Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building
The year 2022 showed an urgent need to improve the existing systems for recognizing objects in the aerial space, which is caused by the significant increase in the number of technical means (especially unmanned aerial vehicles) on the battlefield. Such a sharp increase in the number of objects that...
Saved in:
Date: | 2023 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Published: |
Інститут програмних систем НАН України
2023
|
Subjects: | |
Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/539 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Journal Title: | Problems in programming |
Institution
Problems in programmingid |
pp_isofts_kiev_ua-article-539 |
---|---|
record_format |
ojs |
resource_txt_mv |
ppisoftskievua/d7/29e340fc40c635098f922ffa2715e4d7.pdf |
spelling |
pp_isofts_kiev_ua-article-5392023-06-25T07:58:42Z Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building Розробка алгоритму державного впізнавання типу «свій-чужий» для побудови відповідного програмного забезпечення Ogurtsov, M.I. vehicles recognition; friend-or-foe; cryptography; cryptanalysis; UAV UDC 004.78 державне впізнавання; свій-чужий; криптографія; криптоаналіз; БПЛА УДК 004.78 The year 2022 showed an urgent need to improve the existing systems for recognizing objects in the aerial space, which is caused by the significant increase in the number of technical means (especially unmanned aerial vehicles) on the battlefield. Such a sharp increase in the number of objects that simultaneously take part in combat operations in the air requires the improvement of military object recognition systems, both qualitatively and quantitatively. This requires the development of appropriate new generation Friend-or-Foe algorithms for the objects’ recognition.The main requirements for recognition systems of aerial objects of civil application were determined. They includes: maximum com- patibility; support for a large number of objects; outdated recognition complexes support; support for alternative ways of recognition; support for alternative data entry methods; determining the coordinates of aerial objects in an emergency situation.Friend-or-foe recognition systems for military applications are also considered. In contrast to civilian systems, the following basic requirements have been identified for them: 1) Maximum speed of the recognition process. 2) Protection against false positives. 3) Protection against legitimate aerial object imitation. 4) Support for a large number of objects. 5) Protection against cases of loss of a legitimate aerial object. 6) Rotation of the secret part. 7) Protection against false-negative results to prevent friendly fire. 8) Protection against man-in-the-middle attacks. 9) Flexible integration with the NATO block recognition system. 10) Availability of opportunities for purely domestic production and support of the object recognition system. 11) Protection against electronic warfare means. 12) Support for several recognition modes. 13) Automatic blocking of the launch of ground-to-air and air-to-air weapons against objects that confirm their legitimacy by a correct response to a request. 14) Determining the coordinates of aerial objects in an emergency.Based on the formulated requirements, a new friend-or-foe algorithm for the state identification system for military use is proposed, built based on the state standards, and taking into account the features of its software implementation in order to increase speed. Its implementation will ensure sufficient scalability, stability, reliability, and multi-level recognition.Prombles in programming 2022; 3-4: 387-395 2022 рік показав нагальну необхідність вдосконалення існуючих систем впізнавання об’єктів типу «свій-чужий», що виклика- на зростанням кількості технічних засобів (особливо – безпілотних) на полі бою. Таке різке зростання кількості об’єктів, що водночас приймають участь в бойових діях у повітрі, потребує вдосконалення систем впізнавання військових об’єктів як за якісними, так і за кількісними показниками. Це вимагає розробки відповідних алгоритмів ідентифікації об’єктів типу «свій- чужий» нового покоління.Виділено основні вимоги до систем впізнавання повітряних об’єктів цивільного застосування. Вони включають: максимальну сумісність; підтримку великої кількості об’єктів; підтримку застарілих комплексів впізнавання; підтримка альтернативних шляхів впізнавання; підтримку альтернативних методів введення даних та визначення координат повітряних об’єктів в аварійній ситуації.Також розглянуто системи впізнавання типу «свій-чужий» для військових застосувань. На відміну від цивільних систем, для них виділено такі основні вимоги: 1) Максимально висока швидкодія процесу впізнавання. 2) Захищеність від помилково-позитивних спрацювань.3) Захищеність від імітації роботи відповідача легітимного повітряного об’єкту. 4) Підтримка великої кількості об’єктів. 5) Захищеність від випадків втрати легітимного повітряного об’єкту. 6) Ротація секретної частини. 7) Захищеність від помилково-негативного спрацювання для запобігання дружньому вогню. 8) Захищеність від атак типу «man in the middle». 9) Гнучка можливість інтеграції з системою впізнавання блоку НАТО. 10) Наявність можливостей суто вітчизняного виробництва та супровіду системи впізнавання об’єктів. 11) Захищеність від засобів РЕБ. 12) Підтримка декількох режимів впізнавання. 13) Автоматичне блокування пуску засобів ураження типу «земля-повітря» та «повітря-повітря» по об’єктам, що підтверджують свою легітимність правильною відповіддю на запит. 14) Визначення координат повітряних об’єктів в аварійній ситуації.На основі сформульованих вимог запропоновано новий алгоритм захисту інформації для системи державного впізнавання для військових об’єктів, побудований на основі державних стандартів та з урахуванням особливостей його програмної реалізації з метою підвищення швидкодії, що забезпечуватиме достатню масштабованість, стійкість, надійність та багаторівневість впізнавання.Prombles in programming 2022; 3-4: 387-395 Інститут програмних систем НАН України 2023-01-23 Article Article application/pdf https://pp.isofts.kiev.ua/index.php/ojs1/article/view/539 10.15407/pp2022.03-04.387 PROBLEMS IN PROGRAMMING; No 3-4 (2022); 387-395 ПРОБЛЕМЫ ПРОГРАММИРОВАНИЯ; No 3-4 (2022); 387-395 ПРОБЛЕМИ ПРОГРАМУВАННЯ; No 3-4 (2022); 387-395 1727-4907 10.15407/pp2022.03-04 en https://pp.isofts.kiev.ua/index.php/ojs1/article/view/539/592 Copyright (c) 2023 PROBLEMS IN PROGRAMMING |
institution |
Problems in programming |
baseUrl_str |
https://pp.isofts.kiev.ua/index.php/ojs1/oai |
datestamp_date |
2023-06-25T07:58:42Z |
collection |
OJS |
language |
English |
topic |
vehicles recognition friend-or-foe cryptography cryptanalysis UAV UDC 004.78 |
spellingShingle |
vehicles recognition friend-or-foe cryptography cryptanalysis UAV UDC 004.78 Ogurtsov, M.I. Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building |
topic_facet |
vehicles recognition friend-or-foe cryptography cryptanalysis UAV UDC 004.78 державне впізнавання свій-чужий криптографія криптоаналіз БПЛА УДК 004.78 |
format |
Article |
author |
Ogurtsov, M.I. |
author_facet |
