10 research outputs found

    A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System

    Get PDF
    This paper presents a comparative evaluation of possible encryption algorithms for use in a self-contained, ultra-secure router-to-router communication system, first proposed by El Rifai and Verma. The original proposal utilizes a discrete logarithm-based encryption solution, which will be compared in this paper to RSA, AES, and ECC encryption algorithms. RSA certificates are widely used within the industry but require a trusted key generation and distribution architecture. AES and ECC provide advantages in key length, processing requirements, and storage space, also maintaining an arbitrarily high level of security. This paper modifies each of the four algorithms for use within the self-contained router-to-router environment system and then compares them in terms of features offered, storage space and data transmission needed, encryption/decryption efficiency, and key generation requirements

    Design of Acousto-optic Chaos Based Secure Free-space Optical Communication Links

    Get PDF
    We discuss the design of an acousto-optic cell based free space optical communication link where the data beam is made secure through chaos encryption. Using external signal modulation of the diffracted light from a hybrid acousto-optic cell chaos (or directly via incorporation in the sound-cell driver\u27s bias voltage) encryption of data is possible. We have shown numerically that decryption of the encoded data is possible by using an identical acousto-optic system in the receiver

    Isdn systems architecture, technology and applications

    No full text

    The third international conference on computer communication

    No full text

    Impact of Bimodal Traffic on Latency in Optical Burst Switching Networks

    Get PDF
    This paper analyzes the impact of bimodal traffic composition on latency in optical burst switching networks. In particular, it studies the performance degradation to short-length packets caused by longer packets, both of which are part of a heterogeneous traffic model. The paper defines a customer satisfaction index for each of the classes of traffic, and a composite satisfaction index. The impact of higher overall utilization of the network as well as that of the ratio of the traffic mix on each of the customer satisfaction indices is specifically addressed

    Impact of Topology on the Performance of Communication Networks

    No full text
    Abstract-This paper investigates the implications of topologies on the average path length of networks, which is the dominant parameter affecting performance. Based on the available literature, classic network topologies are reviewed and analyzed. Furthermore, a new class of communication networks is introduced, and a topology design algorithm is proposed to improve network performance in terms of average path length

    A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System

    No full text
    This paper presents a comparative evaluation of possible encryption algorithms for use in a self-contained, ultra-secure routerto-router communication system, first proposed by El Rifai and Verma. The original proposal utilizes a discrete logarithm-based encryption solution, which will be compared in this paper to RSA, AES, and ECC encryption algorithms. RSA certificates are widely used within the industry but require a trusted key generation and distribution architecture. AES and ECC provide advantages in key length, processing requirements, and storage space, also maintaining an arbitrarily high level of security. This paper modifies each of the four algorithms for use within the self-contained router-to-router environment system and then compares them in terms of features offered, storage space and data transmission needed, encryption/decryption efficiency, and key generation requirements
    corecore