{"title":"油井钻杆中的应变传感器和加速度计通信通道:延迟传播和特征值","authors":"A. Alenezi, A. Abdi","doi":"10.4172/2090-4886.1000157","DOIUrl":null,"url":null,"abstract":"Many symmetric encryption algorithms have been proposed since long time back. They are used to protect the data either during transmission, storage or both. All symmetric algorithms are using a single key used for encryption and decryption same data. In this paper, we have designed a new approach of symmetric algorithm \"UR8\". It is fiestel network and able to encrypt and decrypt 128 bits block cipher. Further, UR8 algorithm uses 64 bits key size and 8 rounds to encrypt and decrypt the data. Thereafter, we have evaluated UR8 algorithm based on the time required for encryption and decryption, throughput, memory utilization and average data rate. As well, the evaluation result has been compared to DES algorithm.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000157","citationCount":"1","resultStr":"{\"title\":\"Strain Sensor and Accelerometer Communication Channels in Drill Pipes of Oil Wells: Delay Spreads and Eigenvalues\",\"authors\":\"A. Alenezi, A. Abdi\",\"doi\":\"10.4172/2090-4886.1000157\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many symmetric encryption algorithms have been proposed since long time back. They are used to protect the data either during transmission, storage or both. All symmetric algorithms are using a single key used for encryption and decryption same data. In this paper, we have designed a new approach of symmetric algorithm \\\"UR8\\\". It is fiestel network and able to encrypt and decrypt 128 bits block cipher. Further, UR8 algorithm uses 64 bits key size and 8 rounds to encrypt and decrypt the data. Thereafter, we have evaluated UR8 algorithm based on the time required for encryption and decryption, throughput, memory utilization and average data rate. As well, the evaluation result has been compared to DES algorithm.\",\"PeriodicalId\":91517,\"journal\":{\"name\":\"International journal of sensor networks and data communications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.4172/2090-4886.1000157\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of sensor networks and data communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4172/2090-4886.1000157\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of sensor networks and data communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4172/2090-4886.1000157","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Strain Sensor and Accelerometer Communication Channels in Drill Pipes of Oil Wells: Delay Spreads and Eigenvalues
Many symmetric encryption algorithms have been proposed since long time back. They are used to protect the data either during transmission, storage or both. All symmetric algorithms are using a single key used for encryption and decryption same data. In this paper, we have designed a new approach of symmetric algorithm "UR8". It is fiestel network and able to encrypt and decrypt 128 bits block cipher. Further, UR8 algorithm uses 64 bits key size and 8 rounds to encrypt and decrypt the data. Thereafter, we have evaluated UR8 algorithm based on the time required for encryption and decryption, throughput, memory utilization and average data rate. As well, the evaluation result has been compared to DES algorithm.