Page 107 - Cyber Defense eMagazine January 2023
P. 107
cryptosystems as such sophisticated technologies are the future of upcoming engineering. Those
projects must be pushed through deep preparation and research before some team of engineers begins
to work hard on their development. As AI and ML are beyond a scope of this effort it’s clear there will be
no suggestions in such a sense as this paper will only provide some so necessary mathematical
modelling which just can help to engineering working groups to better understand cryptology and in that
manner give their full effort to those technical projects. As it is suggested major accent of this report will
be put on some best practices in link encryption, but main novelty of this research is neutralizing link
cryptography which through careful software design can significantly protect such an information
transmission. From that point of view, programming languages and other cutting-edge tools are only
resources in obtaining such a mathematically defined task that can be resolved only via long-term
commitment, so far. In other words, this new access can impact many areas of industry such as defense,
cyber and space industry that are always pioneering fields of progress anywhere over the world.
End-to-end cryptography
Practically, there are three main encryption techniques being applied in military cryptography. Those are
end-to-end (E2E), link and combined encryption which will be illustrated and modeled through this effort
with an intention to make good research preparations for next phases of production cycle. E2E encryption
assumes some transformation of binary data using some mathematical rule either making shift of bits
which is called cryptographic key or getting encrypted output simply applying logic functions when in such
a case for a unique set of inputs is provided a unique set of outputs in any instance of cryptography [15].
The graphical illustration of given in Figure 1 as follows.
Figure 1 – E2E encryption communication
Cyber Defense eMagazine – January 2023 Edition 107
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.