Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security

Introduction. Widespread use of unmanned aerial vehicles in the civilian and military spheres requires the development of new algorithms for identification friend or foe of targets, as used in the Armed Forces of Ukraine (AFU) devices of the "Parol" system are designed to service approxima...

Full description

Bibliographic Details
Main Authors: V. Korolyov, M. Ogurtsov, A. Khodzinsky
Format: Article
Language:English
Published: V.M. Glushkov Institute of Cybernetics 2020-10-01
Series:Кібернетика та комп'ютерні технології
Subjects:
Online Access:http://cctech.org.ua/13-vertikalnoe-menyu-en/170-abstract-20-3-7-arte
_version_ 1811325684691238912
author V. Korolyov
M. Ogurtsov
A. Khodzinsky
author_facet V. Korolyov
M. Ogurtsov
A. Khodzinsky
author_sort V. Korolyov
collection DOAJ
description Introduction. Widespread use of unmanned aerial vehicles in the civilian and military spheres requires the development of new algorithms for identification friend or foe of targets, as used in the Armed Forces of Ukraine (AFU) devices of the "Parol" system are designed to service approximately 110 objects military equipment. AFU automation systems allow the use of additional sources of information about various objects from civil or special data transmission networks, which can be the basis for building a networked multi-level system of state recognition. Predictions of the development of quantum computers foresee the possibility of breaking modern algorithms for information security in polynomial time in the next 5-10 years, which requires the development and implementation of new encryption algorithms and revision of modern parameters. The purpose of the article is to develop a new algorithm for state recognition of objects, which can be scaled to process the required number of manned and unmanned aerial vehicles. Potential threats to classical cryptographic protection algorithms for data networks, which will result in the execution of algorithms such as Grover and Shore on quantum computers, were also discussed. Results. The article proposes a new multilevel algorithm of state recognition based on modern cryptographic methods of information protection, which allows to perform reliable automated identification of objects, scale systems using data on potential targets from other sources through secure special networks. Grover's search algorithm does not give a strong increase in key search performance for symmetric encryption algorithms, so there is no need to increase the key lengths for this type of information security algorithms. Post-quantum asymmetric encryption algorithms require additional study and comprehensive testing of information security or increasing the key lengths of cryptographic algorithms, which corresponds to the number of qubits, i.e. more than twice. The most promising is the family of asymmetric post-quantum cryptographic algorithms based on supersingular isogenic elliptic curves. Conclusions. The developed algorithm of identification friend or foe of objects is more secure compared to existing algorithms and is focused on the use of modern on-board computers and programmable radio modems. Shore's algorithm and the like will be a significant threat to modern asymmetric cryptography algorithms when the number of qubits of quantum computers exceeds the number of bits in public keys more than twice.
first_indexed 2024-04-13T14:37:28Z
format Article
id doaj.art-deb705b09fe64bdc9ff98a94bfde933b
institution Directory Open Access Journal
issn 2707-4501
2707-451X
language English
last_indexed 2024-04-13T14:37:28Z
publishDate 2020-10-01
publisher V.M. Glushkov Institute of Cybernetics
record_format Article
series Кібернетика та комп'ютерні технології
spelling doaj.art-deb705b09fe64bdc9ff98a94bfde933b2022-12-22T02:43:00ZengV.M. Glushkov Institute of CyberneticsКібернетика та комп'ютерні технології2707-45012707-451X2020-10-013748410.34229/2707-451X.20.3.710-34229-2707-451X-20-3-7Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information SecurityV. Korolyov0https://orcid.org/0000-0003-1143-5846M. Ogurtsov1https://orcid.org/0000-0002-6167-5111A. Khodzinsky2V.M. Glushkov Institute of Cybernetics of the NAS of Ukraine, KyivV.M. Glushkov Institute of Cybernetics of the NAS of Ukraine, KyivV.M. Glushkov Institute of Cybernetics of the NAS of Ukraine, KyivIntroduction. Widespread use of unmanned aerial vehicles in the civilian and military spheres requires the development of new algorithms for identification friend or foe of targets, as used in the Armed Forces of Ukraine (AFU) devices of the "Parol" system are designed to service approximately 110 objects military equipment. AFU automation systems allow the use of additional sources of information about various objects from civil or special data transmission networks, which can be the basis for building a networked multi-level system of state recognition. Predictions of the development of quantum computers foresee the possibility of breaking modern algorithms for information security in polynomial time in the next 5-10 years, which requires the development and implementation of new encryption algorithms and revision of modern parameters. The purpose of the article is to develop a new algorithm for state recognition of objects, which can be scaled to process the required number of manned and unmanned aerial vehicles. Potential threats to classical cryptographic protection algorithms for data networks, which will result in the execution of algorithms such as Grover and Shore on quantum computers, were also discussed. Results. The article proposes a new multilevel algorithm of state recognition based on modern cryptographic methods of information protection, which allows to perform reliable automated identification of objects, scale systems using data on potential targets from other sources through secure special networks. Grover's search algorithm does not give a strong increase in key search performance for symmetric encryption algorithms, so there is no need to increase the key lengths for this type of information security algorithms. Post-quantum asymmetric encryption algorithms require additional study and comprehensive testing of information security or increasing the key lengths of cryptographic algorithms, which corresponds to the number of qubits, i.e. more than twice. The most promising is the family of asymmetric post-quantum cryptographic algorithms based on supersingular isogenic elliptic curves. Conclusions. The developed algorithm of identification friend or foe of objects is more secure compared to existing algorithms and is focused on the use of modern on-board computers and programmable radio modems. Shore's algorithm and the like will be a significant threat to modern asymmetric cryptography algorithms when the number of qubits of quantum computers exceeds the number of bits in public keys more than twice.http://cctech.org.ua/13-vertikalnoe-menyu-en/170-abstract-20-3-7-arteidentification friend or foesymmetric encryptionasymmetric cryptographyquantum computerpost-quantum cryptography
spellingShingle V. Korolyov
M. Ogurtsov
A. Khodzinsky
Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
Кібернетика та комп'ютерні технології
identification friend or foe
symmetric encryption
asymmetric cryptography
quantum computer
post-quantum cryptography
title Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
title_full Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
title_fullStr Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
title_full_unstemmed Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
title_short Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
title_sort multilevel identification friend or foe of objects and analysis of the applicability of post quantum cryptographic algorithms for information security
topic identification friend or foe
symmetric encryption
asymmetric cryptography
quantum computer
post-quantum cryptography
url http://cctech.org.ua/13-vertikalnoe-menyu-en/170-abstract-20-3-7-arte
work_keys_str_mv AT vkorolyov multilevelidentificationfriendorfoeofobjectsandanalysisoftheapplicabilityofpostquantumcryptographicalgorithmsforinformationsecurity
AT mogurtsov multilevelidentificationfriendorfoeofobjectsandanalysisoftheapplicabilityofpostquantumcryptographicalgorithmsforinformationsecurity
AT akhodzinsky multilevelidentificationfriendorfoeofobjectsandanalysisoftheapplicabilityofpostquantumcryptographicalgorithmsforinformationsecurity