In China, the trading of construction land quotas has undergone an institutional evolution process characterized by gradual deregulation.In 2021, the Central Committee of the Communist Party of China(CPC) resolved to ...In China, the trading of construction land quotas has undergone an institutional evolution process characterized by gradual deregulation.In 2021, the Central Committee of the Communist Party of China(CPC) resolved to develop a national cross-regional trading mechanism for construction land quotas.Construction land quotas, which have attributes of both public power and private rights, share certain common grounds with the rights of land development, dumping and carbon emission.To build a national trading market for construction land quotas, it is necessary to make clarifications and innovations in macro-level ideas, meso-level mechanisms, and micro-level designs.展开更多
In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext ot...In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples.展开更多
基金a phased research achievement of Sichuan's social science programming project in 2019 titled“Overall Planning of Public Power and Expression of Private Rights in Inter-provincial Trading of Construction Land Quotas of Impoverished Regions”(project number:SC19B093)。
文摘In China, the trading of construction land quotas has undergone an institutional evolution process characterized by gradual deregulation.In 2021, the Central Committee of the Communist Party of China(CPC) resolved to develop a national cross-regional trading mechanism for construction land quotas.Construction land quotas, which have attributes of both public power and private rights, share certain common grounds with the rights of land development, dumping and carbon emission.To build a national trading market for construction land quotas, it is necessary to make clarifications and innovations in macro-level ideas, meso-level mechanisms, and micro-level designs.
基金This project was funded by the Deanship of Scientific Research(DSR),King Abdul-Aziz University,Jeddah,Saudi Arabia under Grant No.(D-63-611-1442).
文摘In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples.