CryptoBin加密算法在军事上的应用

IF 0.4 Q4 TELECOMMUNICATIONS
Ahmed H. Eltengy, H. Zied
{"title":"CryptoBin加密算法在军事上的应用","authors":"Ahmed H. Eltengy, H. Zied","doi":"10.21608/ijt.2021.266289","DOIUrl":null,"url":null,"abstract":": In recent years, there has been a significant increase in the use of location-based solutions. As a result, data encryption has become increasingly important in order to ensure privacy and confidentiality, especially in all domains, military and civil alike. This paper presents an application that will be used in both military and civilian situations, encrypting data on the location and movements of military personnel or civilian prospec-tors within a specific area using transmitting and receiving circuits controlled by a micro-controller programmed with the proposed encryption algorithm. The application will be used in both military and civilian settings. Depending on the task at hand or the nature of the immediate surroundings, the proposed application has been introduced, installed, and used in a variety of ways. The proposed technology has been tested in a variety of situa-tions and has produced excellent results in all of them. The suggested application is confi-dential, authenticated, and simple to use, according to the results of frequency, speed, and security testing; this has been demonstrated by the results of these tests.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"22 1","pages":""},"PeriodicalIF":0.4000,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Using CryptoBin Encryption Algorithm in Military Applications\",\"authors\":\"Ahmed H. Eltengy, H. Zied\",\"doi\":\"10.21608/ijt.2021.266289\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": In recent years, there has been a significant increase in the use of location-based solutions. As a result, data encryption has become increasingly important in order to ensure privacy and confidentiality, especially in all domains, military and civil alike. This paper presents an application that will be used in both military and civilian situations, encrypting data on the location and movements of military personnel or civilian prospec-tors within a specific area using transmitting and receiving circuits controlled by a micro-controller programmed with the proposed encryption algorithm. The application will be used in both military and civilian settings. Depending on the task at hand or the nature of the immediate surroundings, the proposed application has been introduced, installed, and used in a variety of ways. The proposed technology has been tested in a variety of situa-tions and has produced excellent results in all of them. The suggested application is confi-dential, authenticated, and simple to use, according to the results of frequency, speed, and security testing; this has been demonstrated by the results of these tests.\",\"PeriodicalId\":42285,\"journal\":{\"name\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"volume\":\"22 1\",\"pages\":\"\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2021-12-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Interdisciplinary Telecommunications and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21608/ijt.2021.266289\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Interdisciplinary Telecommunications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/ijt.2021.266289","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

近年来,基于位置的解决方案的使用显著增加。因此,为了确保隐私和机密性,数据加密变得越来越重要,特别是在所有领域,军事和民用都一样。本文提出了一种将用于军事和民用情况的应用,在特定区域内使用由微控制器控制的发送和接收电路对军事人员或民用勘探者的位置和运动进行加密。该应用程序将在军事和民用环境中使用。根据手头的任务或周围环境的性质,建议的应用程序已经以各种方式引入、安装和使用。所提出的技术已经在各种情况下进行了测试,并在所有情况下都产生了出色的结果。根据频率、速度和安全性测试的结果,建议的应用程序是保密的、经过身份验证的、易于使用的;这些试验的结果证明了这一点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Using CryptoBin Encryption Algorithm in Military Applications
: In recent years, there has been a significant increase in the use of location-based solutions. As a result, data encryption has become increasingly important in order to ensure privacy and confidentiality, especially in all domains, military and civil alike. This paper presents an application that will be used in both military and civilian situations, encrypting data on the location and movements of military personnel or civilian prospec-tors within a specific area using transmitting and receiving circuits controlled by a micro-controller programmed with the proposed encryption algorithm. The application will be used in both military and civilian settings. Depending on the task at hand or the nature of the immediate surroundings, the proposed application has been introduced, installed, and used in a variety of ways. The proposed technology has been tested in a variety of situa-tions and has produced excellent results in all of them. The suggested application is confi-dential, authenticated, and simple to use, according to the results of frequency, speed, and security testing; this has been demonstrated by the results of these tests.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
27
期刊介绍: The International Journal of Interdisciplinary Telecommunications and Networking (IJITN) examines timely and important telecommunications and networking issues, problems, and solutions from a multidimensional, interdisciplinary perspective for researchers and practitioners. IJITN emphasizes the cross-disciplinary viewpoints of electrical engineering, computer science, information technology, operations research, business administration, economics, sociology, and law. The journal publishes theoretical and empirical research findings, case studies, and surveys, as well as the opinions of leaders and experts in the field. The journal''s coverage of telecommunications and networking is broad, ranging from cutting edge research to practical implementations. Published articles must be from an interdisciplinary, rather than a narrow, discipline-specific viewpoint. The context may be industry-wide, organizational, individual user, or societal. Topics Covered: -Emerging telecommunications and networking technologies -Global telecommunications industry business modeling and analysis -Network management and security -New telecommunications applications, products, and services -Social and societal aspects of telecommunications and networking -Standards and standardization issues for telecommunications and networking -Strategic telecommunications management -Telecommunications and networking cultural issues and education -Telecommunications and networking hardware and software design -Telecommunications investments and new ventures -Telecommunications network modeling and design -Telecommunications regulation and policy issues -Telecommunications systems economics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信