By Topic

Improving the efficiency of cryptographic data management by using an adaptive method of planning

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Czajka, T. ; Cryptology Dept., Mil. Commun. Inst., Zegrze, Poland ; Oszywa, W. ; Gawronski, M. ; Gliwa, R.

The Electronic Cryptographic Data Management System (ECDMS) is designed for secure and correct preparation of cryptographic data. The process of preparation consists of three stages generally: planning of secure connections, generation of required keys and distribution of produced data to points of exploitation. These steps have to be perform sequentially. The planning can be realized by “according to needs” or “each to each” method. First method is inconvenient in use while second one extends time of data generation significantly. However the distribution process takes still the most of time. Till now distribution was realized by couriers. Nowadays, thanks to available secure telecommunication infrastructure, distribution can be realized in electronic way. A replacement of courier distribution with electronic one enables to improve efficiency and flexibility of ECDMS. Time of delivery data to devices is negligibly short and, in consequence, processes of planning and generation became a bottle neck in this case. In the article we will prove that in extreme situations method “according to needs” is impracticable and use of “each to each” method causes that time of data generation is unacceptably long. In answer to these difficulties we propose new method of secure connections planning called adaptive method. It combines advantages of two previous methods and eliminates disadvantages. One, crucial requirement for using this method is availability of communication infrastructure that will allow ECDMS to monitor work of supported devices.

Published in:

Communications and Information Systems Conference (MCC), 2012 Military

Date of Conference:

8-9 Oct. 2012