Ogurtsov, M.I. |
author_sort |
Ogurtsov, M.I. |
title |
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building |
title_short |
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building |
title_full |
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building |
title_fullStr |
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building |
title_full_unstemmed |
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building |
title_sort |
friend-or-foe recognition algorithm development for the corresponding software building |
title_alt |
Розробка алгоритму державного впізнавання типу «свій-чужий» для побудови відповідного програмного забезпечення |
description |
The year 2022 showed an urgent need to improve the existing systems for recognizing objects in the aerial space, which is caused by the significant increase in the number of technical means (especially unmanned aerial vehicles) on the battlefield. Such a sharp increase in the number of objects that simultaneously take part in combat operations in the air requires the improvement of military object recognition systems, both qualitatively and quantitatively. This requires the development of appropriate new generation Friend-or-Foe algorithms for the objects’ recognition.The main requirements for recognition systems of aerial objects of civil application were determined. They includes: maximum com- patibility; support for a large number of objects; outdated recognition complexes support; support for alternative ways of recognition; support for alternative data entry methods; determining the coordinates of aerial objects in an emergency situation.Friend-or-foe recognition systems for military applications are also considered. In contrast to civilian systems, the following basic requirements have been identified for them: 1) Maximum speed of the recognition process. 2) Protection against false positives. 3) Protection against legitimate aerial object imitation. 4) Support for a large number of objects. 5) Protection against cases of loss of a legitimate aerial object. 6) Rotation of the secret part. 7) Protection against false-negative results to prevent friendly fire. 8) Protection against man-in-the-middle attacks. 9) Flexible integration with the NATO block recognition system. 10) Availability of opportunities for purely domestic production and support of the object recognition system. 11) Protection against electronic warfare means. 12) Support for several recognition modes. 13) Automatic blocking of the launch of ground-to-air and air-to-air weapons against objects that confirm their legitimacy by a correct response to a request. 14) Determining the coordinates of aerial objects in an emergency.Based on the formulated requirements, a new friend-or-foe algorithm for the state identification system for military use is proposed, built based on the state standards, and taking into account the features of its software implementation in order to increase speed. Its implementation will ensure sufficient scalability, stability, reliability, and multi-level recognition.Prombles in programming 2022; 3-4: 387-395 |
publisher |
Інститут програмних систем НАН України |
publishDate |
2023 |
url |
https://pp.isofts.kiev.ua/index.php/ojs1/article/view/539 |
work_keys_str_mv |
AT ogurtsovmi friendorfoerecognitionalgorithmdevelopmentforthecorrespondingsoftwarebuilding AT ogurtsovmi rozrobkaalgoritmuderžavnogovpíznavannâtipusvíjčužijdlâpobudovivídpovídnogoprogramnogozabezpečennâ |
first_indexed |
2025-07-17T10:07:17Z |
last_indexed |
2025-07-17T10:07:17Z |
_version_ |
1838410645436891136 |
fulltext |
387
Захист інформації
UDC 004.78 http://doi.org/10.15407/pp2022.03-04.387
FRIEND-OR-FOE RECOGNITION
ALGORITHM DEVELOPMENT FOR
THE CORRESPONDING SOFTWARE BUILDING
Maksym Ogurtsov
2022 рік показав нагальну необхідність вдосконалення існуючих систем впізнавання об’єктів типу «свій-чужий», що виклика-
на зростанням кількості технічних засобів (особливо – безпілотних) на полі бою. Таке різке зростання кількості об’єктів, що
водночас приймають участь в бойових діях у повітрі, потребує вдосконалення систем впізнавання військових об’єктів як за
якісними, так і за кількісними показниками. Це вимагає розробки відповідних алгоритмів ідентифікації об’єктів типу «свій-
чужий» нового покоління.
Виділено основні вимоги до систем впізнавання повітряних об’єктів цивільного застосування. Вони включають: максимальну
сумісність; підтримку великої кількості об’єктів; підтримку застарілих комплексів впізнавання; підтримка альтернативних
шляхів впізнавання; підтримку альтернативних методів введення даних та визначення координат повітряних об’єктів в ава-
рійній ситуації.
Також розглянуто системи впізнавання типу «свій-чужий» для військових застосувань. На відміну від цивільних систем, для
них виділено такі основні вимоги:
1) Максимально висока швидкодія процесу впізнавання.
2) Захищеність від помилково-позитивних спрацювань.
3) Захищеність від імітації роботи відповідача легітимного повітряного об’єкту.
4) Підтримка великої кількості об’єктів.
5) Захищеність від випадків втрати легітимного повітряного об’єкту.
6) Ротація секретної частини.
7) Захищеність від помилково-негативного спрацювання для запобігання дружньому вогню.
8) Захищеність від атак типу «man in the middle».
9) Гнучка можливість інтеграції з системою впізнавання блоку НАТО.
10) Наявність можливостей суто вітчизняного виробництва та супровіду системи впізнавання об’єктів.
11) Захищеність від засобів РЕБ.
12) Підтримка декількох режимів впізнавання.
13) Автоматичне блокування пуску засобів ураження типу «земля-повітря» та «повітря-повітря» по об’єктам, що підтверджу-
ють свою легітимність правильною відповіддю на запит.
14) Визначення координат повітряних об’єктів в аварійній ситуації.
На основі сформульованих вимог запропоновано новий алгоритм захисту інформації для системи державного впізнавання для
військових об’єктів, побудований на основі державних стандартів та з урахуванням особливостей його програмної реаліза-
ції з метою підвищення швидкодії, що забезпечуватиме достатню масштабованість, стійкість, надійність та багаторівневість
впізнавання.
Ключові слова: державне впізнавання, свій-чужий, криптографія, криптоаналіз, БПЛА.
The year 2022 showed an urgent need to improve the existing systems for recognizing objects in the aerial space, which is caused by
the significant increase in the number of technical means (especially unmanned aerial vehicles) on the battlefield. Such a sharp increase
in the number of objects that simultaneously take part in combat operations in the air requires the improvement of military object
recognition systems, both qualitatively and quantitatively. This requires the development of appropriate new generation Friend-or-Foe
algorithms for the objects’ recognition.
The main requirements for recognition systems of aerial objects of civil application were determined. They includes: maximum com-
patibility; support for a large number of objects; outdated recognition complexes support; support for alternative ways of recognition;
support for alternative data entry methods; determining the coordinates of aerial objects in an emergency situation.
