scholarly journals Secure Information Transfer Using Two Keyless Cryptography Methods

2021 ◽  
Vol 7 (4) ◽  
pp. 119-127
Author(s):  
A. Gerasimovich

In the current paper, some methods of information security protocols based on physical layer security are considered. It is proved that well known Shamir’s protocol can be applied to RSA cryptosystem but not to Rabin, Mac-Ellice and trellis based cryptosystems.The main stream of this paper is a description of key sharing protocol on constant public and noiseless channels (like Internet). It is shown that it is able to provide a high reliability and control of security in terms of Shannon’s information providing nothing-additional requirements to communication channels and without any cryptographic assumptions.

2013 ◽  
Vol 464 ◽  
pp. 253-257
Author(s):  
Hui Fang Chen

This paper takes the automatic control system of controllable pitch propeller in a multipurpose ocean tug as an example to describe the application of the S7-200 series PLC in the control system of 4500 horse power controllable pitch propeller in detail. The principle of control system is addressed, as well as the hardware configuration, the design idea of the main software and control process. The system shows high reliability, accuracy and good control performance in practical in practical running.


2012 ◽  
Vol 214 ◽  
pp. 177-182
Author(s):  
Xiao Bing Wu

The paper introduces a multipoint remote Hygrothermoscope monitoring system based on the MAX485 bus. The system of remote multipoint temperature control is composed of the host machine and slave machine; the host system for display and control, the slave system is responsible for collecting temperature data. Between master machine and slave machine communicate through the RS-485 bus, can realize the distant control room of the scene monitoring. The STC89C54 MCU is used as the controller and DHT11 is used as the temperate and humidity transducer. The hardware and software of the system are outlined. The system has realized multiple measuring points, easy expansion, and high reliability, anti-interference. The whole system has the advantages of simple circuit, reliable, and can be used for measuring temperature, humidity, temperature of building air conditioning control temperature and humidity monitoring and other fields.


2012 ◽  
Vol 479-481 ◽  
pp. 1476-1480
Author(s):  
Qing He Chu ◽  
Wen Si Cao ◽  
Zhen Nie

In the present rural power grid reconstruction project ,according to the problems of capacitor reactive power compensation in rural small substation. Take a small substation for instance, according to its operation and control method, set the criterion of the capacitor bank switching. A new high reliability, flexible reactive power compensation control device based on s7-200 PLC is designed. It plays an important role in improving the power supply , guaranteeing the quality of voltage, reducing the loss of rural power gid.


2017 ◽  
Vol 41 (5) ◽  
pp. 709-742 ◽  
Author(s):  
Hermann Frank ◽  
Alexander Kessler ◽  
Thomas Rusch ◽  
Julia Suess–Reyes ◽  
Daniela Weismeier–Sammer

This article develops a familiness scale measuring the family influence on the business via decision premises that express familiness. In three studies, we examine familiness with qualitative and quantitative approaches based on new systems theory. Narrative interviews are employed to generate items. Exploratory and confirmatory factor analyses led to a multidimensional scale (Family Influence Familiness Scale [FIFS]) comprising six dimensions: (1) ownership, management, and control; (2) proficiency level of active family members; (3) sharing of information between active family members; (4) transgenerational orientation; (5) family–employee bond; and (6) family business identity. Results indicate high reliability and validity levels.


2015 ◽  
Vol 14 (4) ◽  
pp. 5621-5631
Author(s):  
AJAYI ADEBOWALE ◽  
NICULAE GOGA ◽  
OTUSILE OLUWABUKOLA ◽  
ABEL SAMUEL

Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. The use of formal methods is admitted, recommended, and sometimes prescribed in safety-and security-related standards dealing, e.g., with avionics, railways, nuclear energy, and secure information systems. This paper describes the state of the art in the industrial use of formal methods ininformation security with a focus on verification of security protocols. Given the vast scope of available solutions, attention has been focused just on the most popular and most representative ones, without exhaustiveness claims. We describe some of the highlights of our survey by presenting a series of industrial projects, and we draw some observations from these surveys and records of experience. Based on this, we discuss issues surrounding the industrial adoption of formal methods in security protocol engineering.


2014 ◽  
pp. 811-840
Author(s):  
K. E. Rumyantsev ◽  
D. M. Golubchikov

This chapter is an analysis of commercial quantum key distribution systems. Upon analysis, the generalized structure of QKDS with phase coding of a photon state is presented. The structure includes modules that immediately participate in the task of distribution and processing of quantum states. Phases of key sequence productions are studied. Expressions that allow the estimation of physical characteristics of optoelectronic components, as well as information processing algorithms impact to rate of key sequence production, are formed. Information security infrastructure can be utilized, for instance, to formulate requirements to maximize tolerable error level in quantum channel with a given rate of key sequence production.


Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 587 ◽  
Author(s):  
Akashkumar Rajaram ◽  
Rui Dinis ◽  
Dushnatha Nalin K. Jayakody ◽  
Marko Beko

This article is focused on implementing simultaneous wireless information and power transmission as a physical layer security measure by using artificial noise. A series of high energy precoded symbols is simultaneously transmitted along with the information symbols over a Rayleigh frequency selective fading channel. The high energy precoded symbols act as an artificial noise for the eavesdroppers. The energy symbols are precoded on the basis of a legitimate user’s channel matrix to form a null space vector, which eliminates the interference of energy symbols at the information symbol receiver antennas, while allowing the rectenna to harvest energy from the superimposed information and energy symbols. We analyze the secrecy rate and error rate performance at the receiver under different circumstances, and we show that the performance of the legitimate user can be improved by using the iterative block decision feedback equalization method at the receiver.


Sign in / Sign up

Export Citation Format

Share Document