22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

477<br />

keys exchange enhances security <strong>and</strong> it is an opportunity to reconfigure<br />

the system;<br />

– cryptographic relations are established according to the needs known<br />

at the time of planning. In the moment keys comes to use or during<br />

the validity period, these needs may change. It must be possible to<br />

join the system devices that were not included in the communication<br />

plan. For this purpose, sets of spare data are prepared. Spare data, after<br />

uploading the devices, enable secret communication with all other devices:<br />

working or spare;<br />

– relations key should be supplied to the operation places in a reliable <strong>and</strong><br />

secure way before beginning of validity period, which they have been<br />

prepared for, starts.<br />

From above assumptions it follows that ECDMS performs the tasks associated<br />

with planning, generation <strong>and</strong> distribution of cryptographic data. These processes<br />

must be executed sequentially. Result of one stage constitutes the input for<br />

the next stage. But the entire life cycle of the key includes the following key stages:<br />

needs analysis, preparation, waiting for entry to use, activation, work: session<br />

keys generation, deactivation, archiving or destruction. The process of preparing<br />

the data can be presented in a transparent way on the timeline. The essential<br />

points are: the beginning <strong>and</strong> end of the validity period (B <strong>and</strong> E), the beginning<br />

<strong>and</strong> end of the data preparation process (Bp <strong>and</strong> Ep). The period between Bp <strong>and</strong><br />

B is designed to analyze the needs for secure communications to the next period.<br />

The period between Ep <strong>and</strong> E is the reserved time required against unexpected<br />

events. The shorter time of data preparation compared to the length of the validity<br />

period, the management is more flexible. During validity period the following<br />

steps are held simultaneously: data preparation for a future, using current data <strong>and</strong><br />

destruction of the previous keys.<br />

III. Efficiency<br />

Speed of processing can be regarded as the measure of efficiency. The speed<br />

is connected with the time of the processing. Because of planning, generation<br />

<strong>and</strong> distribution are realized sequentially the time of date preparation is equal to<br />

total time of component processes. Time of planning depends on the planning<br />

method one applies: “according to the needs” or “each to each”. Time of generation<br />

depends on the number of established relations <strong>and</strong> the throughput of the source<br />

of keys – usually hardware r<strong>and</strong>om generator. Time of distribution depends<br />

on the kind of the distribution method, which can be courier (traditional) or<br />

electronic one.<br />

The kind of distribution is very essential for future conside-rations. In the case<br />

of the courier distribution, cryptographic data are delivered to the points of exploitation<br />

by persons (couriers). This process can last from several days to several

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!