5 resultados para split message

em Cochin University of Science


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, microstrip lines magnetically coupled to splitring resonators (SRRs) are conquved to electromagnetic bundgup (EBG) nr,rrostrip lines in terns q/ their stop-heard penjbrnmrnce and dimensions. In bath types o/ trunsmis•siou lines, signal propagation is inhibited in it certain jequency bwuL For EBG microstrip lines, the central frequency of such a forbidden band is determined by the period of the structure, whereas in SRR-hased microstrip lines the position of the frequency gap depends on the quasi-static resonant frequency of the rings. The main relevant conrributiun of this paper is to provide a tuning procedure to control the gap width in SRR microstrip lines, and to show that by using SRRs, device dimensions ale much smaller than those required by EBGs in order to obtain similar stop-banal performance. This has been demonstrated by fill-wave electromagnetic simulations and experimentally verified from the characterization ql two fabricated microstrip lines: one with rectangular SRRs etched on the upper substrate side, and the other with a periodic perturbation cf'strip width. For similar rejection and 1-(;H,. gap width centered at 4.5 Gllz, it has been found that the SRR microstrip line is•,fve times shorter. In addition, no ripple is appreciable in the allowed band for the .SRR-hared structure, whereas due to dispersion, certain mismatch is expected in the EBG prototype. Due to the high-frequency selectivity, controllable gap width, and small dimensions, it is believed that SRR coupled to planar transmission lines can have an actual impact on the design of stop-band filters compatible with planar technology, and can be an alternative to present solutions based on distributed approaches or EBG

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electric permittivity and magnetic permeability control electromagnetic wave propagation th rough materials. I n naturally occu rring materials, these are positive. Artificial materials exhi b iting negative material properties have been reported : they are referred to as metamaterials. This paper concentrates on a ring-type split-ring resonator (SRR) exhibiting negative magnetic permeability. The design and synthesis of the SRR using the genetic-algorithm approach is explained in detail. A user-friendly g raphical user i nterface (G U I ) for an SRR optim izer and estimator using MATLAB TM is also presented