22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

478 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

weeks depending on number of couriers, number of served devices <strong>and</strong> devices<br />

network topology. In the case of the electronic distribution, secure communication<br />

infrastructure used to transfer of the data is available. So the time of the distribution<br />

can be treat as negligible in this case.<br />

The graphs presented in Fig. 2 show the example of timing dependencies<br />

of the whole process of the data preparation in case of courier (1) <strong>and</strong> electronic<br />

distribution (2).<br />

The mutual proportions of the time of planning <strong>and</strong> time of generation can be<br />

different depending on the applied method of the planning. However in the first<br />

case their total time will certainly be much smaller than the time of courier distribution.<br />

The efficiency of planning <strong>and</strong> generation have no bigger meaning, because<br />

the distribution is the bottleneck.<br />

In second case, the whole process of the data preparation become significantly<br />

shorter. In this situation new profitable possibilities appear (presented<br />

in Fig. 3): giving more time for analysis process <strong>and</strong> shortening the validity period.<br />

The second solution increases security for data protection system. In both<br />

solutions the planning is more effective because the needs for cryptographic<br />

relations known at the beginning of planning are more adequate to real needs<br />

existing in the moment of introducing the keys to use. In this case the planning<br />

<strong>and</strong> generation become bottleneck.<br />

It is necessary to determine if optimization of planning time <strong>and</strong> generation<br />

time is possible. Let’s begin from generation process. The total time of generation<br />

is equal to the product of generation time of single key <strong>and</strong> number of required<br />

keys. The time of generation of single key follows from the property of r<strong>and</strong>om<br />

generator <strong>and</strong>, for concrete solutions, is a fixed value. Let’s assume that generation<br />

of one key lasts 1 second.<br />

Figure 1. Life cycle of cryptographic data<br />

Figure 2. Timing dependencies in process of data preparation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!