Friend-or-foe recognition systems for military applications are also considered. In contrast to civilian systems, the following basic
requirements have been identified for them:
1) Maximum speed of the recognition process.
2) Protection against false positives.
3) Protection against legitimate aerial object imitation.
4) Support for a large number of objects.
5) Protection against cases of loss of a legitimate aerial object.
6) Rotation of the secret part.
7) Protection against false-negative results to prevent friendly fire.
8) Protection against man-in-the-middle attacks.
9) Flexible integration with the NATO block recognition system.
10) Availability of opportunities for purely domestic production and support of the object recognition system.
11) Protection against electronic warfare means.
12) Support for several recognition modes.
13) Automatic blocking of the launch of ground-to-air and air-to-air weapons against objects that confirm their legitimacy by a correct
response to a request.
14) Determining the coordinates of aerial objects in an emergency.
Based on the formulated requirements, a new friend-or-foe algorithm for the state identification system for military use is proposed,
built based on the state standards, and taking into account the features of its software implementation in order to increase speed. Its
implementation will ensure sufficient scalability, stability, reliability, and multi-level recognition.
Keywords: vehicles recognition, friend-or-foe, cryptography, cryptanalysis, UAV.
© М.І. Огурцов, 2022
ISSN 1727-4907. Проблеми програмування. 2022. № 3-4. Спеціальний випуск
388
Захист інформації
The year 2022 showed an urgent need to improve the existing systems for recognizing objects in the aerial
space, which is caused by the significant increase in the number of technical means (especially unmanned aerial vehi-
cles) on the battlefield. Thus, the creation of an army of drones was announced in Ukraine [1]. This concept focused on
procurement, repair and replacement of the massive number of UAVs. At the first stage of the program implementation
200 tactical level UAVs will be purchased for air reconnaissance. At the second stage each unit of the Armed Forces
will have its own reconnaissance UAV.
It should be considered that this will lead to a huge increase of the UAVs number that could simultaneously be
in the airspace control zone. Also, in addition to the tactical reconnaissance UAVs of the Armed Forces units, strategic
reconnaissance UAVs, reactive and ballistic missiles can be present in the same airspace – and all this together with the
usual airplanes and helicopters. And then this number should be at least doubled – to consider the corresponding number
of enemy targets in the air.
Such a sharp increase in the number of objects that simultaneously takes part in combat operations in the air
requires the improvement of military object recognition systems, both qualitatively and quantitatively. This requires
the development of appropriate new generation Friend-or-Foe algorithms for the objects’ recognition.
It is also necessary to consider the fundamental differences in the requirements for the aerial objects recogni-
tion systems of civil and military use. When describing them, let us use the definition “legitimate aerial object” – this is
an aerial object that has the right to be in the given airspace, has a working respondent of the aerial objects identifica-
tion system and provides correct answers to requests from the identification center.
The main requirements for recognition systems of civil application aerial objects
Let’s determine the main requirements for recognition systems of civil application aerial objects (responders
for the civil air traffic control system):
1) Maximum compatibility. The identification system must determine the identity of every aerial object, in-
cluding aircrafts and helicopters of large and small airlines from around the world plus ones that belong to the private
owners.
2) Support for a large number of objects. In connection with the number of aerial vehicles increase, aerial
object recognition systems (especially when used at large airports) must support the processing of many aerial targets
at the same time.
3) Outdated recognition complexes support. The civil air traffic control system must support cases when a
request is received from an aerial object is based on an outdated recognition algorithm – to be able to correctly process
the received response and determine the object’s ownership.
4) Support for alternative ways of recognition. In the case when automatic recognition of an aerial object has
failed, the controller must be able to find out the ownership of the aerial object using an alternative way. This usually
could be done by manual request using radio communication.
5) Support for alternative data entry methods. In the case when the object’s ownership was determined by an alter-
native way, the operator should be able to enter the received information into the system manually, so that other operators
wouldn’t have to use alternative identification methods again.
6) Determining the coordinates of aerial objects in an emergency situation. This should happen when the aerial
object sends a special “Alarm” signal or a distress signal.
The main requirements for recognition systems of military application aerial objects
Now let’s consider the difference with the recognition systems made for military applications. The basic opera-
tional principle of any modern government identification system used in military applications is to process the incom-
ing request according to a formula that is a cryptographic secret and changes regularly (for example, every 24 hours).
In contrast to civil systems, the following basic requirements have been identified for them:
1) Maximum recognition process speed. Since the situation on the battlefield changes very quickly, and for
air combat this statement is even more relevant, any delay in the recognition process can lead to losses, even human
losses. So, for example, for anti-aircraft missile systems, the target’s stay in the affected zone usually does not exceed
a few tens of seconds. This is especially relevant for UAVs, as UAVs usually have very strict limitations on the amount
of free space for installing the recognition system, and its weight and power consumption – and, accordingly, on speed
and the amount of available memory for this system. So, the development process of the software component of this
system should take this into account.
2) Protection against false positives. For civil applications, cases of trying to pretend that aerial object is not
what it is truly is theoretically unlikely (and without involvement in military applications have not yet occurred) - be-
cause in such situation the aerial object owner will not be able to avoid responsibility and will lose a large amount of
money in fines and lawsuits. On the other hand, in military applications, since the enemy is most interested in pretend-
ing that its aerial objects are belong to us (and therefore – avoiding facing anti-aircraft defense system) so it is ready to
spend almost unlimited time and resources for this, and the result of a false-positive result of the aerial object recogni-
tion can be airstrikes and human casualties, then protection against such situations should be the highest priority of the
state recognition system.
3) Protection against response imitation of a legitimate aerial object. Since the entire exchange of information in
the state identification system “friend-or-foe” is carried out through the radio air, it is quite possible that all the data circu-
389
Захист інформації
lating between the legitimate aerial object that gives a correct answer to the “friend-or-foe” request, and the recognition
center on the ground, can be intercepted by the enemy. After that, the enemy can try to simply repeat the same responses
to requests from the recognition center or try to change them in a way that simulates a legitimate aerial object’s response.
That is why the state identification system must be reliably protected against this type of attacks.
4) Support for a large number of objects. As already mentioned above, “friend-or-foe” military identification
system must support the simultaneous recognition of multiple aerial objects of different types to determine the identity
of aircraft, helicopters, UAVs and their swarms and cruise missiles in a timely manner.
