Information Security and Cryptography. Overview-Revolution of Civilization Structure and Information Security.
نویسندگان
چکیده
منابع مشابه
Quantum Cryptography and Security of Information Systems
We show concept of BB84 quantum key distribution (QKD) protocol and analyze its use as an information system. The difference between classical and quantum cryptography is presented in a way of understanding the main advantage of quantum information processing over classical information processing. At the end of the article, we present today and future use of quantum cryptography and possible im...
متن کاملSpecial Section on Cryptography and Information Security
This Special Section will be included in the Journal issue of the IEICE Transactions of Fundamentals of Electronics, Communications and Computer Sciences (IEICE Trans. Fundamentals, for short), which will be published in January, 2019. The objective of the Special Section is to stimulate research in the area of cryptography and information security. You are strongly encouraged to submit origina...
متن کاملsupply and demand security of energy in central asia and the caucasus
امنیت انرژی به معنی عرضه مداوم و پایدار همراه با قیمت های معقول در حامل های انرژی، که تهدیدات امنیتی، سیاسی، اقتصادی، محیط زیستی و روانی را کاهش دهد. امروزه نفت و گاز تنها، کالای تجاری نیست بلکه بعنوان ابزار سیاسی مورد استفاده قرار می گیرد.اختلاف میان روسیه و اکراین بر سر انرژی در ژانویه 2006، تهدیدی برای امنیت انرژی اروپا ایجاد کرد. در این تحقیق ما تلاش کردیم که نقش انرژی آسیای میانه و قفقاز ر...
15 صفحه اولCombining Conventional Cryptography with Information Theoretic Security
This paper highlights security issues that can arise when incorrect assumptions are made on the capabilities of an eavesdropper. In particular, we analyze a channel model based on a split Binary Symmetric Channel (BSC). Corresponding security parameters are chosen based on this channel model, and assumptions on the eavesdroppers capabilities. A gradual relaxation of the restrictions on the eave...
متن کاملQuantum cryptography: a practical information security perspective
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic channel. Without this authenticated link, QKE is vulnerable to man-in-the-middle attacks. Overlooking this fact results in exaggerated claims and/...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Institute of Television Engineers of Japan
سال: 1995
ISSN: 0386-6831,1884-9652
DOI: 10.3169/itej1978.49.1561