Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...

22.01.2015 Views

468 Military Communications and Information Technology... the information relations will be less in number than it results from the simple calculation being 867*866/2 = 375 411. Unfortunately, the amount of cryptographic data needed to ensure the system security will be equal to the number of information relations (assuming the symmetric encryption methods). The calculation of information relations is presented in Table 1. The number of information relations is not as dramatically high as for the “peer-to-peer” system, nevertheless their number amounts to nearly 20 thousand. Table I. Estimation of information relations in a system No. Relations Calculations Subtotal 1 Central (57*56)/2 +(57*15)/2 + (15*14)/2 2128 2 Including voivodeship level 2128*16 17024 3 Voivodeship relations (11+15)*16 208 4 Between voivodeships (16*15)/2 120 5 Voivodeship-poviat relations 16*24/2 193 Total 19673 III. Generation of cryptographic data for large IT systems The cryptographic information generation subsystem for special networks consists of one or several combined computer station. These center perform various functions within a system: • Center for Special Network Planning and Cryptographic Data Distribution. Proper functioning of a secret data information system requires designing of a network made up of encryption devices and software as well as providing cryptographic data to every device and user (keys, passwords). This operation is carried out regularly at certain time intervals (every few/ several months). When planning, the need to immediately generate data in particular emergency situations should be taken into account. Once generated, the cryptographic data should be combined into sets and distributed to loading stands or directly to the devices. The data ought to be delivered in a safe manner, so as to preclude its disclosure and unauthorized modification. • Cryptographic Data Generation Center (CDGC). The station serves the cryptographic data generation for every cryptographic device operating within a communication network. The data is secured within the distribution period.

Chapter 4: Information Assurance & Cyber Defence 469 Figure 2. Cryptographic Data Generation Model The Cryptographic Information Generation Center is most often built based on a personal computer with attached external devices such as the hardware random sequence generator, order station and data preparation for distribution in the system (Fig. 2). Cryptographic Data Generation Center should generate data necessary for the operation of various cryptographic algorithms such as coding, message signing and different passwords for cryptographic devices and systems. IV. Types of cryptographic data generation testbeds Cryptographic data sequential generation station In presently applied implementations, cryptographic data is generated sequentially, which results in a relatively long period of its generation for the entire network (Fig. 3). In a sequential model, it is necessary to perform random sequence generation processes. It is also needed to test it in terms of statistics, cryptographic key generation for information relations, relation keys protection and secure storage of the keys on data carriers. Many of these operations may be executed parallel. Figure 3. Components of a Data Sequential Generation Testbed Cryptographic data parallel generation station

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

469<br />

Figure 2. Cryptographic Data Generation Model<br />

The Cryptographic <strong>Information</strong> Generation Center is most often built based<br />

on a personal computer with attached external devices such as the hardware<br />

r<strong>and</strong>om sequence generator, order station <strong>and</strong> data preparation for distribution<br />

in the system (Fig. 2).<br />

Cryptographic Data Generation Center should generate data necessary for<br />

the operation of various cryptographic algorithms such as coding, message signing<br />

<strong>and</strong> different passwords for cryptographic devices <strong>and</strong> systems.<br />

IV. Types of cryptographic data generation testbeds<br />

Cryptographic data sequential generation station<br />

In presently applied implementations, cryptographic data is generated sequentially,<br />

which results in a relatively long period of its generation for the entire<br />

network (Fig. 3). In a sequential model, it is necessary to perform r<strong>and</strong>om sequence<br />

generation processes. It is also needed to test it in terms of statistics, cryptographic<br />

key generation for information relations, relation keys protection <strong>and</strong> secure storage<br />

of the keys on data carriers. Many of these operations may be executed parallel.<br />

Figure 3. Components of a Data Sequential Generation Testbed Cryptographic data parallel<br />

generation station

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!