5) Protection against cases of a legitimate air object loss. This requirement should be considered if a legitimate
air object was shot down over the enemy territory or fell into the enemy’s hands by some other way. If there is no such
protection, then the situation described above will lead to the entire “friend-or-foe” identification system compromise
and the state will have to replace it on all legitimate aerial objects and recognition centers. Such situation has already
happened in the past, for example, in the Soviet Union [2]. Thus, it is not the answer itself that should be secret, but
the information held inside it, and it should be possible to easily replace it without changing any hardware – just with
the software update.
6) Rotation of the secret part. To prevent the possibility of theft of the “friend-or-foe” system secret part, for
a government identification system of military application, the secret part rotation should take place on a permanent
basis. Normally, the recommended value is to change the secret answer every day. This requirement overlaps with and
complements the previous requirement.
7) Protection against false-negative results to prevent friendly fire. As already mentioned above, the exchange
of questions and answers with the aerial object takes place through the radio air. In the case of military operations,
such an exchange is usually complicated (for example, by using electronic warfare (EW) means, both friendly and
hostile). But the “friend-or-foe” recognition complex must work as reliably as possible to prevent non-recognition
of the correct answer from a legitimate aerial object (for example, due to non-receipt or partial arrival of the correct
answer to the recognition center due to the EW means effect). This problem is very relevant to prevent the activation
of, for example, anti-aircraft weapons against friendly targets (the so-called “friendly fire”). The problem may seem
far-fetched – but, for example, the US troops during the operation “Desert Storm” in 1991 suffered 23% of all losses
from “friendly fire” [3].
8) Protection against man-in-the-middle attacks. Consider the following situation: a legitimate aerial object is
over territory controlled by an enemy. The recognition center is far from it, and there is no direct connection between
them at the moment (for example, due to the effect of EW means). Somewhere in the territory between the legitimate
aerial object and the recognition center there is situated an enemy ground complex equipped with a radio communica-
tion system. Also, there is an enemy aerial object moving to our aerial space. Our recognition complex sends a recogni-
tion request to the enemy’s aerial object. It relays the request to the enemy’s ground complex, which transmits it to the
legitimate aerial object. The legitimate object sends a response, which is again relayed from the enemy’s recognition
center to enemy’s aerial object. And the object relays this response to the legitimate recognition center. As a result,
the recognition center will consider the enemy aerial object to be legitimate – so we have a false positive result of the
“friend-or-foe” recognition.
9) Flexible integration with the NATO block recognition system. Since Ukraine is on course for Euro-Atlantic
integration and is rapidly moving to NATO standards, in the future there will be a moment when it must integrate the
military object recognition system with the corresponding system of NATO countries – for international trainings and
operations.
10) Purely domestic “friend-or-foe” recognition system production and support. If for civil systems it is pos-
sible to purchase the system (as a whole or its components) abroad, but for the military recognition system such an
approach is inadmissible due to the increased risks of information leakage to potential enemies.
11) Protection against EW means. This requirement relates to several others and determines that the “friend-
or-foe” recognition system must work and determine the belonging of aerial objects even in the case of active use of
radio-electronic warfare.
12) Support for several recognition modes. Usually, when identifying military objects, the support of such re-
quests as “Where are you?” and “Who are you?” must be ensured. In addition, standard and control recognition modes
should be supported (to detect enemy air objects that use interference against recognition means).
13) Automatic blocking of the ground-to-air and air-to-air means of attack launch against objects that confirm
their legitimacy by a correct response to a recognition request.
14) Determining the coordinates of aerial objects in an emergency situation. The special signal “Alarm” must
be general and unchanged in all situations – and the signal about any happening accident as well – and can be accom-
panied by additional useful information.
The only overlap in the requirements for the recognition systems of civilian and military objects are the sup-
port of a large number of objects and special signals for emergency situations.
Current situation analysis – advantages and disadvantages of the current “friend-or-foe”
object recognition system
To date, the “Parol-M” hardware/software complex, which is a modification of the Soviet Union system, developed
in the 1980s and was itself developed as a replacement for the long-outdated “Kremniy-2” (2M) complex, which supported
only 10 requesters and 10 respondents at the same time.
390
Захист інформації
The technical capabilities of the “ Parol-M” complex provide for the simultaneous recognition of up to 110
requesters and 110 responders [4]. At the same time, a similar system in the NATO countries– MarkXII – performs 400
polls per second in the nominal mode [5].
Advantages of the “friend-or-foe” identification system currently used in Ukraine:
1) Presence of an anti-imitation recognition mode.
2) Availability of guaranteed recognition mode.
3) The ability to perform the recognition procedure even in conditions of high-intensity interference applica-
tion by EW means.
4) Availability of individual codes for recognition based on the principle “Who are you?”
5) Protection against receiving responses on the side lobes of the directional diagram.
6) Application of a high frequency range.
7) Variation in the frequencies of requests and responses [2].
Disadvantages of the “friend-or-foe” identification system currently used in Ukraine:
1) Support of an insufficient number of recognition objects.
2) Insufficient radio-electronic protection of the recognition process.
3) Insufficient imitation resistance – the probability of imitation of a correct response by the enemy is as much
as 0.5% [2] – that means that in the case of sending a swarm of 200 enemy UAVs, one of them will be able to pass
through and pretend to be a legitimate aerial object.
4) Lack of interaction with all types of ground weapons (armored ground vehicles, manual anti-aircraft de-
fenses, etc.) to prevent friendly fire.
5) Absence of the possibility of integration with the NATO “friend-or-foe” recognition system.
6) Insufficient number of individual identification codes for such requests as “Who are you?”.
7) High probability of detection and interception of recognition signals.
8) The operation of the system is known to the enemy (specialists from the Russian Federation) in almost all
details.
In NATO countries, a large amount of works [6]-[8] is devoted to the issue of object recognition on the battle-
field. Among the areas of development of the so-called Battlefield Combat Identification System (BCIS), the following
should be highlighted:
1) Identification based on means of automatic radio data transmission about one’s troops (Radio Based Combat
Identification – RBCI).
2) Identification using radio tags (Radio Frequency Identification tags – RF tags).
3) Targets recognition on the battlefield (application of Battlefield Target Identification Devices – BTID).
RBCI, also called Battlefield Force Tracking System (BFTS) or Blu-Force Tracking (BFT) System, is
built on network-centric principles. Each legitimate aerial object equipped with the system transmits data about
its location every 5 minutes by means of satellite communication or in the VHF communication network. In
active mode, the requester sends a general request with coordinates – and the responder compares the received
coordinates with their own, and if they match – sends a response. All data in wireless communication channels
is encrypted.
