Design and development of a secure military communication based on AES prototype crypto algorithm and advanced key management scheme

  • Authors:
  • Nikolaos G. Bardis;Nikolaos Doukas;Konstantinos Ntaikos

  • Affiliations:
  • University of Military Education, Hellenic Army Academy, Vari and Hellenic Naval Academy, Piraeus and Hellenic Air Force Academy, Dekelia Air Base, Tatoi, Metamorfosi, Greece;University of Military Education, Hellenic Army Academy, Vari and Hellenic Air Force Academy, Dekelia Air Base, Tatoi, Metamorfosi, Greece;University of Military Education, Hellenic Air Force Academy, Department of Computer Sciences, Dekelia Air Base, Tatoi, Metamorfosi, Greece

  • Venue:
  • WSEAS Transactions on Information Science and Applications
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this article, a study is presented that aims at the development of a prototype system for the secure real-time exchange of messages between users of workstations connected to the same TCP/IP network. The security is provided based on the AES prototype cryptographic algorithm. An advanced key management scheme is used within this system that enhances the security of the system, reduced the effects of possible security breaches and simultaneously hides from users the unnecessary complexity related to handling multiple encryption keys. The scope of application is military units and is intended to become the basis for the design and development of an integrated framework for the exchange of secure messages between different sites of military or other organizations that are concerned about information security. The present design is limited in its application to local area networks only. There are however no fundamental restrictions and an expansion to wide area networks and the internet is also possible. The design of the application is firstly presented. Problems of security and ease of use that are related to the management of the secret encryption keys are explained. A solution is hence presented for these problems, that is based on an innovative scheme for key storage and management. The design and implementation of the application is presented in detail along with description of its basic functionality. The plans for application and further development of the application are described and conclusions are finally drawn.