13.07.2015 Views

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

communication package placed in orbit whose prime objective is to initiate orassist the communication transmission <strong>of</strong> information or a message from onepoint to another through space. The information transferred most <strong>of</strong>tencorresponds to voice (telephone), video (television), <strong>and</strong> digital data.As electronic forms <strong>of</strong> communication, commerce, <strong>and</strong> informationstorage <strong>and</strong> processing have developed, the opportunities to intercept <strong>and</strong> readconfidential information have grown, <strong>and</strong> the need for sophisticated encryptionhas increased. This chapter has also explained basic cryptographic techniques.Many newer cryptography techniques being introduced to the market arehighly complex <strong>and</strong> nearly unbreakable, but their designers <strong>and</strong> users alikecarefully guard their secrets.The use <strong>of</strong> satellites for communication has been steadily increasing,<strong>and</strong> more frontiers will be broken as advances in technology make systemproduction costs economical.REFERENCES1. Dressler, W. (1987). Satellite communications, in Siemens Telecom report, vol. 10.2. Meyer, C. <strong>and</strong> Matyas, S. (1982). Cryptography: A New Dimension in ComputerData Security. John Wiley.3. National Bureau <strong>of</strong> St<strong>and</strong>ards (1977). Data Encryption St<strong>and</strong>ard. Federal InformationProcessing St<strong>and</strong>ard, Publication 46, U.S. Dep. <strong>of</strong> Commerce.4. Diffie, W. <strong>and</strong> Hellman, M. (1976). New directions in cryptography, IEEETransactions on Communications Tech., 29:11, 644–654.5. Rivest, R., Shamir, A., <strong>and</strong> Adleman, L. (1978). A method for obtaining digitalsignatures <strong>and</strong> public-key cryptosystems, Communications for the ACM 21:2,120–126.6. McEliece, R. (1977). The theory <strong>of</strong> information <strong>and</strong> coding, in Encyclopedia <strong>of</strong>Mathematics <strong>and</strong> Its Applications. Addison-Wesley.7. Wu, W.W. (1985). Elements <strong>of</strong> Digital Satellite Communication. ComputerScience Press.PROBLEMS1. The role <strong>of</strong> telecommunications networks has changed over the last decade.(a) Discuss the role <strong>of</strong> telecommunications networks in modern society.(b) How has this changed your perception in terms <strong>of</strong> security, socialcohesion, <strong>and</strong> commerce?Copyright © 2002 by Marcel Dekker, Inc. All Rights Reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!