Review of cryptographic application security evaluation techniques for new critical infrastructures
The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technol...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2023-12-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2023079 |
_version_ | 1797262349498843136 |
---|---|
author | Gaolei LI, Jianhua LI, Zhihong ZHOU, Hao ZHANG |
author_facet | Gaolei LI, Jianhua LI, Zhihong ZHOU, Hao ZHANG |
author_sort | Gaolei LI, Jianhua LI, Zhihong ZHOU, Hao ZHANG |
collection | DOAJ |
description | The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technologies such as 5G/6G, artificial intelligence, and blockchain in various fields.The security evaluation of cryptography applications, as a key technological resource for ensuring the security of national information, integration, and innovation infrastructure, has risen to the level of international law and national development strategy.It is urgent to construct a comprehensive, fine-grained, and self-evolving cryptography security evaluation system throughout the data lifecycle.The typical APT attacks and ransomware attacks faced by new critical infrastructure in industries such as energy, medicine, and transportation in recent years were considered.And then the growing demand for security evaluation of cryptography applications was analyzed in the face of new business requirements such as preventing endogenous data security risks, achieving differentiated privacy protection, and supporting authenticated attack traceability.The new challenges were also examined, which were brought by new information infrastructure (including big data, 5G communication, fundamental software, etc.), integration infrastructure (including intelligent connected vehicles, intelligent connected industrial control systems, etc.), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored. |
first_indexed | 2024-04-24T23:55:42Z |
format | Article |
id | doaj.art-016e2e78c0f84f5fa59af24a00c4fd5f |
institution | Directory Open Access Journal |
issn | 2096-109X |
language | English |
last_indexed | 2024-04-24T23:55:42Z |
publishDate | 2023-12-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj.art-016e2e78c0f84f5fa59af24a00c4fd5f2024-03-14T12:10:57ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2023-12-019611910.11959/j.issn.2096-109x.2023079Review of cryptographic application security evaluation techniques for new critical infrastructuresGaolei LI, Jianhua LI, Zhihong ZHOU, Hao ZHANGThe construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technologies such as 5G/6G, artificial intelligence, and blockchain in various fields.The security evaluation of cryptography applications, as a key technological resource for ensuring the security of national information, integration, and innovation infrastructure, has risen to the level of international law and national development strategy.It is urgent to construct a comprehensive, fine-grained, and self-evolving cryptography security evaluation system throughout the data lifecycle.The typical APT attacks and ransomware attacks faced by new critical infrastructure in industries such as energy, medicine, and transportation in recent years were considered.And then the growing demand for security evaluation of cryptography applications was analyzed in the face of new business requirements such as preventing endogenous data security risks, achieving differentiated privacy protection, and supporting authenticated attack traceability.The new challenges were also examined, which were brought by new information infrastructure (including big data, 5G communication, fundamental software, etc.), integration infrastructure (including intelligent connected vehicles, intelligent connected industrial control systems, etc.), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2023079new critical infrastructureapt attackcryptography applicationsecurity evaluationdomesticationintelligentization |
spellingShingle | Gaolei LI, Jianhua LI, Zhihong ZHOU, Hao ZHANG Review of cryptographic application security evaluation techniques for new critical infrastructures 网络与信息安全学报 new critical infrastructure apt attack cryptography application security evaluation domestication intelligentization |
title | Review of cryptographic application security evaluation techniques for new critical infrastructures |
title_full | Review of cryptographic application security evaluation techniques for new critical infrastructures |
title_fullStr | Review of cryptographic application security evaluation techniques for new critical infrastructures |
title_full_unstemmed | Review of cryptographic application security evaluation techniques for new critical infrastructures |
title_short | Review of cryptographic application security evaluation techniques for new critical infrastructures |
title_sort | review of cryptographic application security evaluation techniques for new critical infrastructures |
topic | new critical infrastructure apt attack cryptography application security evaluation domestication intelligentization |
url | https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2023079 |
work_keys_str_mv | AT gaoleilijianhualizhihongzhouhaozhang reviewofcryptographicapplicationsecurityevaluationtechniquesfornewcriticalinfrastructures |