Sunteți pe pagina 1din 2

Traffic-flow security: The use of measures that conceal the presence and properties of valid messages

on a network to prevent traffic analysis. This can be done by operational procedures or by the
protection resulting from features inherent in some cryptographic equipment.

Traffic-flow Security Techniques:


1. Changing radio call signs frequently
2. Encryption of a message's sending and receiving addresses (codress messages)
3. Causing the circuit to appear busy at all times or much of the time by sending dummy traffic
sending a continuous encrypted signal, whether or not traffic is being transmitted.

Hidden Traffic Flow: It is assumed that eavesdropper can detect the transmission, but can’t understand
the encrypted message being sent. Still eavesdropper can still deduce the information about the
network like “Analyze traffic flow and detect the changes in traffic pattern.” and “Deduce the original
sender of message.” and “Correlate traffic pattern with observable activities.”
Thus hiding traffic flow technique has been used to protect the same. For that “Transmitter schedules
generator (TSG)” and “Link decision generator (LDG)” are used.
Input to TSG is Network Topology
Inputs to LDG are TSG, Network Topology and Traffic Demand.

For actual Traffic flow Link decision generator are used, which is Hidden Traffic flow. And Eavesdropper
will only access TSG. By using this traffic flow is save.
Drawback: Reduced in the throughput, as its schedule in advance.

HAVE QUICK: HAVE QUICK is the codename of an American Frequency Hopping system. It is used for the
protection of military UHF radio traffic, such as air-to-air and ground-to-air communications in the 225-
400 MHz band. It was introduced in 1980 as an Electronic Counter Counter-Measure (ECCM) after it
became clear in the 1970s that aircraft communication could easily be intercepted and jammed by a
third party with inexpensive means.
As most of the radios used in aircraft communication were already synthesizer-based, it was relatively
easy to add frequency hopping to it. As of 2007, nearly all US military aircraft use HAVE QUICK frequency
hopping.
Cryptography: HAVE QUICK radios use a very complex frequency hopping scheme that is extremely
difficult to predict. It is linked to the actual time of day (TOD) and requires a very accurate clock. Usually,
a GPS receiver is used for this. At the heart of the system is a microprocessor-based cryptographic
pseudo-random number generator that is initiated with:
 TOD - Time of Day
 WOD - Word of Day
 NET - Net number
The WOD is used as a key and the NET number allows multiple nets to use the same WOD. Together,
TOD, WOD and NET are used as input (seed) to the pseudo-random number generator that controls the
frequency changes. Please note that HAVE QUICK itself is not an encryption system, but an ECCM
(electronic counter counter-measure). It can, however, be used in combination with encryption systems,
such as the (KY-57=../../crypto/usa/ky57/index.htm}

S-ar putea să vă placă și