Page 107 - Cyber Defense eMagazine January 2023
P. 107

cryptosystems  as  such  sophisticated  technologies  are  the  future  of  upcoming  engineering.  Those
            projects must be pushed through deep preparation and research before some team of engineers begins
            to work hard on their development. As AI and ML are beyond a scope of this effort it’s clear there will be
            no  suggestions  in  such  a  sense  as  this  paper  will  only  provide  some  so  necessary  mathematical
            modelling which just can help to engineering working groups to better understand cryptology and in that
            manner give their full effort to those technical projects. As it is suggested major accent of this report will
            be put on some best practices in link encryption, but main novelty of this research is neutralizing link
            cryptography  which  through  careful  software  design  can  significantly  protect  such  an  information
            transmission. From that point of view, programming languages and other cutting-edge tools are only
            resources  in  obtaining  such  a  mathematically  defined  task  that  can  be  resolved  only  via  long-term
            commitment, so far. In other words, this new access can impact many areas of industry such as defense,
            cyber and space industry that are always pioneering fields of progress anywhere over the world.



            End-to-end cryptography

            Practically, there are three main encryption techniques being applied in military cryptography. Those are
            end-to-end (E2E), link and combined encryption which will be illustrated and modeled through this effort
            with an intention to make good research preparations for next phases of production cycle. E2E encryption
            assumes some transformation of binary data using some mathematical rule either making shift of bits
            which is called cryptographic key or getting encrypted output simply applying logic functions when in such
            a case for a unique set of inputs is provided a unique set of outputs in any instance of cryptography [15].
            The graphical illustration of given in Figure 1 as follows.




























            Figure 1 – E2E encryption communication










            Cyber Defense eMagazine – January 2023 Edition                                                                                                                                                                                                       107
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   102   103   104   105   106   107   108   109   110   111   112