The advantage of this approach is the ability to recognize objects outside the direct line of sight. Disadvantages
are the need to use a complex system of repeaters on the battlefield, rapid aging of data for fast-moving objects, high
impact of EW means and high cost of the system.
Recognition with the help of radio tags (RF tags) is also based on the “request-response” principle, as for
civilian tags, used, for example, at a warehouse, the response is formed by modulating the incoming request. Active
(similar to BTID), semi-active (have their own power source) and passive (powered by the energy of requests from the
requester) tags may be used. The detection range of an active or semi-active tag can reach 40 km [6]. In fact, radio tags
are currently the only potentially applicable identification method for determining the affiliation of individual enlistee
or small units of them on the battlefield. And due to their small size and power requirements, they are potentially ap-
plicable for UAVs as well.
BTID systems are designed to recognize aerial objects in the “friend-unknown” format. Its essence does not
differ from the general recognition of the “friend-or-foe” identification at Mk XII system. The term “unknown-friend”
was introduced into military practice in view of the fact that an object of recognition that does not respond to a request
is not necessarily an enemy object [6]. BTID systems also work on the “request-response” principle, the signals are
encrypted and, to reduce the probability of interception, broadband.
New “friend-or-foe” recognition algorithm
The state “friend-or-foe” recognition algorithm must be built based on the national state standards. In fact, it
should not be a single algorithm, but a family of algorithms – since the same algorithm cannot be used, for example, for
the “land-aircraft” recognition line, as for the “aircraft-tank” line. At the same time, during the algorithms and corre-
sponding software development the specified requirements, presented in the previous subsections, must be considered.
The algorithm and procedure for generating random keys should be highlighted separately. It should also be
based on the national state standards. This procedure would be applied on an ongoing basis due to the requirement for
constant key rotation. Generation of a pseudorandom sequences could be used for this goal. Another option is to use a
physical generator to produce random sequences (for example, by saving the parameters of parasitic transistors capaci-
391
Захист інформації
tances etc.) [9]. But as the requirements to the software performance of these algorithms aren’t that severe (generation
may take hours to complete and may be done with the parallel algorithms on the cluster, or just powerful hardware), so
they wouldn’t be analyzed in more detail.
The recognition system includes (figure 1):
1) The main recognition center.
2) Recognition centers (usually installed at radar complexes).
3) Centers for launching aerial objects (airports and military units, armed with UAVs).
4) Aerial objects (manned and unmanned).
5) Ground objects*.
6) Naval and underwater objects*.
Захист інформації
[Введите текст]
physical generator to produce random sequences (for example, by saving the parameters of parasitic transistors
capacitances etc.) [9]. But as the requirements to the software performance of these algorithms aren’t that severe
(generation may take hours to complete and may be done with the parallel algorithms on the cluster, or just powerful
hardware), so they wouldn’t be analyzed in more detail.
The recognition system includes (figure 1):
1) The main recognition center.
2) Recognition centers (usually installed at radar complexes).
3) Centers for launching aerial objects (airports and military units, armed with UAVs).
4) Aerial objects (manned and unmanned).
5) Ground objects*.
6) Naval and underwater objects*.
Figure 1 – The composition of the “friend-or-foe” recognition system
* This work deals mainly with aerial objects. In case of expanding the work of the friend-or-foe” recognition
system to land and naval objects, the recognition system should include headquarters (for distributing keys from the
main recognition center to land objects) and ports (for water/underwater objects objects). At the same time, since ships
and submarines can perform tasks autonomously for more than one day, this specificity should also be considered
separately when implementing "aircraft-ship", "ship-aircraft" recognition lines etc.
The general scheme of the “friend-or-foe” recognition system (figure 2):
Figure 1. The composition of the “friend-or-foe” recognition system
* This work deals mainly with aerial objects. In case of expanding the work of the friend-or-foe” recognition
system to land and naval objects, the recognition system should include headquarters (for distributing keys from the
main recognition center to land objects) and ports (for water/underwater objects objects). At the same time, since ships
and submarines can perform tasks autonomously for more than one day, this specificity should also be considered
separately when implementing “aircraft-ship”, “ship-aircraft” recognition lines etc.
The general scheme of the “friend-or-foe” recognition system (figure 2):Захист інформації
Figure 2 – The general scheme of the “friend-or-foe” recognition system
1. The main recognition center generates random keys (general and individual, for recognition based on the
"Who are you?" principle). New keys are generated every day. In this case, even if the current keys are compromised,
the system will be protected again the very next day.
2. At the end of each day, the keys generated by the main recognition center are sent to all recognition centers
and aerial objects launch centers (if necessary, to headquarters, etc.).
3. Next day, before each flight of manned and unmanned aerial vehicles, the keys are stored in their memory.
4. During the execution of the flight task, if necessary, recognition takes place along the required recognition
line.
Due to the existence of two conflicting requirements for the “friend-or-foe” recognition system (recognition
must occur as soon as possible to prevent friendly fire – but it must be reliable so that the enemy cannot deceive and
bypass the air defense system), identification is proposed to be carried out in two stages:
1. Stage 1. Maximum speed, but reliable recognition is not fully guaranteed. Does not answer the questions
"Who are you?", "Where are you?".
2. Stage 2. A slower, but better protected stage, which verifies the correctness of Stage 1 object recognition. Can
answer the questions "Who are you?", "Where are you?".
These stages determine the statuses of objects in the “friend-or-foe” recognition system (figure 3):
Figure 3 – The statuses of objects in the “friend-or-foe” recognition system
1. "Unknown". Before the first stage of recognition, the object to which the recognition procedure is applied is
considered "unknown".
2. "Possibly friend". This status is assigned to an object that has successfully passed the first stage of recognition.
3. "Friend". This status is assigned to an object that has successfully passed the second stage of recognition.
4. "Foe". This status is assigned to an object that has failed the first or second stage of recognition and given a
wrong answer.
From the software implementation point of view – as it was mentioned above, most of the UAVs have very
limited power and space resources for installing “friend-or-foe” recognition system. So, it should be done as small and
Figure 2. The general scheme of the “friend-or-foe” recognition system
392
Захист інформації
1. The main recognition center generates random keys (general and individual, for recognition based on the
“Who are you?” principle). New keys are generated every day. In this case, even if the current keys are compromised,
the system will be protected again the very next day.
2. At the end of each day, the keys generated by the main recognition center are sent to all recognition centers
and aerial objects launch centers (if necessary, to headquarters, etc.).
3. Next day, before each flight of manned and unmanned aerial vehicles, the keys are stored in their memory.
4. During the execution of the flight task, if necessary, recognition takes place along the required recogni-
tion line.
