Photovoltaic power stationA photovoltaic power station, also known as a solar park, solar farm, or solar power plant, is a large-scale grid-connected photovoltaic power system (PV system) designed for the supply of merchant power. They are different from most building-mounted and other decentralized solar power because they supply power at the utility level, rather than to a local user or users. Utility-scale solar is sometimes used to describe this type of project.
Growth of photovoltaicsBetween 1992 and 2022, the worldwide usage of photovoltaics (PV) increased exponentially. During this period, it evolved from a niche market of small-scale applications to a mainstream electricity source. When solar PV systems were first recognized as a promising renewable energy technology, subsidy programs, such as feed-in tariffs, were implemented by a number of governments in order to provide economic incentives for investments. For several years, growth was mainly driven by Japan and pioneering European countries.
Multi-junction solar cellMulti-junction (MJ) solar cells are solar cells with multiple p–n junctions made of different semiconductor materials. Each material's p-n junction will produce electric current in response to different wavelengths of light. The use of multiple semiconducting materials allows the absorbance of a broader range of wavelengths, improving the cell's sunlight to electrical energy conversion efficiency. Traditional single-junction cells have a maximum theoretical efficiency of 33.16%.
Solar inverterA solar inverter or photovoltaic (PV) inverter is a type of power inverter which converts the variable direct current (DC) output of a photovoltaic solar panel into a utility frequency alternating current (AC) that can be fed into a commercial electrical grid or used by a local, off-grid electrical network. It is a critical balance of system (BOS)–component in a photovoltaic system, allowing the use of ordinary AC-powered equipment.
Organic semiconductorOrganic semiconductors are solids whose building blocks are pi-bonded molecules or polymers made up by carbon and hydrogen atoms and – at times – heteroatoms such as nitrogen, sulfur and oxygen. They exist in the form of molecular crystals or amorphous thin films. In general, they are electrical insulators, but become semiconducting when charges are either injected from appropriate electrodes, upon doping or by photoexcitation. In molecular crystals the energetic separation between the top of the valence band and the bottom conduction band, i.
Public key infrastructureA public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email.
Key sizeIn cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), because the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the algorithm's design does not detract from the degree of security inherent in the key length).
Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
Key exchangeKey exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. If the sender and receiver wish to exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt messages received. The nature of the equipping they require depends on the encryption technique they might use. If they use a code, both will require a copy of the same codebook. If they use a cipher, they will need appropriate keys.