Abstract

The tasks of secure generating, distributing, and delivering keys to telecommunications systems correspondents that use cryptographic methods to protect information, along with accounting tasks, use order, and keys destruction are fundamental to the key life cycle task list. Traditionally, they are solved using secure communication channels, which is not economical, not always timely and in certain conditions impossible. The alternatives are key negotiation methods by transmitting information over open communication channels. The information efficiency accurate estimates are represented for some methods of open key agreement between two legitimate correspondents. They are not known for the network key formation conditions. The study purpose: an evidence-based search for potential evaluations of the open network key generation information effectiveness. The results: based on a set of represented results (including problem statement, intruder models development, channel connectivity, coder, decoder, system of quality indicators and key forming method requirements, key generation method, the network key generation asymptotic information efficiency index, proof key capacity theorem), an asymptotic information efficiency index estimate of a network key forming was made, which the key network bandwidth measurement based on the information exchange on a binary broadcast channel of communication with the component channels described by discrete symmetric channels models is proposed. Besides, Broadcast channel entropy function influence on the estimate is investigated. The pattern determining the network key forming possibility that meets the requirements is identified. The connection of the results with known scientific research is identified. The areas for further research are identified. The practical significance: the obtained results develop the wellknown scientific results in the field of the open key agreement theory and can be useful to specialists in the design and construction field of promising key management subsystems of modern cryptographic information protection systems that provide a closed telecommunication systems information exchange.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call