Cryptographic Protection for Military Radio Communications

نویسندگان

چکیده

Protecting the confidentiality, integrity and availability of information is very important in any telecommunications system. Information protection requires use necessary physical, personal, communication technologies above all – electromagnetic cryptographic security measures. Equipment tools for should be examined assessed terms resistance to known threats. Additional requirements are put on radio communication, especially military, where transmission characterized by uncertainty establishing maintaining connections, bit rates relatively low, often without full duplex. All this has an impact methods synchronization implementation functions. A different approach required classic narrowband communications, a one time-division multi-access modes, another broadband packet data transmission. Systems designed communications implement appropriate operating modes operation algorithms protocols. Latest threats from quantum computers pose new challenges, systems using public-key cryptography, because there that can used attack these schemes with polynomial complexity.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Low-Latency Cryptographic Protection for SCADA Communications

Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors including power, gas, oil, and water. However, SCADA networks generally have little protection from the rising danger of cyber attack. A retrofit solution to protect existing SCADA communications links must assure the integrity of com...

متن کامل

Cryptographic requirements for chaotic secure communications

In recent years, a great amount of secure communications systems based on chaotic synchronization have been published. Most of the proposed schemes fail to explain a number of features of fundamental importance to all cryptosystems, such as implementation details, or key definition, characterization, and generation. As a consequence, the proposed ciphers are difficult to realize in practice wit...

متن کامل

Cryptographic Key Agreement for Mobile Radio

The problem of establishing a mutually held secret cryptographic key using a radio channel is addressed. The performance of a particular key distribution system is evaluated for a practical mobile radio communications system. The performance measure taken is probabilistic, and different from the Shannonmeasure of perfect secrecy. In particular, it is shown that by using a channel decoder, the p...

متن کامل

Digital Communications for Relay Protection

Electric utilities are expanding communications infrastructure due to increased need for information. Due to performance, price, and technological advances, digital communication systems are frequently chosen as this multiple user data network. This two-part paper describes the application of digital communication in power system protection. Part 1 describes the digital communications architect...

متن کامل

Wireless Military Communications-NNEC Enabler

The paper discusses the NATO Network Enabled Capability concept, mainly from the communication point of view. The changes involve complete new requirements on the role of command and control to increase flexibility and effectiveness. Integration of Modeling and Simulation with Command, Control, and Information Systems increases the number of risks but it promises to leverage the projected capab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electronics and Telecommunications

سال: 2023

ISSN: ['2300-1933', '2081-8491']

DOI: https://doi.org/10.24425/ijet.2020.134028