Due to the existence of two conflicting requirements for the “friend-or-foe” recognition system (recognition
must occur as soon as possible to prevent friendly fire – but it must be reliable so that the enemy cannot deceive and
bypass the air defense system), identification is proposed to be carried out in two stages:
1. Stage 1. Maximum speed, but reliable recognition is not fully guaranteed. Does not answer the questions
“Who are you?”, “Where are you?”.
2. Stage 2. A slower, but better protected stage, which verifies the correctness of Stage 1 object recognition.
Can answer the questions “Who are you?”, “Where are you?”.
These stages determine the statuses of objects in the “friend-or-foe” recognition system (figure 3):
Захист інформації
Figure 2 – The general scheme of the “friend-or-foe” recognition system
1. The main recognition center generates random keys (general and individual, for recognition based on the
"Who are you?" principle). New keys are generated every day. In this case, even if the current keys are compromised,
the system will be protected again the very next day.
2. At the end of each day, the keys generated by the main recognition center are sent to all recognition centers
and aerial objects launch centers (if necessary, to headquarters, etc.).
3. Next day, before each flight of manned and unmanned aerial vehicles, the keys are stored in their memory.
4. During the execution of the flight task, if necessary, recognition takes place along the required recognition
line.
Due to the existence of two conflicting requirements for the “friend-or-foe” recognition system (recognition
must occur as soon as possible to prevent friendly fire – but it must be reliable so that the enemy cannot deceive and
bypass the air defense system), identification is proposed to be carried out in two stages:
1. Stage 1. Maximum speed, but reliable recognition is not fully guaranteed. Does not answer the questions
"Who are you?", "Where are you?".
2. Stage 2. A slower, but better protected stage, which verifies the correctness of Stage 1 object recognition. Can
answer the questions "Who are you?", "Where are you?".
These stages determine the statuses of objects in the “friend-or-foe” recognition system (figure 3):
Figure 3 – The statuses of objects in the “friend-or-foe” recognition system
1. "Unknown". Before the first stage of recognition, the object to which the recognition procedure is applied is
considered "unknown".
2. "Possibly friend". This status is assigned to an object that has successfully passed the first stage of recognition.
3. "Friend". This status is assigned to an object that has successfully passed the second stage of recognition.
4. "Foe". This status is assigned to an object that has failed the first or second stage of recognition and given a
wrong answer.
From the software implementation point of view – as it was mentioned above, most of the UAVs have very
limited power and space resources for installing “friend-or-foe” recognition system. So, it should be done as small and
Figure 3. The statuses of objects in the “friend-or-foe” recognition system
1. “Unknown”. Before the first stage of recognition, the object to which the recognition procedure is applied
is considered “unknown”.
2. “Possibly friend”. This status is assigned to an object that has successfully passed the first stage of recogni-
tion.
3. “Friend”. This status is assigned to an object that has successfully passed the second stage of recognition.
4. “Foe”. This status is assigned to an object that has failed the first or second stage of recognition and given
a wrong answer.
From the software implementation point of view – as it was mentioned above, most of the UAVs have very
limited power and space resources for installing “friend-or-foe” recognition system. So, it should be done as small
and low power-consuming as possible. In the result mostly single-plate computers or even integrated circuits are
used. Their performance in most cases is poor. Therefore, the first stage algorithm should be able to be implemented
programmatically on such hardware and work fast on it. So, it must be as simple as possible. And as the most crypto-
graphic algorithms (even symmetric ones) are pretty resource-consuming, it should be considered as well.
Now let’s describe the developed fast, but not fully guaranteed reliable algorithm of Stage 1 and aspects
of its software implementation:
1. As described above in the general scheme of the recognition system, the main recognition center generates
random keys (common to all objects of the recognition system) valid for 24 hours. For stage 1, three keys are generated
- a 128-bit request key KI1 and a 64-bit response key KI2. These two keys will be common to all recognition centers
and objects. In addition, an enough number of random request identifiers of one-time use IZi, i= 1...N are generated,
the number of which N depends on the expected volumes of state identification request-response procedures during the
next 24 hours. Each of these request identifiers is 128 bits long. Each day, the main center will generate new sets of N
IZi, KI1 and KI2, and it is better to generate more N request identifiers than needed instead of not enough – to have a
reserve in case of an unexpected activity increase in the controlled airspace.
2. Keys and request identifiers are distributed between М recognition centers and launch centers (airports,
military units armed with UAVs etc.). At the same time, everyone is given the KI1 and KI2 keys, but everyone receives
their own disjoint subset Рj (j=1...M) from the entire set N IZi – so each subset:
Рj ⸦ N
Herewith:
Р1 ∩ Р2 = Р1 ∩ Р3 =…= РM-1 ∩ РM = Ø
393
Захист інформації
That means that no subset has elements in common with any other subset.
3. Before letting the recognition object (aircraft, UAV etc.) taking off on a task, the launch center transmits
KI1 and KI2 keys, as well as a disjoint subset Рjk (k=1...S, where S is the expected, planned volume of requests from
the object of recognition) of the subset Pj IZi.
4. To carry out Stage 1 of the recognition procedure, the requester (for any of the lines of recognition, the algo-
rithm is unchanged) forms a request: with the operation of exclusive disjunction (which also has the names exclusive
OR, or XOR) encrypts the previously unused IZi request identifier with KI1 key, at the output we receive a 128-bit
encrypted recognition request Ra s, which is sent to the respondent:
Захист інформації
[Введите текст]
low power-consuming as possible. In the result mostly single-plate computers or even integrated circuits are used. Their
performance in most cases is poor. Therefore, the first stage algorithm should be able to be implemented
programmatically on such hardware and work fast on it. So, it must be as simple as possible. And as the most
cryptographic algorithms (even symmetric ones) are pretty resource-consuming, it should be considered as well.
Now let’s describe the developed fast, but not fully guaranteed reliable algorithm of Stage 1 and aspects of
its software implementation:
1. As described above in the general scheme of the recognition system, the main recognition center generates
random keys (common to all objects of the recognition system) valid for 24 hours. For stage 1, three keys are generated
- a 128-bit request key KI1 and a 64-bit response key KI2. These two keys will be common to all recognition centers
and objects. In addition, an enough number of random request identifiers of one-time use IZi, i= 1...N are generated, the
number of which N depends on the expected volumes of state identification request-response procedures during the next
24 hours. Each of these request identifiers is 128 bits long. Each day, the main center will generate new sets of N IZi,
KI1 and KI2, and it is better to generate more N request identifiers than needed instead of not enough – to have a reserve
in case of an unexpected activity increase in the controlled airspace.
