KEYWORDS: Clocks, Computing systems, Control systems, Data acquisition, Data processing, Computer security, Signal generators, Cryptography, Signal processing, Information security
The hardware random number generator based on the 74121 monostable multivibrators for applications in cryptographically secure distributed measurement and control systems with asymmetric resources was presented. This device was implemented on the basis of the physical electronic vibration generator in which the circuit is composed of two “loop” 74121 monostable multivibrators, D flip-flop and external clock signal source. The clock signal, witch control D flip-flop was generated by a computer on one of the parallel port pins. There was presented programmed the author's acquisition process of random data from the measuring system to a computer. The presented system was designed, builded and thoroughly tested in the term of cryptographic security in our laboratory, what there is the most important part of this publication. Real cryptographic security was tested based on the author's software and the software environment called RDieHarder. The obtained results was here presented and analyzed in detail with particular reference to the specificity of distributed measurement and control systems with asymmetric resources.
The chaotic signal generator based on the theory of nonlinear dynamical systems for applications in cryptographically
secure distributed measurement and control systems with asymmetric resources is presented. This system was
implemented on the basis of the physical chaotic electronic vibration generator in which the resonant circuit is
composed of two capacitors, two resistors, coil and transistor, called the Colpitts oscillator. The presented system was
designed, programmed and thoroughly tested in the term of cryptographic security in our laboratory, what there is the
most important part of this publication. True cryptographic security was tested based on the author's software and the
software environment called RDieHarder. The obtained results will be here presented and analyzed in detail with
particular reference to the specificity of distributed measurement and control systems with asymmetric resources.
As Air Traffic Control Systems move from a voice only environment to one in which clearances are issued via data link,
there is a risk that an unauthorized entity may attempt to masquerade as either the pilot or controller. In order to protect
against this and related attacks, air-ground communications must be secured. The challenge is to add security in an
environment in which bandwidth is limited. The Aeronautical Telecommunications Network (ATN) is an enabling
digital network communications technology that addresses capacity and efficiency issues associated with current
aeronautical voice communication systems. Equally important, the ATN facilitates migration to free flight, where direct
computer-to-computer communication will automate air traffic management, minimize controller and pilot workload,
and improve overall aircraft routing efficiency. Protecting ATN communications is critical since safety-of-flight is
seriously affected if an unauthorized entity, a hacker for example, is able to penetrate an otherwise reliable
communications system and accidentally or maliciously introduce erroneous information that jeopardizes the overall
safety and integrity of a given airspace. However, an ATN security implementation must address the challenges
associated with aircraft mobility, limited bandwidth communication channels, and uninterrupted operation across
organizational and geopolitical boundaries.
This paper provides a brief overview of the ATN, the ATN security concept, and
begins a basic introduction to the relevant security concepts of security threats, security services and security
mechanisms. Security mechanisms are further examined by presenting the fundamental building blocks of symmetric
encipherment, asymmetric encipherment, and hash functions. The second part of this paper presents the project of
cryptographiclly secure wireless communication between Unmanned Aerial Vehicles (UAV) and the ground station in
the ATM system, based on the ARM9 processor development kid and Embedded Linux operation system.
In this paper we present the State of The Art in Cryptographic Random Number Generators (RNG). We provide
analysis of every of the most popular types of RNGs such as linear generators (i.e. congruential, multiple recursive), non-linear generators (i.e. Quadratic, Blum-Blum-Shub) and cryptographic algorithms based (i.e. RSA generator, SHA-1 generator). Finally we choose solutions which are suitable to Distributed Measurement Systems (DMS) specific requirements according to cryptographic security, computational efficiency (throughput) and complexity of implementation (VHDL targeted at FPGA and ASIC devices). Strong asymmetry of computing power and memory capacity is taken into account in both software and hardware solutions.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.