{"title":"CryptoBin加密算法在军事上的应用","authors":"Ahmed H. Eltengy, H. Zied","doi":"10.21608/ijt.2021.266289","DOIUrl":null,"url":null,"abstract":": In recent years, there has been a significant increase in the use of location-based solutions. As a result, data encryption has become increasingly important in order to ensure privacy and confidentiality, especially in all domains, military and civil alike. This paper presents an application that will be used in both military and civilian situations, encrypting data on the location and movements of military personnel or civilian prospec-tors within a specific area using transmitting and receiving circuits controlled by a micro-controller programmed with the proposed encryption algorithm. The application will be used in both military and civilian settings. Depending on the task at hand or the nature of the immediate surroundings, the proposed application has been introduced, installed, and used in a variety of ways. The proposed technology has been tested in a variety of situa-tions and has produced excellent results in all of them. The suggested application is confi-dential, authenticated, and simple to use, according to the results of frequency, speed, and security testing; this has been demonstrated by the results of these tests.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"22 1","pages":""},"PeriodicalIF":0.4000,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Using CryptoBin Encryption Algorithm in Military Applications\",\"authors\":\"Ahmed H. Eltengy, H. Zied\",\"doi\":\"10.21608/ijt.2021.266289\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": In recent years, there has been a significant increase in the use of location-based solutions. As a result, data encryption has become increasingly important in order to ensure privacy and confidentiality, especially in all domains, military and civil alike. This paper presents an application that will be used in both military and civilian situations, encrypting data on the location and movements of military personnel or civilian prospec-tors within a specific area using transmitting and receiving circuits controlled by a micro-controller programmed with the proposed encryption algorithm. The application will be used in both military and civilian settings. Depending on the task at hand or the nature of the immediate surroundings, the proposed application has been introduced, installed, and used in a variety of ways. The proposed technology has been tested in a variety of situa-tions and has produced excellent results in all of them. The suggested application is confi-dential, authenticated, and simple to use, according to the results of frequency, speed, and security testing; this has been demonstrated by the results of these tests.\",\"PeriodicalId\":42285,\"journal\":{\"name\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"volume\":\"22 1\",\"pages\":\"\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2021-12-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21608/ijt.2021.266289\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Interdisciplinary Telecommunications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/ijt.2021.266289","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Using CryptoBin Encryption Algorithm in Military Applications
: In recent years, there has been a significant increase in the use of location-based solutions. As a result, data encryption has become increasingly important in order to ensure privacy and confidentiality, especially in all domains, military and civil alike. This paper presents an application that will be used in both military and civilian situations, encrypting data on the location and movements of military personnel or civilian prospec-tors within a specific area using transmitting and receiving circuits controlled by a micro-controller programmed with the proposed encryption algorithm. The application will be used in both military and civilian settings. Depending on the task at hand or the nature of the immediate surroundings, the proposed application has been introduced, installed, and used in a variety of ways. The proposed technology has been tested in a variety of situa-tions and has produced excellent results in all of them. The suggested application is confi-dential, authenticated, and simple to use, according to the results of frequency, speed, and security testing; this has been demonstrated by the results of these tests.
期刊介绍:
The International Journal of Interdisciplinary Telecommunications and Networking (IJITN) examines timely and important telecommunications and networking issues, problems, and solutions from a multidimensional, interdisciplinary perspective for researchers and practitioners. IJITN emphasizes the cross-disciplinary viewpoints of electrical engineering, computer science, information technology, operations research, business administration, economics, sociology, and law. The journal publishes theoretical and empirical research findings, case studies, and surveys, as well as the opinions of leaders and experts in the field. The journal''s coverage of telecommunications and networking is broad, ranging from cutting edge research to practical implementations. Published articles must be from an interdisciplinary, rather than a narrow, discipline-specific viewpoint. The context may be industry-wide, organizational, individual user, or societal. Topics Covered: -Emerging telecommunications and networking technologies -Global telecommunications industry business modeling and analysis -Network management and security -New telecommunications applications, products, and services -Social and societal aspects of telecommunications and networking -Standards and standardization issues for telecommunications and networking -Strategic telecommunications management -Telecommunications and networking cultural issues and education -Telecommunications and networking hardware and software design -Telecommunications investments and new ventures -Telecommunications network modeling and design -Telecommunications regulation and policy issues -Telecommunications systems economics