2. Keys and request identifiers are distributed between М recognition centers and launch centers (airports,
military units armed with UAVs etc.). At the same time, everyone is given the KI1 and KI2 keys, but everyone receives
their own disjoint subset Рj (j=1...M) from the entire set N IZi – so each subset:
Рj ⸦ N
Herewith:
Р1 ∩ Р2 = Р1 ∩ Р3 =…= РM-1 ∩ РM = Ø
That means that no subset has elements in common with any other subset.
3. Before letting the recognition object (aircraft, UAV etc.) taking off on a task, the launch center transmits KI1
and KI2 keys, as well as a disjoint subset Рjk (k=1...S, where S is the expected, planned volume of requests from the
object of recognition) of the subset Pj IZi.
4. To carry out Stage 1 of the recognition procedure, the requester (for any of the lines of recognition, the
algorithm is unchanged) forms a request: with the operation of exclusive disjunction (which also has the names
exclusive OR, or XOR) encrypts the previously unused IZi request identifier with KI1 key, at the output we receive a
128-bit encrypted recognition request Ra s, which is sent to the respondent:
Ra = КІ1 IZi
XOR was chosen for speeding up software work – as it is very fast operation to perform on any hardware.
5. The respondent (for example, the UAV) receives the Ra request.
6. The respondent uses the key KI1 and decrypts the received Ra request using the exclusive disjunction
operation (due to the double XOR operation using the key KI1, it deletes itself):
Rb = КІ1 Ra = КІ1 КІ1 IZi = IZi
7. The respondent performs an exclusive disjunction operation on the first and second halves of the deciphered
IZi identifier – IZi1 and IZi2:
Rb = IZi1 IZi2
In this way, the respondent receives a block Rb with a length of 64 bits.
8. The respondent encrypts the received block Rb by an exclusive disjunction operation with the KI2 key:
Rс = Rb КІ2
9. The respondent sends the requester an answer – Rc.
10. The requester decrypts the received answer Rc with the KI2 key:
Rd = Rc КІ2 = Rb КІ2 КІ2 = Rb
11. Immediately after step 4, the requester performs the same action as the responder at the step 7 – an exclusive
disjunction operation on the first and second halves of the used identifier IZi to obtain a control value:
Rk = IZi1 IZi2
12. After receiving and decoding the answer from the respondent, the requester compares the decoded answer Rd
with the control value Rk. If they match, the respondent has successfully passed the check and receives the status
"Possibly friend".
It is also possible to further simplify and speed up Stage 1 – to abandon the use of the KI2 key, and discard steps
8 and 10, then at the cost of a slight decrease in system reliability, you can get rid of two encryption/decryption
operations.
XOR was chosen for speeding up software work – as it is very fast operation to perform on any hardware.
5. The respondent (for example, the UAV) receives the Ra request.
6. The respondent uses the key KI1 and decrypts the received Ra request using the exclusive disjunction opera-
tion (due to the double XOR operation using the key KI1, it deletes itself):
Захист інформації
[Введите текст]
low power-consuming as possible. In the result mostly single-plate computers or even integrated circuits are used. Their
performance in most cases is poor. Therefore, the first stage algorithm should be able to be implemented
programmatically on such hardware and work fast on it. So, it must be as simple as possible. And as the most
cryptographic algorithms (even symmetric ones) are pretty resource-consuming, it should be considered as well.
Now let’s describe the developed fast, but not fully guaranteed reliable algorithm of Stage 1 and aspects of
its software implementation:
1. As described above in the general scheme of the recognition system, the main recognition center generates
random keys (common to all objects of the recognition system) valid for 24 hours. For stage 1, three keys are generated
- a 128-bit request key KI1 and a 64-bit response key KI2. These two keys will be common to all recognition centers
and objects. In addition, an enough number of random request identifiers of one-time use IZi, i= 1...N are generated, the
number of which N depends on the expected volumes of state identification request-response procedures during the next
24 hours. Each of these request identifiers is 128 bits long. Each day, the main center will generate new sets of N IZi,
KI1 and KI2, and it is better to generate more N request identifiers than needed instead of not enough – to have a reserve
in case of an unexpected activity increase in the controlled airspace.
2. Keys and request identifiers are distributed between М recognition centers and launch centers (airports,
military units armed with UAVs etc.). At the same time, everyone is given the KI1 and KI2 keys, but everyone receives
their own disjoint subset Рj (j=1...M) from the entire set N IZi – so each subset:
Рj ⸦ N
Herewith:
Р1 ∩ Р2 = Р1 ∩ Р3 =…= РM-1 ∩ РM = Ø
That means that no subset has elements in common with any other subset.
3. Before letting the recognition object (aircraft, UAV etc.) taking off on a task, the launch center transmits KI1
and KI2 keys, as well as a disjoint subset Рjk (k=1...S, where S is the expected, planned volume of requests from the
object of recognition) of the subset Pj IZi.
4. To carry out Stage 1 of the recognition procedure, the requester (for any of the lines of recognition, the
algorithm is unchanged) forms a request: with the operation of exclusive disjunction (which also has the names
exclusive OR, or XOR) encrypts the previously unused IZi request identifier with KI1 key, at the output we receive a
128-bit encrypted recognition request Ra s, which is sent to the respondent:
Ra = КІ1 IZi
XOR was chosen for speeding up software work – as it is very fast operation to perform on any hardware.
5. The respondent (for example, the UAV) receives the Ra request.
6. The respondent uses the key KI1 and decrypts the received Ra request using the exclusive disjunction
operation (due to the double XOR operation using the key KI1, it deletes itself):
Rb = КІ1 Ra = КІ1 КІ1 IZi = IZi
7. The respondent performs an exclusive disjunction operation on the first and second halves of the deciphered
IZi identifier – IZi1 and IZi2:
Rb = IZi1 IZi2
In this way, the respondent receives a block Rb with a length of 64 bits.
8. The respondent encrypts the received block Rb by an exclusive disjunction operation with the KI2 key:
Rс = Rb КІ2
9. The respondent sends the requester an answer – Rc.
10. The requester decrypts the received answer Rc with the KI2 key:
Rd = Rc КІ2 = Rb КІ2 КІ2 = Rb
11. Immediately after step 4, the requester performs the same action as the responder at the step 7 – an exclusive
disjunction operation on the first and second halves of the used identifier IZi to obtain a control value:
Rk = IZi1 IZi2
12. After receiving and decoding the answer from the respondent, the requester compares the decoded answer Rd
with the control value Rk. If they match, the respondent has successfully passed the check and receives the status
"Possibly friend".
