Study on TEA Encryption for Public Communication Network Wireless Remoter

2014 ◽  
Vol 565 ◽  
pp. 179-182 ◽  
Author(s):  
Yue Tao Ge ◽  
Xiao Ming Liu ◽  
Xiao Tong Yin

In order to realize wireless remoter not only securely but also quickly data transmission in the public communication network, the Tiny Encryption Algorithm (TEA) encryption and decryption algorithm is studied in this paper and the properties of TEA are analyzed. According to communication protocol of remoter, encryption and decryption program process are designed. Because of TEA encryption, remoter transmitter and receiver can communicate strongly in the public communication network.

Symmetry ◽  
2019 ◽  
Vol 11 (7) ◽  
pp. 843 ◽  
Author(s):  
Pei-Yen Wan ◽  
Teh-Lu Liao ◽  
Jun-Juh Yan ◽  
Hsin-Han Tsai

This paper is concerned with the design of an improved El-Gamal cryptosystem based on chaos synchronization. The El-Gamal cryptosystem is an asymmetric encryption algorithm that must use the public and private keys, respectively, in the encryption and decryption processes. However, in our design, the public key does not have to appear in the public channel. Therefore, this proposed improved El-Gamal cryptosystem becomes a symmetric-like encryption algorithm. First, a discrete sliding mode controller is proposed to ensure the synchronization of master and slave chaotic systems; next, a novel improved El-Gamal cryptosystem is presented. In the traditional El-Gamal cryptosystem, the public key is static and needs to be open which provides an opportunity to attack. However, in this improved design, due to the chaos synchronization, the public key becomes dynamic and does not appear in public channels. As a result, drawbacks of long cipher text and time-consuming calculation in the traditional El-Gamal cryptosystem are all removed. Finally, several performance tests and comparisons have shown the efficiency and security of the proposed algorithm.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 436
Author(s):  
Gowtham Tumati ◽  
Yalamarthi Rajesh ◽  
Manogna T ◽  
J Ram Kumar

Cryptographic techniques are primarily divided into two categories and they are: Symmetric key type and Asymmetric key type. In Symmetric key cryptography, during the process of encryption and decryption, the same key will be used. This is a conventional method of Cryptography. This might cause some disadvantage and give way for attacks on the algorithm. So, for this reason, the next technique comes into play. In Asymmetric key cryptography, there is a usage of a pair of keys, one for the encryption process and another for decryption process. In this technique also, there is a slight disadvantage, since there is a possibility for attackers to guess the public key from the pair of keys, thereby posing a threat to the process to an extent. In this paper, we develop an algorithm with a simple yet efficient structure using Symmetric key cryptography that could possibly decrease the chance of attacks on the algorithm.  


2020 ◽  
Vol 11 (1) ◽  
Author(s):  
Alexandra Kate Williamson ◽  
Belinda Luke

AbstractThis paper examines advocacy, agenda-setting and the public policy focus of private philanthropic foundations in Australia. While concerns have been raised regarding advocacy and public policy influence of foundations in countries such as the U.S., less is understood on this issue in other contexts. Interviews were conducted with 11 managers and trustees of 10 Private Ancillary Funds (PAFs) in late 2014. Analysis of publicly available data on the participating PAFs was then undertaken comparing PAF information available at the time of the interviews with that available approximately five years later, to consider any changes in the public communication of their agendas. Findings reveal PAFs’ agendas were largely consistent with public policy but may vary in the approaches to address social causes. Further, a preference for privacy indicates the PAF sector may be characterised as ‘quiet philanthropy’ rather than having a visible public presence. As such, PAFs’ advocacy focused on promoting philanthropy, rather than altering or influencing public policy. Our main contention is that the conceptions of advocacy in structured philanthropy are dominated by the obvious, the outliers and the noisy. Our contribution to the philanthropic literature is a more nuanced and broader discussion of how advocacy and agenda-setting occurs and is understood in the mainstream.


