Cryptographic Protection for Military Radio Communications

被引:0
|
作者
Bialas, Robert [1 ]
Grzonkowski, Marcin [1 ]
Wicik, Robert [1 ]
机构
[1] Mil Commun Inst, Cryptol Dept, Zegrze, Poland
关键词
cryptography; cryptanalysis; radio communication; quantum computers;
D O I
10.24425/ijet.2020.134028
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Protecting the confidentiality, integrity and availability of information is very important in any telecommunications system. Information protection requires use of necessary physical, personal, information and communication technologies and above all - electromagnetic and cryptographic security measures. Equipment and tools for cryptographic protection should be examined and assessed in terms of resistance to known threats. Additional requirements are put on information protection for radio communication, especially military, where radio transmission is characterized by uncertainty of establishing and maintaining connections, bit rates are relatively low, often without full duplex. All this has an impact on the methods of cryptographic synchronization and implementation of cryptographic functions. A different approach to information protection is required by classic narrowband radio communications, a different one in time-division multi-access modes, and another one in broadband packet data transmission. Systems designed for information protection in radio communications implement appropriate operating modes of operation for cryptographic algorithms and protocols. Latest threats from quantum computers pose new challenges, especially in systems using public-key cryptography, because there are algorithms that can be used to attack these schemes with polynomial complexity.
引用
收藏
页码:687 / 693
页数:7
相关论文
共 50 条
  • [1] Cryptographic protection of classified information in military radio communication faced with threats from quantum computers
    Wicik, Robert
    Borowski, Mariusz
    RADIOELECTRONIC SYSTEMS CONFERENCE 2019, 2020, 11442
  • [2] Fiberoptics setup for chaotic cryptographic communications
    Annovazzi-Lodi, V
    Benedetti, M
    Merlo, S
    Norgia, M
    COMPTES RENDUS PHYSIQUE, 2004, 5 (06) : 623 - 631
  • [3] Cryptographic Hardware & Embedded Systems for Communications
    Sklavos, Nicolas
    2012 IEEE FIRST AESS EUROPEAN CONFERENCE ON SATELLITE TELECOMMUNICATIONS (ESTEL), 2012,
  • [4] Analysis of the Cryptographic Algorithms in IoT Communications
    Silva, Catarina
    Cunha, Vitor A.
    Barraca, Joao P.
    Aguiar, Rui L.
    INFORMATION SYSTEMS FRONTIERS, 2024, 26 (04) : 1243 - 1260
  • [5] MILITARY COMMUNICATIONS AND NETWORKS
    Chan, Kevin
    Chong, Peter Han Joo
    Nordbotten, Nils Agne
    IEEE COMMUNICATIONS MAGAZINE, 2022, 60 (05) : 58 - 58
  • [6] Multilevel model of information protection the at use of means of cryptographic protection
    Kozub, AA
    Mescheriakov, RV
    Kiseleva, I
    2003 SIBERIAN RUSSIAN WORKSHOP ON ELECTRON DEVICES AND MATERIALS PROCEEDINGS, 2003, : 139 - 140
  • [7] Cryptographic algorithm for protection of communication in drones control
    Ivanov I.
    Andreev K.
    Vetova S.
    Arnaudov R.
    International Journal of Reasoning-based Intelligent Systems, 2021, 13 (01) : 32 - 38
  • [8] A Resourceful Symmetric Cryptographic Construct for Securing Miniature Satellite Communications
    Adekunle, A. A.
    2013 IEEE INTERNATIONAL CONFERENCE ON WIRELESS FOR SPACE AND EXTREME ENVIRONMENTS (WISEE 2013), 2013,
  • [9] A survey on cryptographic methods to secure communications for UAV traffic management
    Aissaoui, Ridwane
    Deneuville, Jean-Christophe
    Guerber, Christophe
    Pirovano, Alain
    VEHICULAR COMMUNICATIONS, 2023, 44
  • [10] Secure Physical Access Control with Strong Cryptographic Protection
    Hajny, Jan
    Dzurenda, Petr
    Malina, Lukas
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 220 - 227