Показать сокращенную информацию
dc.contributor.author | Sidorov V. | |
dc.contributor.author | Karpov A. | |
dc.contributor.author | Korneev V. | |
dc.contributor.author | Nasyrov A. | |
dc.date.accessioned | 2018-09-18T20:35:12Z | |
dc.date.available | 2018-09-18T20:35:12Z | |
dc.date.issued | 2007 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/141403 | |
dc.description.abstract | We show that peculiar properties of meteor wave propagation allow construction of radio channel that may deliver transfer of data with theoretically perfect protection from eavesdropping. Method uses natural stochastic process that is generated only for two communicating participants so that it is not available for possible cryptanalysis. Possible eavesdropper can not reproduce measurements that have been performed by participants at their particular locations, due to mirror-like channel properties and random positions of each meteor trail. The suggested method of data protection can be used, for example, for theoretically absolutely secure way of key exchange. © 2007 IEEE. | |
dc.title | Meteor time transfer and meteor cryptography | |
dc.type | Conference Paper | |
dc.collection | Публикации сотрудников КФУ | |
dc.relation.startpage | 315 | |
dc.source.id | SCOPUS-2007-SID51049106376 |