MECHANISMS FOR ENSURING THE SECURITY OF CHANNELS OF A PROSPECTIVE MANAGEMENT SYSTEM
Main Article Content
Abstract
The development of military (state) control systems in modern conditions of hybrid warfare requires the possibility of rapid expansion of both functionality and scaling of the physical and logical basis of management, increasing the range of digitization and use of both military and civilian communication channels to manage troops and weapons. Not only the computing power of the enemy, the means of suppressing and / or blocking the communication channels of the control system, but also the development of quantum technologies that place new and more stringent requirements on security mechanisms based on symmetric and asymmetric cryptography algorithms. According to NIST, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, significantly reducing their resilience. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the control system. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. This approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms.
Article Details
References
(2021), Cybersecurity Strategy of Ukraine safe cyberspace is the key to successful development of the country, Decree of the President of Ukraine dated August 26, 2021 No. 447/2021, URL: https://www.president.gov.ua/documents/4472021-40013.
(2021), Про Стратегічний оборонний бюлетень України, Decree of the President of Ukraine dated August 20, 2021 No. 473/2021, URL: https://www.president.gov.ua/documents/4732021-40121.
(2016), Report on Post-Quantum Cryptography, URL: http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf
Hryshchuk, R.V. and Danik, Yu.G. (2016), Fundamentals of cyber security, Monograph, Zhnaeu, Zhytomyr, 2016, 636 p.
Ralph D., Thiele (2013),”Building C4ISR Capabilities in and for the Gulf”, ISPSW Strategy Series, Issue No. 227, available at: https://www.files.ethz.ch/isn/164095/227_Thiele.pdf
National Research Council (2006), C4ISR for Future Naval Strike Groups, 300 p., available at: http://nap.edu/11605.
Yevseev, S.P., Tomashevskyi, B.P., Ivanchenko, S.O., Zinchenko, Y.V. and Havrylenko O.V. (2021), “Structural model of a modified special purpose system”, Special Telecommunications Systems and Information Protection, Issue 1 (35), pp. 25–39.
Bartock, M., Cichonski, J., Souppaya, M., Smith, M., Witte, G. and Scarfone, K. (2016), Guide for Cybersecurity Event Recovery, NIST, DOI: https://doi.org/10.6028/NIST.SP.800-184
NIST (2020), Security requirements for cryptographic modules, URL: https://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
NIST (2017), Guide to LTE Security, URL: https://csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdf
Yevseiev, S., Ponomarenko, V., Laptiev, O. and Milov, O. (2021), Synergy of building cybersecurity systems, monograph, PC TECHNOLOGY CENTER, Kharkiv, 188 p.
Sidelnikov, V. M. (2002), “Cryptography and Coding Theory”, Moscow University and the Development of Cryptography in Russia, MSU, Moscow, pp. 1-22.
Kuznetsov, O.O., Yevseev, S.P. and Watermelon S.V. (2008), Information protection and economic security of the enterprise, Monograph, KhNEU, Kharkiv, 360 p.
Kuznetsov, O. O., Evseyev, S. P., Kavun, S. V. and Korol, O. G. (2009), Signals and codes. Algebraic Methods for Synthesis, Monograph, KhNEU, Kharkiv, Ukraine, 384 p.
Hoppa, V. D. (1984), "Codes and information", Uspekhi matematicheskih nauk, Vol. 30, no. 1(235), pp. 77–120.
Yevseyev, S.P. and Tsyhanenko, O.S. (2018), “Development of Niederreiter's asymmetric crypto-code construction on modified elliptic codes”, Information Processing Systems, Issue 2(153), pp. 127-135.
Rzayev, Kh. and Mammadova T. (2018), “Mathematical model of the modified Niederreiter crypto-code structures”, Advanced Information Systems, Vol. 2, No. 4, pp. 37-44, DOI: https://doi.org/10.20998/2522-9052.2018.4.06
Michtchenko, V., and Vilanski, Y. (2007), Damaged texts and multichannel cryptography, Encyclopedics, Minsk, 292 p.
.Michtchenko, V., Vilanski, Y., and Lepin, V. (2007), MV 2 cryptographic algorithm, Minsk, 2007, 147 p.
Rafael, Misoczki, Jean-Pierre, Tillich, Nicolas, Sendrier and Paulo S. L. M., Barreto (2013), MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, 21 p., available at: https://eprint.iacr.org/2012/409.pdf.
Kozlov, A. V., Krouk, E. A., and Ovchinnikov, A. A. (2013), ”An approach to development of block-commutative codes with low density of parity check”, Journal of instrument engineering, Vol. 56, No. 8, pp. 9-14.
Akulinin, S.A. and Sviridova, I.V. (2015), “Setting ldpc codes for channels with additive white gaussian noise“, Bulletin of VSTU, Vol. 11, No. 6, pp. 117-120.
Novikov, R.S. and Astrakhantsev, A.A. (2013), “Analysis of characteristics of error-correcting codes”, Information processing systems, issue 9 (116), pp. 164–167.
Bashkirov, A.V. (2015), Implementation of the LDPC-decoder on the massively parallel computing devices, VSTU, Voronezh.
Huang, J., Zhou, S. and Willett, P. (2008), “Nonbinary LDPC coding for multicarrier underwater acoustic communication”, IEEE J. Sel. Areas Commun., pp. 1684-1696, DOI: https://doi.org/10.1109/JSAC.2008.081208
Berlekamp, E.R. (2015), Algebraic Coding Theory: Revised Edition, Revised ed. Edition, WSPC, 502 p.
Blahut, R. (1983), Theory and Practice of Error Control Codes Reprint. with corr Edition, Addison-Wesley, 500 p.