Military Communications and Information Technology: A Trusted ...
Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...
480 Military Communications and Information Technology... economy, business, daily life etc. But generally it states that roughly 80% of the effects come from 20% of the causes. Table I. Time of generation in each to each method Number of devices Time of data generation 100 1 h 22 min. 200 5, 5 h 500 34 h 40 min. 1000 5 days 8 h 2000 23 days 5000 145 days Applying this rule to communication system we can assume, that from point of view of single user, 80% realized connections are addressed to only 20% of other users. For the simplification of further considerations let’s assume that each user communicates with only 20% of other users. It lets us for applying “according to needs” method. VI. According to needs method In this method, only the required relations are established. In this case, the number of relations satisfies the condition: ½ * N ≤ R < ½ * N * (N – 1). Examples of generation times for different numbers of devices and for the case, which is consistent with our assumption (arising from the Pareto principle) are given in the table 2 in column 2. For comparison, column 1 shows the generation times using the each to each method. Column 3 presents generation times, assuming that each user communicates with at most 100 other users. In practice, the relations are defined manually, using a symmetric table whose rows and columns are identified by numbers of devices. Table entries on the diagonal are unavailable, because establishing relation with the device itself has no practical meaning. Placing the symbol X in a cell at the intersection of row i and column j means establishing a relation between devices i and j. The efficiency of this method depends on the ability of perception of the operator. To imagine the scale of difficulty one can compare this process to lay the puzzle, where the number of elements corresponds to the number of devices. If the image consists of 1000 items such task seems not feasible in a short time. Suppose that a large screen monitor (e.g. 21’’) can fit a part of table with the dimension 40 x 40 devices. If 1000 devices in the system works, such a part is just one of 625 parts. Advantages: Number of relations adapted to real needs. The relatively short generation time. Adequate for the institution, where some connections are not allowed.
Chapter 4: Information Assurance & Cyber Defence 481 Disadvantages: Complicated and time consuming planning. Too large risk of doing mistake (no necessary relations). For a large number of devices, error-free planning is practically impossible. Table II. Time of generation for different methods of planning Number of devices Generation time Case 1 Case 2 Case 3 100 1 h 22 min. 16 min. 1 h 22 min. 200 5, 5 h 1h 6 min 5,5 h 500 34 h 40 min. 7 h 15 h 53 min. 1000 5 days 8 h 27 h 36 min. 31 h 46 min 2000 23 days 4 days 15 h 2 days 15 h 5000 145 days 29 days 6 days 14 h In conclusion, it should be noted that in extreme situations (large networks) both methods in its pure form are not acceptable. Therefore, our solution is in some sense a combination of both methods of planning. VII. Adaptive method General idea This method is iterative. Iteration is single validity period. The method starts from a network set up on each to each. The method is called adaptive, because in subsequent iterations the network connections are modified in such a way, as to adapt to the real needs for connections. The aim of this method is to obtain such a set of cryptographic relations that will not require further modification (of course apart from the modifications related to exceptional situations, such as the introduction of new user). Additional requirements The method requires all active connections to be registered by devices of the management system. Thanks to this, the planning subsystem will know which relations are necessary. In a minimum variant, to record only the first call within a relation is sufficient. For this purpose, an existing electronic distribution channel can be used. Initial conditions Before the first iteration, the relations are established on each to each. Prior to initiating the system there is not time regime yet, so it does not matter that
- Page 429: Chapter 4: Information Assurance &
- Page 432 and 433: 432 Military Communications and Inf
- Page 434 and 435: 434 Military Communications and Inf
