4 resultados para AVALANCHE PHOTODIODES

em Cochin University of Science


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Chemical bath deposition (CBD)is one of the simplest, very convient and probably the cheapest method for thin film preparation. Photovoltaic is the cleanest and the most efficient mode of conversion of energy to electrical power. Silicon is the most popular material in this field. The present study on chemical bath deposited semiconducting copper selenide and iron sulfide thin films useful for photovoltaic applications. Semiconducting thin films prepared by chemical deposition find applications as photo detectors, solar control coatings and solar cells. Copper selenide is a p-type semiconductor that finds application in photovolitics. Several heterojunction systems such as Cu2-xSe/ZnSe (for injection electro luminescence), Cu2Se/AgInSe2 and Cu2Se/Si (for photodiodes), Cu2-xSe/CdS, Cu2-xSe/CdSe, CuxSe/InP and Cu2-xSe/Si for solar cells are reported. A maximum efficiency of 8.3% was achieved for the Cu2-xSe/Si cell, various preparation techniques are used for copper selenide like vacuum evaporation, direct reaction, electrodeposition and CBD. Instability of the as-prepared films was investigation and is accounted as mainly due to deviation from stoichiometry and the formation of iron oxide impurity. A sulphur annealing chamber was designed and fabricated for this work. These samples wee also analysed using optical absorption technique, XPS (X-ray Photoelectron Spectroscopy) and XRD.(X-Ray Diffraction).The pyrite films obtained by CBD technique showed amorphous nature and the electrical studies carried out showed the films to be of high resistive nature. Future work possible in the material of iron pyrite includes sulphur annealing of the non-stochiometric iron pyrite CBD thin films in the absence of atmospheric oxygen

Relevância:

10.00% 10.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Determining the morphological parameters that describe galaxies has always been a challenging task. The studies on the correlations between different photometric as well as spectroscopic parameters of the galaxies help in understanding their structure, properties of the stars and gas which constitute the galaxy, the various physical and chemical processes which determine the properties, and galaxy formation and evolution. In the last few decades, the advent of Charge Coupled Devices (CCDs) and near infrared arrays ha\·e provided quick and reliable digitized data acquisition, in the optical and near infrared bands. This has provided an avalanche of data, which can be processed using sophisticated image analysis techniques to obtain information about the morphology of galaxies. The photometric analysis performed in this thesis involve the extraction of structural parameters of early type gala.xies imaged in the near infrared K (2.2ttm) band, obtaining correlations between these, parameters and using them to constrain the large scale properties of galaxi,~s.