22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

492 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The generator, even though its hardwareness is a very complex object, requires<br />

software. The software is generally required by two circuits – a programmable chip<br />

(a program in AHDL, a VHDL language in the corporate version of Altera) <strong>and</strong><br />

RISC microprocessor (programs in C/C++ with “inserts” in the assembler). The both<br />

softwares must be optimized due to the efficiency of data transfer, to avoid a conflict<br />

with the essential functions of a r<strong>and</strong>om sequence generation. The correctness<br />

of theoretical assumptions <strong>and</strong> the correctness of technical solutions – including<br />

software – will be confirmed experimentally by statistical testing of generators<br />

in any case at all stages of the development.<br />

Since the generator is a quite complex <strong>and</strong> costly device with a very high output<br />

rate it can be assumed that it could be used as a source for r<strong>and</strong>om sequence<br />

servers in R&D centers.<br />

V. Data management for OTP crypto machines<br />

Data management systems have been subject to big changes over the time<br />

of cryptographic systems development. At the beginning they were simple elements<br />

producing only keys in open (not encrypted) form – key generators. The other<br />

operations connected with data processing (i.e. protecting, storing) were carried<br />

out by a person. Such kind of the key management system was used by the OTP<br />

cipher machines in the seventieth [7].<br />

In the next stages tasks of system development generators were widened to recording<br />

results, protection (ciphering), <strong>and</strong> authentication. Such extended systems are<br />

called generation systems. As a result of a rising number of cryptographic devices <strong>and</strong><br />

development of computer systems, generation systems were equipped with mechanisms<br />

of planning secure connections <strong>and</strong> an element responsible for distribution. Only<br />

such systems can be called cryptographic data management systems. These complex<br />

management systems has been built since the middle of the nineties. They raised efficiency<br />

of data processing <strong>and</strong> security. The data management systems are intended<br />

to deliver correct <strong>and</strong> reliable key data to proper cryptographic devices. OTP cipher<br />

machines dem<strong>and</strong> a data management system [4]. The system consists of: a secure<br />

connecting planning station <strong>and</strong> a key generation station. OTP cipher machines machine<br />

can work in two modes: ”in a direction way” <strong>and</strong> “in a circular way” These two<br />

modes of operation should be introduced by the secure connecting planning station.<br />

A. The secure planning connection station<br />

The main aim of the secure planning connection station is to implement only<br />

really necessary connections in an OTP cipher machines net. The OTP cipher<br />

machine uses one-time keys <strong>and</strong> time of generating keys is an important factor<br />

of a key generating process. “In a direction way” mode needs generation of unique<br />

keys for each direction therefore an automatic making connection “each to each”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!