- Page 436 and 437: 436 Military Communications and Inf
- Page 439 and 440: On Multi-Level Secure Structured Co
- Page 441 and 442: Chapter 4: Information Assurance &
- Page 443 and 444: Chapter 4: Information Assurance &
- Page 445 and 446: Chapter 4: Information Assurance &
- Page 447 and 448: Chapter 4: Information Assurance &
- Page 449 and 450: Chapter 4: Information Assurance &
- Page 451 and 452: Chapter 4: Information Assurance &
- Page 453 and 454: Chapter 4: Information Assurance &
- Page 455 and 456: Generation of Nonlinear Feedback Sh
- Page 457 and 458: Chapter 4: Information Assurance &
- Page 459 and 460: Chapter 4: Information Assurance &
- Page 461 and 462: Chapter 4: Information Assurance &
- Page 463: Chapter 4: Information Assurance &
- Page 466 and 467: 466 Military Communications and Inf
- Page 468 and 469: 468 Military Communications and Inf
- Page 470 and 471: 470 Military Communications and Inf
- Page 472 and 473: 472 Military Communications and Inf
- Page 474 and 475: 474 Military Communications and Inf
- Page 476 and 477: 476 Military Communications and Inf
- Page 478 and 479: 478 Military Communications and Inf
- Page 482 and 483: 482 Military Communications and Inf
- Page 485 and 486: Modern Usage of “Old” One-Time
- Page 487 and 488: Chapter 4: Information Assurance &
- Page 489 and 490: Chapter 4: Information Assurance &
- Page 491 and 492: Chapter 4: Information Assurance &
- Page 493 and 494: Chapter 4: Information Assurance &
- Page 495: Chapter 4: Information Assurance &
- Page 498 and 499: 498 Military Communications and Inf
- Page 500 and 501: 500 Military Communications and Inf
- Page 502 and 503: 502 Military Communications and Inf
- Page 504 and 505: 504 Military Communications and Inf
- Page 506 and 507: 506 Military Communications and Inf
- Page 508 and 509: 508 Military Communications and Inf
- Page 511 and 512: A Abut Fatih 161 Akcaoglu Ismail 11
480 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
economy, business, daily life etc. But generally it states that roughly 80% of the effects<br />
come from 20% of the causes.<br />
Table I. Time of generation in each to each method<br />
Number of devices Time of data generation<br />
100 1 h 22 min.<br />
200 5, 5 h<br />
500 34 h 40 min.<br />
1000 5 days 8 h<br />
2000 23 days<br />
5000 145 days<br />
Applying this rule to communication system we can assume, that from point<br />
of view of single user, 80% realized connections are addressed to only 20% of other<br />
users. For the simplification of further considerations let’s assume that each user<br />
communicates with only 20% of other users. It lets us for applying “according to<br />
needs” method.<br />
VI. According to needs method<br />
In this method, only the required relations are established. In this case,<br />
the number of relations satisfies the condition:<br />
½ * N ≤ R < ½ * N * (N – 1).<br />
Examples of generation times for different numbers of devices <strong>and</strong> for the case,<br />
which is consistent with our assumption (arising from the Pareto principle) are<br />
given in the table 2 in column 2. For comparison, column 1 shows the generation<br />
times using the each to each method. Column 3 presents generation times, assuming<br />
that each user communicates with at most 100 other users. In practice, the relations<br />
are defined manually, using a symmetric table whose rows <strong>and</strong> columns are<br />
identified by numbers of devices. Table entries on the diagonal are unavailable,<br />
because establishing relation with the device itself has no practical meaning. Placing<br />
the symbol X in a cell at the intersection of row i <strong>and</strong> column j means establishing<br />
a relation between devices i <strong>and</strong> j.<br />
The efficiency of this method depends on the ability of perception of the operator.<br />
To imagine the scale of difficulty one can compare this process to lay the puzzle,<br />
where the number of elements corresponds to the number of devices. If the image<br />
consists of 1000 items such task seems not feasible in a short time. Suppose that<br />
a large screen monitor (e.g. 21’’) can fit a part of table with the dimension 40 x 40<br />
devices. If 1000 devices in the system works, such a part is just one of 625 parts.<br />
Advantages: Number of relations adapted to real needs. The relatively short generation<br />
time. Adequate for the institution, where some connections are not allowed.