Cryptographic Protection for Military Radio Communications

被引:0
|
作者
Bialas, Robert [1 ]
Grzonkowski, Marcin [1 ]
Wicik, Robert [1 ]
机构
[1] Mil Commun Inst, Cryptol Dept, Zegrze, Poland
关键词
cryptography; cryptanalysis; radio communication; quantum computers;
D O I
10.24425/ijet.2020.134028
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Protecting the confidentiality, integrity and availability of information is very important in any telecommunications system. Information protection requires use of necessary physical, personal, information and communication technologies and above all - electromagnetic and cryptographic security measures. Equipment and tools for cryptographic protection should be examined and assessed in terms of resistance to known threats. Additional requirements are put on information protection for radio communication, especially military, where radio transmission is characterized by uncertainty of establishing and maintaining connections, bit rates are relatively low, often without full duplex. All this has an impact on the methods of cryptographic synchronization and implementation of cryptographic functions. A different approach to information protection is required by classic narrowband radio communications, a different one in time-division multi-access modes, and another one in broadband packet data transmission. Systems designed for information protection in radio communications implement appropriate operating modes of operation for cryptographic algorithms and protocols. Latest threats from quantum computers pose new challenges, especially in systems using public-key cryptography, because there are algorithms that can be used to attack these schemes with polynomial complexity.
引用
收藏
页码:687 / 693
页数:7
相关论文
共 50 条
  • [31] A CRYPTOGRAPHIC TOOL FOR PROGRAMS PROTECTION
    DOMINGOFERRER, J
    HUGUETROTGER, L
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 514 : 227 - 240
  • [32] Cryptographic Key Protection in a Cryptoprocessor
    Rajitha, N.
    Sridevi, R.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 271 - 275
  • [33] Cryptographic key agreement for mobile radio
    Hassan, AA
    Stark, WE
    Hershey, JE
    Chennakeshu, S
    DIGITAL SIGNAL PROCESSING, 1996, 6 (04) : 207 - 212
  • [34] Radio communications
    Jacobson, DH
    1998 IEEE 5TH INTERNATIONAL SYMPOSIUM ON SPREAD SPECTRUM TECHNIQUES AND APPLICATIONS - PROCEEDINGS, VOLS 1-3, 1998, : 1 - 1
  • [35] Radio communications
    Marconi, SG
    NATURE, 1924, 114 : 939 - 940
  • [36] Military Full-Duplex Radio Shield for Protection Against Adversary Receivers
    Riihonen, Taneli
    Korpi, Dani
    Turunen, Matias
    Peltola, Tatu
    Saikanmaki, Joni
    Valkama, Mikko
    Wichman, Risto
    2019 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2019,
  • [37] Soldier Protection of Staying in the Radiated Field Generated by Antenna of Selected Military Communications Systems
    Wnuk, Marian
    Przesmycki, Rafal
    ADVANCES IN SAFETY MANAGEMENT AND HUMAN FACTORS, AHFE 2017, 2018, 604 : 236 - 247
  • [38] Cryptographic Algorithms in Wearable Communications: An Empirical Analysis
    Coelho, Kristtopher
    Damiao, Danilo
    Noubir, Guevara
    Borges, Alex
    Nogueira, Michele
    Nacif, Jose
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (11) : 1931 - 1934
  • [39] MILITARY COMMUNICATIONS AND NETWORKS
    Chan, Kevin
    Chong, Peter Han Joo
    Nordbotten, Nils Agne
    IEEE COMMUNICATIONS MAGAZINE, 2022, 60 (05) : 58 - 58
  • [40] MILITARY COMMUNICATIONS AND NETWORKS
    Chan, Kevin S.
    Johnsen, Frank T.
    IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (08) : 13 - 13