Abstract
In this paper, we would discuss a bit more how cyber technologies operate in a physical way and why it's important to understand the limitations of a physical reality. So commonly - mathematical terms would get assumed as abstract - so they could be considered as somehow perfect. On the other hand, the reality would offer many boundaries and obstacles that should be avoided or better explained. As it's known, cyber technologies belong to digital systems containing so many electronic components that would have their physical performances. Those performances as well as the entire cyber defense of such digital technologies would be analyzed deeper through this effort.
Publisher
Centre for Evaluation in Education and Science (CEON/CEES)
Reference30 articles.
1. Cheng H, Ding Q, Overview of the Block Cipher, in Proc. Second International Conference on Instrumentation, Measurement, Computer, Communication and Control, Harbin, China, pp. 1628-1631, 2012;
2. Geler J. Designing and Developing 802.1 1n Wireless Networks, Cisco Systems Inc., 2010;
3. C.-W. Phan R, Umar Siddiqi M. A Framework for Describing Block Cipher Cryptanalysis, IEEE Transactions on Computers, 55(11):1402-1409, 2006;
4. Stallings W. Cryptography and Network Security: Principles and Practice, Prentice-Hall, Inc., New Jersey, 1999;
5. Ronald J. T, Widmer NS. Digital Systems - Principles and Applications, Prentice-Hall International, Inc., 1998;