Research Article

An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One

Figure 4

Numerical examples related to Theorem 7: illustration of the security gain implied by a binary channel with embedding of random bits noting that smaller means higher security enhancement.