Military Communications and Information Technology: A Trusted ...
Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...
Effective Generation of Cryptographic Material for Large Hierarchical Communication Networks Marcin Grzonkowski 1 , Jacek Jarmakiewicz 2 , Wojciech Oszywa 2 1 Cryptography Division, MCI, Zegrze, Poland, m.grzonkowski@wil.waw.pl 2 Communication Systems Division, C4I Systems, MUT – MCI, Warszawa, Poland, jjarmakiewicz@wat.edu.pl, j.jarmakiewicz@wil.waw.pl Abstract: In this paper, the problem of increasing the efficiency of cryptographic material generation for communication networks of large IT systems is presented. As it results from the conducted tests, it is possible to improve the performance of the cryptographic data generation several times, after multi-core/multi-process computer systems are applied and appropriate parallel cryptographic data generation system is designed. The IT network class described in the paper corresponds to, e.g. a system for the public administration purposes, where numerous IT relations between the system components within the superior-subordinate relationship are present. Keywords: electronic key management systems, parallel key generation I. Introduction Experiences related to cyber-attacks on information systems of various countries (Georgia, Estonia, Germany, Great Britain) indicate that the destabilization of information services has a real impact on national security and the public [1-7]. Organized cyber-attacks are often stimulated by political forces which transfer international policy to cyber space which is characterized by not precisely defined aspects of responsibility for unauthorized operations [8]. The attacks resemble typical spy activities for the technical, military, political and economic spheres, which leads to real and critical national security threats. The examples of unauthorized operation sources include cyber-spy organizations such as GostNet, Zeus, SpyEye [7]. Therefore, the security within the IT systems, in particular those that provide services to citizens, is very important. Information services of public administration authorities (PA) are particularly important in the context of public life and security of citizens, which is why actions aimed at ensuring the security of information flow in organized networks for the PA are necessary [6]. One of the effective manners for avoiding unauthorized information flow is to organize the data encryption in PA networks, thus eliminating the possibility of un-
- Page 413 and 414: Chapter 4: Information Assurance &
- Page 415 and 416: Methodology for Gathering Data Conc
- Page 417 and 418: Chapter 4: Information Assurance &
- Page 419 and 420: Chapter 4: Information Assurance &
- Page 421 and 422: Chapter 4: Information Assurance &
- Page 423 and 424: Chapter 4: Information Assurance &
- Page 425 and 426: Chapter 4: Information Assurance &
- Page 427 and 428: Chapter 4: Information Assurance &
- Page 429: Chapter 4: Information Assurance &
- Page 432 and 433: 432 Military Communications and Inf
- Page 434 and 435: 434 Military Communications and Inf
- Page 436 and 437: 436 Military Communications and Inf
- Page 439 and 440: On Multi-Level Secure Structured Co
- Page 441 and 442: Chapter 4: Information Assurance &
- Page 443 and 444: Chapter 4: Information Assurance &
- Page 445 and 446: Chapter 4: Information Assurance &
- Page 447 and 448: Chapter 4: Information Assurance &
- Page 449 and 450: Chapter 4: Information Assurance &
- Page 451 and 452: Chapter 4: Information Assurance &
- Page 453 and 454: Chapter 4: Information Assurance &
- Page 455 and 456: Generation of Nonlinear Feedback Sh
- Page 457 and 458: Chapter 4: Information Assurance &
- Page 459 and 460: Chapter 4: Information Assurance &
- Page 461 and 462: Chapter 4: Information Assurance &
- Page 463: Chapter 4: Information Assurance &
- Page 467 and 468: Chapter 4: Information Assurance &
- Page 469 and 470: Chapter 4: Information Assurance &
- Page 471 and 472: Chapter 4: Information Assurance &
- Page 473 and 474: Chapter 4: Information Assurance &
- Page 475 and 476: Improving the Efficiency of Cryptog
- Page 477 and 478: Chapter 4: Information Assurance &
- Page 479 and 480: Chapter 4: Information Assurance &
- Page 481 and 482: Chapter 4: Information Assurance &
- Page 483: Chapter 4: Information Assurance &
- Page 486 and 487: 486 Military Communications and Inf
- Page 488 and 489: 488 Military Communications and Inf
- Page 490 and 491: 490 Military Communications and Inf
- Page 492 and 493: 492 Military Communications and Inf
- Page 494 and 495: 494 Military Communications and Inf
- Page 497 and 498: Acoustic Steganographic Transmissio
- Page 499 and 500: Chapter 4: Information Assurance &
- Page 501 and 502: Chapter 4: Information Assurance &
- Page 503 and 504: Chapter 4: Information Assurance &
- Page 505 and 506: Chapter 4: Information Assurance &
- Page 507 and 508: Chapter 4: Information Assurance &
- Page 509: Index
- Page 512: 512 Military Communications and Inf
Effective Generation of Cryptographic Material<br />
for Large Hierarchical Communication Networks<br />
Marcin Grzonkowski 1 , Jacek Jarmakiewicz 2 , Wojciech Oszywa 2<br />
1 Cryptography Division, MCI, Zegrze, Pol<strong>and</strong>,<br />
m.grzonkowski@wil.waw.pl<br />
2 Communication Systems Division, C4I Systems, MUT – MCI, Warszawa, Pol<strong>and</strong>,<br />
jjarmakiewicz@wat.edu.pl, j.jarmakiewicz@wil.waw.pl<br />
Abstract: In this paper, the problem of increasing the efficiency of cryptographic material generation<br />
for communication networks of large IT systems is presented. As it results from the conducted<br />
tests, it is possible to improve the performance of the cryptographic data generation several times,<br />
after multi-core/multi-process computer systems are applied <strong>and</strong> appropriate parallel cryptographic<br />
data generation system is designed. The IT network class described in the paper corresponds to, e.g.<br />
a system for the public administration purposes, where numerous IT relations between the system<br />
components within the superior-subordinate relationship are present.<br />
Keywords: electronic key management systems, parallel key generation<br />
I. Introduction<br />
Experiences related to cyber-attacks on information systems of various countries<br />
(Georgia, Estonia, Germany, Great Britain) indicate that the destabilization<br />
of information services has a real impact on national security <strong>and</strong> the public [1-7].<br />
Organized cyber-attacks are often stimulated by political forces which transfer<br />
international policy to cyber space which is characterized by not precisely defined<br />
aspects of responsibility for unauthorized operations [8]. The attacks resemble typical<br />
spy activities for the technical, military, political <strong>and</strong> economic spheres, which<br />
leads to real <strong>and</strong> critical national security threats. The examples of unauthorized<br />
operation sources include cyber-spy organizations such as GostNet, Zeus, SpyEye [7].<br />
Therefore, the security within the IT systems, in particular those that provide<br />
services to citizens, is very important. <strong>Information</strong> services of public administration<br />
authorities (PA) are particularly important in the context of public life <strong>and</strong> security<br />
of citizens, which is why actions aimed at ensuring the security of information flow<br />
in organized networks for the PA are necessary [6].<br />
One of the effective manners for avoiding unauthorized information flow is to<br />
organize the data encryption in PA networks, thus eliminating the possibility of un-