Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...

22.01.2015 Views

Effective Generation of Cryptographic Material for Large Hierarchical Communication Networks Marcin Grzonkowski 1 , Jacek Jarmakiewicz 2 , Wojciech Oszywa 2 1 Cryptography Division, MCI, Zegrze, Poland, m.grzonkowski@wil.waw.pl 2 Communication Systems Division, C4I Systems, MUT – MCI, Warszawa, Poland, jjarmakiewicz@wat.edu.pl, j.jarmakiewicz@wil.waw.pl Abstract: In this paper, the problem of increasing the efficiency of cryptographic material generation for communication networks of large IT systems is presented. As it results from the conducted tests, it is possible to improve the performance of the cryptographic data generation several times, after multi-core/multi-process computer systems are applied and appropriate parallel cryptographic data generation system is designed. The IT network class described in the paper corresponds to, e.g. a system for the public administration purposes, where numerous IT relations between the system components within the superior-subordinate relationship are present. Keywords: electronic key management systems, parallel key generation I. Introduction Experiences related to cyber-attacks on information systems of various countries (Georgia, Estonia, Germany, Great Britain) indicate that the destabilization of information services has a real impact on national security and the public [1-7]. Organized cyber-attacks are often stimulated by political forces which transfer international policy to cyber space which is characterized by not precisely defined aspects of responsibility for unauthorized operations [8]. The attacks resemble typical spy activities for the technical, military, political and economic spheres, which leads to real and critical national security threats. The examples of unauthorized operation sources include cyber-spy organizations such as GostNet, Zeus, SpyEye [7]. Therefore, the security within the IT systems, in particular those that provide services to citizens, is very important. Information services of public administration authorities (PA) are particularly important in the context of public life and security of citizens, which is why actions aimed at ensuring the security of information flow in organized networks for the PA are necessary [6]. One of the effective manners for avoiding unauthorized information flow is to organize the data encryption in PA networks, thus eliminating the possibility of un-

Effective Generation of Cryptographic Material<br />

for Large Hierarchical Communication Networks<br />

Marcin Grzonkowski 1 , Jacek Jarmakiewicz 2 , Wojciech Oszywa 2<br />

1 Cryptography Division, MCI, Zegrze, Pol<strong>and</strong>,<br />

m.grzonkowski@wil.waw.pl<br />

2 Communication Systems Division, C4I Systems, MUT – MCI, Warszawa, Pol<strong>and</strong>,<br />

jjarmakiewicz@wat.edu.pl, j.jarmakiewicz@wil.waw.pl<br />

Abstract: In this paper, the problem of increasing the efficiency of cryptographic material generation<br />

for communication networks of large IT systems is presented. As it results from the conducted<br />

tests, it is possible to improve the performance of the cryptographic data generation several times,<br />

after multi-core/multi-process computer systems are applied <strong>and</strong> appropriate parallel cryptographic<br />

data generation system is designed. The IT network class described in the paper corresponds to, e.g.<br />

a system for the public administration purposes, where numerous IT relations between the system<br />

components within the superior-subordinate relationship are present.<br />

Keywords: electronic key management systems, parallel key generation<br />

I. Introduction<br />

Experiences related to cyber-attacks on information systems of various countries<br />

(Georgia, Estonia, Germany, Great Britain) indicate that the destabilization<br />

of information services has a real impact on national security <strong>and</strong> the public [1-7].<br />

Organized cyber-attacks are often stimulated by political forces which transfer<br />

international policy to cyber space which is characterized by not precisely defined<br />

aspects of responsibility for unauthorized operations [8]. The attacks resemble typical<br />

spy activities for the technical, military, political <strong>and</strong> economic spheres, which<br />

leads to real <strong>and</strong> critical national security threats. The examples of unauthorized<br />

operation sources include cyber-spy organizations such as GostNet, Zeus, SpyEye [7].<br />

Therefore, the security within the IT systems, in particular those that provide<br />

services to citizens, is very important. <strong>Information</strong> services of public administration<br />

authorities (PA) are particularly important in the context of public life <strong>and</strong> security<br />

of citizens, which is why actions aimed at ensuring the security of information flow<br />

in organized networks for the PA are necessary [6].<br />

One of the effective manners for avoiding unauthorized information flow is to<br />

organize the data encryption in PA networks, thus eliminating the possibility of un-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!