Implementation of Message Encryption Algorithms in Real Time Closed Network Systems

Implementation of Message Encryption Algorithms in Real Time Closed Network Systems

In the case of messaging systems used in closed network systems in military and other systems, encryption processes are generally not needed.Since these systems are usually real-time systems, interpretation of messages (encryption of the message and decriyption of the message) will adversely affect time synchronization and traceability. However, this situation also causes significant security vulnerabilities in such critical systems. In this study, different encryption methods were applied to the messaging structures used in military real - time closed network systems.The effects of these applied cipher methods on performance were made by creating three different test environments and the results obtained are presented in detail.

___

  • Reference1. M. BLUM AND S. GOLDWASSER, “An efficient probabilistic public-key encryption scheme which hides all partial information,” Advances in Cryptology — Crypto 84 Proceedings, Lecture Notes in Computer Science Vol. 196, Springer-Verlag, B. Blakley, ed., 1985.Reference2. M., Baykara, R., Daş, ve İ. Karadoğan, (2013, May). Bilgi Güvenliği Sistemlerinde Kullanılan Araçların İncelenmesi. In 1st International Symposium on Digital Forensics and Security (pp. 231-239). Reference3. N.Topaloğlu, M.H.Calp, B. Turk, Bilgi Güvenliği Kapsamında Yeni Bir Veri Şifreleme Algoritması Tasarımı ve Gerçekleştirilmesi, Bilişim Teknolojileri Dergisi, Cilt: 9, Sayı: 3, Eylül 2016 Reference4. http://bidb.itu.edu.tr/seyirdefteri/blog/2013/09/07/%C5%9Fifreleme-y%C3%B6ntemleri, Ocak 2018, Online Reference5. Yerlikaya T., Buluş E., Arda D., ‘Asimetrik Kripto Sistemler Ve Uygulamaları’ II. Mühendislik Bilimleri Genç Araştırmacılar KongresiMBGAK'2005, İstanbul-TÜRKİYE Reference6. T.Yerlikaya, E.Buluş, N.Buluş , Asimetrik Şifreleme Algoritmalarinda Anahtar Degisim Sistemleri,http://ab.org.tr/ab06/bildiri/102.pdf,Ocak 2018,OnlineReference7.M Yilmaz, S.Balli Veri Isleme Algoritmalarinin Kullanimi Icin Akilli Bir Secim Sistemi Gelistirilmesi, Uluslararası Bilgi Güvenliği Mühendisliği Dergisi, Cilt:2, No:2, S:18-28, 2016 Reference8. http://anibal.gyte.edu.tr/hebe/AblDrive/59669005/w/Storage/104_2011_1_470_59669005/Downloads/bl470-b1-4.pdf, Ocak 2018, Online Reference9. M. BELLARE, J. KILIAN AND P. ROGAWAY, “The security of cipher block chaining.” Advances in Cryptology — Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994. Reference10. R. RIVEST, “The MD5 message-digest algorithm,” IETF Network Working Group, RFC 1321, April 1992. Reference11. M. NAOR AND M. YUNG, “Public-key cryptosystems provably secure against chosen ciphertext attacks,” Proceedings of the Twenty Second Annual Symposium on the Theory of Computing, ACM, 1990. Reference12. A.Avcioglu, M.Demirer, Implementation of system testing automatization on computer aided systems for hardware and software, 2015 Reference13. C.Adams, “Constructing symmetric ciphers using the CAST design procedure” DDesigns Codes and Cryptography, vol. 12,pp.71-104,1997