22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

473<br />

be increased twofold. The time of data generation using a single thread amounts<br />

to ca. 1.5 minutes, whereas the average time of a set generation using 2 threads<br />

is reduced by half.<br />

Afterwards, the encryption performance <strong>and</strong> shortening of files containing<br />

sequences of pseudo-r<strong>and</strong>om numbers was tested. In the encryption time, the files<br />

are saved in blocks of a few hundred bytes on the disk. As the main problem<br />

consists in the saving time of a large number of short blocks to a disk, the increase<br />

in the generation threads number does not improve the generation station<br />

performance.<br />

VI. Conclusions<br />

Although the test comprised merely a few performance metrics, it was sufficient<br />

to confirm that the processes complicated in terms of calculation are prone<br />

to turning parallel <strong>and</strong> improving the generation time. Poorer results were obtained<br />

for operations that required saving of large amount of data to a disk. It seems<br />

that it will be possible to eliminate the restriction through the use of its buffering<br />

in the operational memory.<br />

The CDGC st<strong>and</strong> was installed on a multi-core computer using the parallel<br />

cryptographic material generation method. This solution is well suited to be used<br />

in cryptographic data generation systems for the currently operated <strong>and</strong> future<br />

communication networks. This will allow for increasing their performance several<br />

times. At the same time, this method will not deteriorate the security of the generated<br />

data, what is more, it will improve it by being able to perform additional<br />

procedures to verify this data, e.g. constant testing of the r<strong>and</strong>om sequence quality<br />

derived from the r<strong>and</strong>om generator.<br />

References<br />

[1] J. Kirk, Estonia recovers from Massie denial of service attack, IDG News Service,<br />

Inforworld, http://www.infoworld.com/article/07/05/17/estonia-denial-of-serviceattack_1.html,<br />

May 17, 2007.<br />

[2] C. Wilson, Computer Attack <strong>and</strong> Cyberterrorism: Vulnerabilities <strong>and</strong> Policy Issues<br />

for Congress, CRS Report RL32114, Updated April 1, 2005, p. 18.<br />

[3] N. Granado, G. White, Cyber security <strong>and</strong> government fusion center, Center for<br />

Infrastructure Assurance <strong>and</strong> Security, The University of Texas at San Antonio, 41st<br />

International Conference on System Science, Hawaii 2008.<br />

[4] October Cyberattacks on Pol<strong>and</strong>, www.rp.pl/artykul/2,375962_Cyberatak_ na_Polske.<br />

html, 2009.<br />

[5] A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Applied cryptography, WNT 2005.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!