Page 108 - Cyber Defense eMagazine January 2023
P. 108
As illustrated in Figure 1 there is a two-way communication between two workstations where both users
have some cryptographic software with their devices encrypting and decrypting data with such an asset
and talking with each one via unprotected communication line. As that open communication is not
secured some skillful cryptanalyst can so some streaming of that information exchange trying to decrypt
once collected findings. Also, there is some risk about endpoint security as if there is no active cyber
defense any equipped hacker can make a breach into such an object just stealing plaintext data before
they are transformed into ciphertext. In other words, there is no an absolute security as everything is
about the best practice in threat management. Above all, if an idea on static absorber [17] finds its place
in practice it’s possible to think about better endpoint security which means more active defense and
higher level of automation in coming days.
Link encryption
Link cryptography is attribute of competitive defense industries as it’s quite trickery to develop and deploy
such an encryption system. In that case, users in network can communicate through encrypted
communication line sending to one another plaintext data. From a perspective of cryptanalysis, it means
such an opponent might deal with some difficulties to catch such data, while being in transfer. On the
other hand, overall challenge of endpoint security is still unresolved. The graphical representation of such
a grid is provided in Figure 2 as follows.
Figure 2 – Link encryption system
The most challenging thing in link cryptosystem design is how to make a protection shield around
transferred plaintext data. In such a case, it’s needed to understand some mathematics, as well as cope
with great programming skill. Point in such a fashion is to figure out how matrix theory works, as well as
get how such mathematics can contribute to any developer’s language. In other words, it’s necessary to
Cyber Defense eMagazine – January 2023 Edition 108
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.