22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

494 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

reels <strong>and</strong> paper pads (Fig. 1). However, today’s electronics, as the SGCL-100M<br />

generator shown in Fig. 4 <strong>and</strong> described in chapter 4 of the article will be able to<br />

act as a practically “infinite” source of one-time keys. Capability to one-time keys<br />

generation will be no limitation any longer. Today’s realization of OTP cipher machines<br />

(Fig. 3) with embedded current one-time encryption software can process<br />

large quantities of data at high speed.<br />

Current data storage technology such as USB sticks, DVD’s, external hard<br />

disks, solid-state drives or dedicated OTK modules to enable the physical transport<br />

of enormous quantities of truly r<strong>and</strong>om keys. Actual sensitive communications<br />

are often limited to a small number of important users. In such cases, one-on-one<br />

communications with the associated key distribution, possibly in configuration with<br />

a star topology, is no longer a practical problem, especially considering the security<br />

benefits. By using a so-called sneakernet (transferring data on removable media by<br />

physical couriering), you can reach a throughput of one-time keys that is greater<br />

than what a network can process on encrypted data. In other words, it could take<br />

a few hours to drive a terabyte of key material, stored on an external drive, by car<br />

to someone, but it will take days or even weeks to consume that amount of keys on<br />

a broadb<strong>and</strong> network. A terabyte sized key can easily encrypt e-mail traffic of special<br />

(military or diplomacy users) for a year, including attachments.<br />

Therefore, one-time key encryption is still well-suited in specific circumstances<br />

where absolute security is preferable to practical considerations, regardless<br />

of the cost of secure physical transport of keys by couriering.<br />

In the future quantum key distribution (QKD) may be helpful as an alternative<br />

for secure physical transport of keys by couriering. The security of quantum<br />

key distribution relies on the foundations of quantum mechanics, in contrast to<br />

a traditional key distribution protocol which relies on the computational difficulty<br />

of certain mathematical functions. An interesting <strong>and</strong> promising method<br />

of QKD was presented in [2] with usage of Professor Artur Ekert type of QKD [11].<br />

But at present the ability of efficient QKD usage is still an open question.<br />

References<br />

[1] M. Leśniewicz, “Sprzętowa generacja ciągów losowych z przepływnością 100 Mbit/s.<br />

Hardware generation of binary sequences with throughput 100 Mbit/s,” Przegląd<br />

Telekomunikacyjny nr 11/2011.<br />

[2] W. Nowakowski, “O kryptografii kwantowej. About quantum cryptography,”<br />

Elektronika, nr 2, Warszawa 2010.<br />

[3] M. Leśniewicz, Sprzętowa generacja losowych ciągów binarnych. Hardware generation<br />

of binary r<strong>and</strong>om sequences, WAT, Warszawa 2009, ISBN 978-83-61486-31-2.<br />

[4] M. Borowski, R. Wicik, “A one-time cipher machine for Polish Army,” <strong>Military</strong><br />

Communication Conference,” Prague, 2008.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!