DOI QR코드

DOI QR Code

A Proposal on Cryptographic Synchronization for T4 Link Encryption

T4급 링크 암호에 적합한 암호 동기방식 제안

  • Lee, HoonJae (Department of Information and Communication Engineering, Dongseo University) ;
  • Kim, KiHwan (Department of Ubiquertous IT, Dongseo University) ;
  • Kang, YongJin (Department of Ubiquertous IT, Dongseo University) ;
  • Lee, Sang-Gon (Department of Information and Communication Engineering, Dongseo University) ;
  • Ryu, Young-Jae (ADD)
  • Received : 2017.09.14
  • Accepted : 2018.01.09
  • Published : 2018.01.31

Abstract

The modern battlefield is being developed as a network-centric warfare where priority is given to rapid status grasp and power deployment through scientification and modernization. Therefore, tactical data link has been continuously improving the network speed, and recently, security technology is required for wireless communication with the UAV and various devices for reconnaissance. In addition, the future information warfare will utilize advanced IT technology positively. Efforts are needed to integrate various systems and networks. However, these efforts are meaningful only when they can assume sufficient security in a newly changing information and communication environment. In this paper, we propose a new cryptographic synchronization for link encryption suitable for tactical data links. The proposed cryptographic synchronization is useful for T4 UAV link encryption, and it is also adaptable for lower BER, then we analyze the performances analysis of that.

현대 전장은 과학화 및 첨단화를 통해 빠른 현황 파악과 전력배치를 우선시하는 네트워크 중심 전으로 발전하고 있다. 이에 전술 데이터링크는 지속적으로 네트워크 속도 향상을 이루고 있으며, 최근 정찰용 무인기 및 각종 장비와의 무선통신을 위하여 보안 기술을 필요로 하고 있다. 또한 미래 정보전에서는 첨단 IT의 적극적인 활용이 필수적으로 요구되며, 다양한 시스템과 네트워크를 연동, 통합하기 위한 노력이 필요하다. 하지만 이러한 노력은 새롭게 변화하는 정보통신 환경에서 충분한 보안성을 전제 할 수 있어야 한다는 의미가 있다. 본 논문에서는 전술 데이터링크에 적합한 새로운 링크 암호동기방식을 제안한다. 제안한 암호 동기방식은 T4급 UAV 링크암호에 적합한 방식이며, 통신선로의 BER이 아주 낮은 경우에도 잘 견딜 수 있도록 설계하였고, 그 성능을 분석하였다.

Keywords

References

  1. P. T. Mitchell, Network Centric Warfare: Coalition operations in the age of US military primacy, 1th ed. New York, NY: Routledge, 2013.
  2. D. S. Alberts and R.E. Hayes, Power to the Edge: Command and Control in the Information Age, 1th ed. Washington DC, WA: CCRP Publication Series, 2003.
  3. G. C. Wang, B. S. Lee, K. J. Lim and J. Y. Ahn, "Technical Trends on Security of Control and Non-payload Communications Network for Unmanned Aircraft Systems," International Journal of Electronics and Telecommunications Research Institute, vol. 32, no. 1, pp. 82-92, Feb. 2017.
  4. Weatherington, Dyke, and U. Deputy, "Unmanned aircraft systems roadmap, 2005-2030." United States, Office of the Secretary of Defense, Technical Report, 2005.
  5. J. M. Chung, K. C. Park, T. Y. Won, U. H. Oh, D. C. Ko, S. J. Hong, C. B. Yoon, H. Kim and U. Y. Pak, "Standardization Strategy for the Image and Intelligence Common Datalink," International Journal of the Korean Information and Communication Magazine, vol. 28, no. 4, pp.41-50, Apr. 2011.
  6. E. Burak, E. C. A. Nail, T. Craig and M. Ken, "A 275 Gbps AES encryption accelerator using ROM-based S-boxes in 65nm," in Proceeding of the Custom Integrated Circuits Conference, California: CA, pp. 1-4, 2015.
  7. Y. J. Ryu and J. M. Ahn, "Research on Performance Analysis for the Long Distance Air-Ground Wideband Common Data Link," International Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 04, pp. 703-715, Apr. 2017. https://doi.org/10.7840/kics.2017.42.4.703
  8. F. H. Myers, "A Data Link Encryption System," in Proceeding of National Telecommunications Conference, Washington: WA, pp. 27-29, 1979.
  9. D. H. Lim, S. J. Lee, "Public Key Authentication using Secret Sharing and ECC for Tactical Communication Networks," Journal of Security Engineering, vol. 13, no. 6 pp. 421-438, Dec. 2016. https://doi.org/10.14257/jse.2016.12.04
  10. D. J. C. MacKay, Information theory, Inference and Learning Algorithms, 1th ed. Cambridge, CBG: Cambridge University Press, 2003.
  11. T. K. Moon, Error Correction Coding: Mathematical Methods and Algorithms, 1th ed. New Jersey, NY : John Wiley & Sons, 2005.
  12. N. Bruce, Y. S. Lee, W. T. Jang and H. J. Lee, "Next Generation Encryption of Enhanced Light-weight Stream Cipher for Communication Systems," International Journal of Wireless Devices and Engineering, vol. 1, no. 1, pp. 27-32, 2017.
  13. A. Kahate, Cryptography and network security, 3th ed, New Delhi, IN: Tata McGraw-Hill Education, 2013.
  14. H. J. Lee, I. S. Ko (Franz Ko), "An Intelligent Security Agent for Reliable Cipher System using PingPong," Cybernetics and Systems, vol. 39, no. 7, pp.705-718, Oct. 2008. https://doi.org/10.1080/01969720802257949
  15. H. R. Kim, H. J. Lee, D. H. Kwon, U. Y. Pak, "A SES Alarmed Link Encryption Synchronization Method for High-speed Video Data Encryption," Journal of the Korea Institute of Information and Communication Engineering, vol. 17, no. 12, pp.2891-2898, Dec. 2013. https://doi.org/10.6109/jkiice.2013.17.12.2891