithms like Triple DES, AES, Blowfish and ECCwith their structure, block size, key generation, number of rounds with different settings. In order to analyze the efficiency of all said algorithms, we made an experiment on algorithms works on constrained devices in different contexts, all our experiments show that ECC is the most suitable security algorithm in IOT contexts.


Due to rapid development of internet and web applications, the prominence and the importance of the information exchange using the internet is growing. Communication through internet faces data safety as an important issue. Data has to be safe when communicating as slightly loss or danger to transmitted data can be responsible for excessive harm to the society. For network safety encryption plays a vibrant part. Many times it is little bit confusing to choose best encryption, as there are many cryptography methods for securing the data during transmission. For many applications Blowfish is currently assumed to be insecure. So it turns out to be essential to enhance this procedure through addition of different levels of safety so that it can be used in several reliable communication channels. Blowfish algorithm is modified in a way that it is platform independent; however the present encryption schemes are restricted to platform dependent proposal. This proposed modified blowfish algorithm supports text, images and media files.


2021 ◽  
Vol 311 ◽  
pp. 02005
Author(s):  
I. S. Voznesensky ◽  
T. A. Mironova ◽  
L. O. Ternovaya

The article presents the results of the analysis of the process of expansion and diversity of communication channels in the university environment, which is relevant from the standpoint of achieving the goals of sustainable development in the field of education. It is shown that one of the most accessible and open communication channels, in which modern students are actively involved, is the channel of environmental communications. They have many manifestations, which corresponds to the most exceptionally wide ecological space, reflecting both individual and collective interests, features of a narrow professional attitude to nature and its civilizational understanding. A significant part of the disciplines studied in higher education contributes to the formation of students' environmental competencies. The specificity of the ecological approach to education and upbringing contributes to involvement of students in activities for the nature protection. The regularities of environmental communications functioning can be traced on the example of environmental education carried out at the Moscow Automobile Road State Technical University (MADI).


2019 ◽  
Vol 22 (6) ◽  
pp. 136-142 ◽  
Author(s):  
E. S. Maklakov ◽  
A. A. Gulamov

Consider the option of building the last miles to telecom operators, in accordance with the requirements for the construction of the last miles of control centers in the power industry. A variant is proposed for constructing a typical network node of the last miles of the control center, taking into account all the necessary interfaces for the transmission of dispatch telephone communication channels, telemetry information transmission channels, as well as service communication channels and information exchange between electric power entities and dispatch centers. A variant of the construction and topology of the last miles of the control center, methods of reservation of channels to access nodes are described. All types and types of interfaces that are necessary to use for the organization of dispatch communication channels and the transmission of telemetric information in the dispatch centers of the regional level have been determined. The use of various types of interfaces for service purposes is described in detail. Separate types of interfaces are used for voice transmission and for dispatch communication channels with objects. The variants of using analog interfaces for transmitting telemetry information via corresponding communication channels, which are used for cent equipment with analog outputs, are described. There are several types of redundancy of communication channels to ensure uninterrupted operation of the control center and to exclude the possibility of disabling the main and backup channels at the same time when working with a particular object. The redundancy of the hardware is carried out by installing additional cards in the equipment of the nodes in the cold reserve. Power redundancy is carried out due to the presence of at least two power supply units of the equipment for connection from two different sources of the uninterruptible power supply system. There is a reserve for the optical fibers of the last miles to the access nodes, which in turn allows you to change the transport transmission line in case of failure of the current one.


Author(s):  
Zainab Khyioon Abdalrdha ◽  
Iman Hussein AL-Qinani ◽  
Farah Neamah Abbas

The importance of encryption in most organizations, therefore, it became necessary to encrypt data because data security is an essential component in order to maintain the security of data and information in various institutions. Encryption also helps to ensure the confidentiality and integrity of data during transmission through communication channels. Given the importance of the keys used in encryption as a key part in the strength of the algorithm and increase its security in most encryption algorithms, thus generating the key in many research the most important part in data encryption and its importance lies in the non-duplication of keys to ensure better results and theoretically impossible to break. In this paper, we try to describe and review many of the papers that were used to create the keys and compare them with each other.


2020 ◽  
Author(s):  
Stefano Pagliari ◽  
Kevin Young

The presence of communication channels plays a key role in how interest groups engage in EU policymaking. However, the capacity of researchers to explain these patterns is constrained by the informal and secretive nature of much of this interaction. In this paper we develop a novel text-as-data approach which maps the informal patterns of information exchange among the stakeholders that engage with EU policymaking by detecting instances of text reuse among the comment letters submitted by these groups to the same policy proposal. We deploy this approach to analyze a novel dataset of publicly available comments to a wide a range of EU policies, and find that there are significant differences between the structure of information exchange networks and more formal lobbying coalitions in the EU, as well as between the groups that engage in these forms of coordination.


Sign in / Sign up

Export Citation Format

Share Document