Page 108 - Cyber Defense eMagazine January 2023
P. 108

As illustrated in Figure 1 there is a two-way communication between two workstations where both users
            have some cryptographic software with their devices encrypting and decrypting data with such an asset
            and  talking  with  each  one  via  unprotected  communication  line.  As  that  open  communication  is  not
            secured some skillful cryptanalyst can so some streaming of that information exchange trying to decrypt
            once collected findings. Also, there is some risk about endpoint security as if there is no active cyber
            defense any equipped hacker can make a breach into such an object just stealing plaintext data before
            they are transformed into ciphertext. In other words, there is no an absolute security as everything is
            about the best practice in threat management. Above all, if an idea on static absorber [17] finds its place
            in practice it’s possible to think about better endpoint security which means more active defense and
            higher level of automation in coming days.




            Link encryption

            Link cryptography is attribute of competitive defense industries as it’s quite trickery to develop and deploy
            such  an  encryption  system.  In  that  case,  users  in  network  can  communicate  through  encrypted
            communication line sending to one another plaintext data. From a perspective of cryptanalysis, it means
            such an opponent might deal with some difficulties to catch such data, while being in transfer. On the
            other hand, overall challenge of endpoint security is still unresolved. The graphical representation of such
            a grid is provided in Figure 2 as follows.




























            Figure 2 – Link encryption system



            The  most  challenging  thing  in  link  cryptosystem  design  is  how  to  make  a  protection  shield  around
            transferred plaintext data. In such a case, it’s needed to understand some mathematics, as well as cope
            with great programming skill. Point in such a fashion is to figure out how matrix theory works, as well as
            get how such mathematics can contribute to any developer’s language. In other words, it’s necessary to




            Cyber Defense eMagazine – January 2023 Edition                                                                                                                                                                                                       108
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   103   104   105   106   107   108   109   110   111   112   113