مطالب مرتبط با کلیدواژه

Encryption


۱.

The Safavid Dynasty and Chronogram

نویسنده:

کلیدواژه‌ها: chronogram History The Safavids Encryption

حوزه‌های تخصصی:
تعداد بازدید : ۴۹۵ تعداد دانلود : ۳۳۱
Chronogram is the conversion of numbers and figures of history into letters, words and terms. Due to its development and growth, especially in the Safavid period, this technique has become a complex form and has gradually attracted politicians` attention and has been used directly in historical developments to prove their legitimacy, as well as their confrontation against their opponents. The use of the chronogram and the attempt to reconcile it with the rise of the Safavids, the accession of Shah Ismail, the formation of Shah Tahmasb's army, some of the Indian conquests during the reign of Shah Abbas and accession of Nader are some of these historical approaches which will be discussed in this study. In addition to stating a specific part of history, some of these chronograms, also indirectly reveal some hidden social and historical issues that can be used in historical analysis.
۲.

Quantum Cryptography in Telecommunications as a New Era of Secure Communications(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Quantum cryptography telecommunications quantum key distribution (QKD) secure communications data security quantum-resistant algorithms Encryption Cyber Threats quantum mechanics post-quantum cryptography

حوزه‌های تخصصی:
تعداد بازدید : ۲۶ تعداد دانلود : ۲۶
Background: Quantum Key Distribution (QKD) has turned into a crucial point for secure communication in the era of quantum networks. Quantum key distribution provides the client with a theoretically secure key by taking advantage of the principles of quantum mechanics to counteract what could be posed by quantum computing to classical cryptography. Photons are lost in the system and there are some limitations which don’t allow scalability and integration with already existing networks. Objective: The study seeks to assess the viability of QKD systems, review some of the challenges associated with it, and investigate possible methods of utilizing both QKD and PQC to cope with new security threats in telecommunication industry. Methods: An in-depth analysis was made based on the experimental observations of key generation rates, photon loss, error correction, data throughput, and latency. Performance of quantum repeaters was experimented with for the purposes of measuring distance improvement abilities. A combined QKD-PQC approach was assessed for integrated integration for restricted settings. Results: QKD was seen to have high security and high performance in short distances and when quantum repeaters were implemented the distance could be greatly enhanced. In the QKD-PQC model, the rate of error correction, throughput, and scalability was noticed to be higher than in standalone QKD. Challenges that faced the work were photon loss, processing latency, and system vulnerabilities. Conclusion: New opportunities for secure communication are opened with QKD supported by quantum repeaters and hybrid cryptographic approaches. The technical and operational issues need to be resolved to realize the potential role of B3G evolution in enabling global telecommunications for the mass market.