Page 62 - Cyber Warnings
P. 62







encryption are unique. At this stage the ESIS Encryption Law has been formulated completely
which no doubly opens limitless possibilities in this field of mathematics and binary logics.


Discussions

All the findings and results provided in this article could be used for the real cryptographic
purposes. For instance, using proposed algorithms or the knowledge about this law, it would be
possible to design hardware for encryption or even develop software for that purposes. This
could be the beginning of the big project which would be governed by results provided into this
study. In the future, maybe this idea could be used for development of some communication
protocol which would be cryptographically protected using such or similar algorithms and rules.
In other words, all the results given here have a strong practical meaning and could be used for
technical, engineering and programming purposes.

Conclusion

In conclusion, the field of discrete mathematics is the exciting one. There are a lot of
information and knowledge waiting for us to discover them. I strongly encourage all the future
researchers and scientists to spend some time examining and testing logical functions, because
their results could find great applications in cryptography, digital systems or even computer
science.
References:

[1] Hai Cheng, Qun Ding, 2012, Overview of the Block Cipher, IEEE Proceedings
[2] Jim Geler, 2010, Designing and Developing 802.11n Wireless Networks, Cisco Systems Inc.
[3] Raphael C.-W. Phan, 2006, A Framework for Describing Block Cipher Cryptanalysis, IEEE
Transactions on Computers
[4] William Stallings, 1999, Cryptography and Network Security: Principles and Practice,
Prentice-Hall, Inc., New Jersey
[5] Ronald J. Tocci & Neal S. Widmer, 1998, Digital Systems – Principles and Applications,
Prentice-Hall International, Inc.
[6] Yan Zhang, Jijun Luo, Honglin Hu, 2007, Wireless Mesh Networking: Architectures,
Protocols and Standards, Taylor & Francis Group, New York

About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia.

She also serves as a Reviewer at the Journal of Computer Sciences and
Applications and. She writes for American and Asia-Pacific security
magazines. She is a volunteer with the American corner of Subotica as well as a lecturer with
the local engineering society.

62 Cyber Warnings E-Magazine – March 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   57   58   59   60   61   62   63   64   65   66   67