22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Improving the Efficiency of Cryptographic<br />

Data Management by Using an Adaptive<br />

Method of Planning<br />

Tomasz Czajka, Wojciech Oszywa, Michał Gawroński, Rafał Gliwa<br />

Cryptology Department, <strong>Military</strong> Communication Institute, Zegrze, Pol<strong>and</strong>,<br />

{t.czajka, w.oszywa, m.gawronski, r.gliwa}@wil.waw.pl<br />

Abstract: The Electronic Cryptographic Data Management System (ECDMS) is designed for secure<br />

<strong>and</strong> correct preparation of cryptographic data. The process of preparation consists of three stages<br />

generally: planning of secure connections, generation of required keys <strong>and</strong> distribution of produced<br />

data to points of exploitation. These steps have to be perform sequentially. The planning can be realized<br />

by “according to needs” or “each to each” method. First method is inconvenient in use while<br />

second one extends time of data generation significantly. However the distribution process takes still<br />

the most of time. Till now distribution was realized by couriers. Nowadays, thanks to available secure<br />

telecommunication infrastructure, distribution can be realized in electronic way. A replacement<br />

of courier distribution with electronic one enables to improve efficiency <strong>and</strong> flexibility of ECDMS.<br />

Time of delivery data to devices is negligibly short <strong>and</strong>, in consequence, processes of planning <strong>and</strong><br />

generation became a bottle neck in this case. In the article we will prove that in extreme situations<br />

method “according to needs” is impracticable <strong>and</strong> use of “each to each” method causes that time of data<br />

generation is unacceptably long. In answer to these difficulties we propose new method of secure<br />

connections planning called adaptive method. It combines advantages of two previous methods <strong>and</strong><br />

eliminates disadvantages. One, crucial requirement for using this method is availability of communication<br />

infrastructure that will allow ECDMS to monitor work of supported devices.<br />

Keywords: Cryptographic data management, key generation, adaptive method<br />

I. Introduction<br />

A correct operation of data protection systems depends on an appropriate<br />

preparation of cryptographic data. There are special dedicated systems, called<br />

Electronic Cryptographic Data Management Systems (ECDMS), which are responsible<br />

for realization of this goal. An example of such system is commonly<br />

known American EKMS i.e. Electronic Key Management System. The specific tasks<br />

of the ECDMS can be very different <strong>and</strong> depend on the requirements of the concrete<br />

data protection system. Additionally, development of data protection systems<br />

implies the need of increasing an efficiency of ECDMS.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!