2021 ◽  
Vol 165 (3-4) ◽  
Author(s):  
Elisabeth A. Lloyd ◽  
Naomi Oreskes ◽  
Sonia I. Seneviratne ◽  
Edward J. Larson

AbstractStandards of proof for attributing real world events/damage to global warming should be the same as in clinical or environmental lawsuits, argue Lloyd et al. The central question that we raise is effective communication. How can climate scientists best and effectively communicate their findings to crucial non-expert audiences, including public policy makers and civil society? To address this question, we look at the mismatch between what courts require and what climate scientists are setting as a bar of proof. Our first point is that scientists typically demand too much of themselves in terms of evidence, in comparison with the level of evidence required in a legal, regulatory, or public policy context. Our second point is to recommend that the Intergovernmental Panel on Climate Change recommend more prominently the use of the category “more likely than not” as a level of proof in their reports, as this corresponds to the standard of proof most frequently required in civil court rooms. This has also implications for public policy and the public communication of climate evidence.


2013 ◽  
Vol 427-429 ◽  
pp. 1268-1271
Author(s):  
Xue Wen He ◽  
Ying Fei Sheng ◽  
Kuan Gang Fan ◽  
Le Ping Zheng ◽  
Qing Mei Cao

In view of the existing flaws of traditional manual observations, a new type of tailing reservoir safety monitoring and warning system based on ZigBee and LabVIEW was designed. The system chose SoC chip CC2530 as the RF transceiver and designed the low-power wireless sensor networks nodes to collect and process the data of tailing reservoir. It chose ZigBee 2007 as the network communication protocol, and uploaded the data to PC by RS232 serial port. The monitoring and warning interface of PC was completed with LabVIEW. The testing results show that the data transmission of the network is stable and the system is suitable for real-time monitoring and warning of the tungsten tailing reservoir.


mBio ◽  
2015 ◽  
Vol 6 (6) ◽  
Author(s):  
Erika C. Shugart ◽  
Vincent R. Racaniello

ABSTRACT Scientists must communicate about science with public audiences to promote an understanding of complex issues that we face in our technologically advanced society. Some scientists may be concerned about a social stigma or “Sagan effect” associated with participating in public communication. Recent research in the social sciences indicates that public communication by scientists is not a niche activity but is widely done and can be beneficial to a scientist's career. There are a variety of approaches that scientists can take to become active in science communication.


China Report ◽  
2021 ◽  
pp. 000944552110470
Author(s):  
Rudolf Fürst

Deepening globalisation and worldwide availability of free information and ideas raise concerns of the communist China’s political leadership about the stability of the regime and the sustainability of the state ideological orthodoxy. Therefore, the state’s tightening control of the public communication to curtail the domestic criticism and occasional public discontent is becoming framed and legitimised in terms of cultural security as a non-traditional security concern. This study argues that the restrictive impacts of the politicisation of culture in the centralised agenda of President Xi Jinping reinvigorate China’s anti-Western narratives and attitudes. The research focuses on the state’s cultural security-related and applicable strategy in the political and institutional agenda and media. Moreover, the study also traces the state cultural security policy in the field of the civic and non-governmental sector, religious and ethnic minorities policy, literature, film and audiovisual sectors. The findings assess the concern that the intellectually anachronistic, self-restraining and internationally hostile policy devaluates China’s cultural potential and complexity.


2021 ◽  
pp. 9-19
Author(s):  
Gea Ducci ◽  
Alessandro Lovari

The pandemic crisis has led to a renew centrality of public sector communica-tion in a hybrid and convergent media ecosystems aiming at (re)building relation-ships based on trust between institutions and citizens. This contribution reflects on the strengths and fragility of the Italian public communication in the face of the pandemic, considering regulatory processes and paths of professionalization. It focuses also on the challenges of social media use in public sector, suggesting a critical approach towards the platformization of the public sector communication activities. The last part of this manuscript presents the different articles that com-pose the special issue.


Sign in / Sign up

Export Citation Format

Share Document