It is also possible to further simplify and speed up Stage 1 – to abandon the use of the KI2 key, and discard steps
8 and 10, then at the cost of a slight decrease in system reliability, you can get rid of two encryption/decryption
operations.
7. The respondent performs an exclusive disjunction operation on the first and second halves of the deciphered
IZi identifier – IZi1 and IZi2:
Захист інформації
[Введите текст]
low power-consuming as possible. In the result mostly single-plate computers or even integrated circuits are used. Their
performance in most cases is poor. Therefore, the first stage algorithm should be able to be implemented
programmatically on such hardware and work fast on it. So, it must be as simple as possible. And as the most
cryptographic algorithms (even symmetric ones) are pretty resource-consuming, it should be considered as well.
Now let’s describe the developed fast, but not fully guaranteed reliable algorithm of Stage 1 and aspects of
its software implementation:
1. As described above in the general scheme of the recognition system, the main recognition center generates
random keys (common to all objects of the recognition system) valid for 24 hours. For stage 1, three keys are generated
- a 128-bit request key KI1 and a 64-bit response key KI2. These two keys will be common to all recognition centers
and objects. In addition, an enough number of random request identifiers of one-time use IZi, i= 1...N are generated, the
number of which N depends on the expected volumes of state identification request-response procedures during the next
24 hours. Each of these request identifiers is 128 bits long. Each day, the main center will generate new sets of N IZi,
KI1 and KI2, and it is better to generate more N request identifiers than needed instead of not enough – to have a reserve
in case of an unexpected activity increase in the controlled airspace.
2. Keys and request identifiers are distributed between М recognition centers and launch centers (airports,
military units armed with UAVs etc.). At the same time, everyone is given the KI1 and KI2 keys, but everyone receives
their own disjoint subset Рj (j=1...M) from the entire set N IZi – so each subset:
Рj ⸦ N
Herewith:
Р1 ∩ Р2 = Р1 ∩ Р3 =…= РM-1 ∩ РM = Ø
That means that no subset has elements in common with any other subset.
3. Before letting the recognition object (aircraft, UAV etc.) taking off on a task, the launch center transmits KI1
and KI2 keys, as well as a disjoint subset Рjk (k=1...S, where S is the expected, planned volume of requests from the
object of recognition) of the subset Pj IZi.
4. To carry out Stage 1 of the recognition procedure, the requester (for any of the lines of recognition, the
algorithm is unchanged) forms a request: with the operation of exclusive disjunction (which also has the names
exclusive OR, or XOR) encrypts the previously unused IZi request identifier with KI1 key, at the output we receive a
128-bit encrypted recognition request Ra s, which is sent to the respondent:
Ra = КІ1 IZi
XOR was chosen for speeding up software work – as it is very fast operation to perform on any hardware.
5. The respondent (for example, the UAV) receives the Ra request.
6. The respondent uses the key KI1 and decrypts the received Ra request using the exclusive disjunction
operation (due to the double XOR operation using the key KI1, it deletes itself):
Rb = КІ1 Ra = КІ1 КІ1 IZi = IZi
7. The respondent performs an exclusive disjunction operation on the first and second halves of the deciphered
IZi identifier – IZi1 and IZi2:
Rb = IZi1 IZi2
In this way, the respondent receives a block Rb with a length of 64 bits.
8. The respondent encrypts the received block Rb by an exclusive disjunction operation with the KI2 key:
Rс = Rb КІ2
9. The respondent sends the requester an answer – Rc.
10. The requester decrypts the received answer Rc with the KI2 key:
Rd = Rc КІ2 = Rb КІ2 КІ2 = Rb
11. Immediately after step 4, the requester performs the same action as the responder at the step 7 – an exclusive
disjunction operation on the first and second halves of the used identifier IZi to obtain a control value:
Rk = IZi1 IZi2
12. After receiving and decoding the answer from the respondent, the requester compares the decoded answer Rd
with the control value Rk. If they match, the respondent has successfully passed the check and receives the status
"Possibly friend".
It is also possible to further simplify and speed up Stage 1 – to abandon the use of the KI2 key, and discard steps
8 and 10, then at the cost of a slight decrease in system reliability, you can get rid of two encryption/decryption
operations.
In this way, the respondent receives a block Rb with a length of 64 bits.
8. The respondent encrypts the received block Rb by an exclusive disjunction operation with the KI2 key:
Захист інформації
[Введите текст]
low power-consuming as possible. In the result mostly single-plate computers or even integrated circuits are used. Their
performance in most cases is poor. Therefore, the first stage algorithm should be able to be implemented
programmatically on such hardware and work fast on it. So, it must be as simple as possible. And as the most
cryptographic algorithms (even symmetric ones) are pretty resource-consuming, it should be considered as well.
Now let’s describe the developed fast, but not fully guaranteed reliable algorithm of Stage 1 and aspects of
its software implementation:
1. As described above in the general scheme of the recognition system, the main recognition center generates
random keys (common to all objects of the recognition system) valid for 24 hours. For stage 1, three keys are generated
- a 128-bit request key KI1 and a 64-bit response key KI2. These two keys will be common to all recognition centers
and objects. In addition, an enough number of random request identifiers of one-time use IZi, i= 1...N are generated, the
number of which N depends on the expected volumes of state identification request-response procedures during the next
24 hours. Each of these request identifiers is 128 bits long. Each day, the main center will generate new sets of N IZi,
KI1 and KI2, and it is better to generate more N request identifiers than needed instead of not enough – to have a reserve
in case of an unexpected activity increase in the controlled airspace.
2. Keys and request identifiers are distributed between М recognition centers and launch centers (airports,
military units armed with UAVs etc.). At the same time, everyone is given the KI1 and KI2 keys, but everyone receives
their own disjoint subset Рj (j=1...M) from the entire set N IZi – so each subset:
Рj ⸦ N
Herewith:
Р1 ∩ Р2 = Р1 ∩ Р3 =…= РM-1 ∩ РM = Ø
That means that no subset has elements in common with any other subset.
3. Before letting the recognition object (aircraft, UAV etc.) taking off on a task, the launch center transmits KI1
and KI2 keys, as well as a disjoint subset Рjk (k=1...S, where S is the expected, planned volume of requests from the
object of recognition) of the subset Pj IZi.
4. To carry out Stage 1 of the recognition procedure, the requester (for any of the lines of recognition, the
algorithm is unchanged) forms a request: with the operation of exclusive disjunction (which also has the names
exclusive OR, or XOR) encrypts the previously unused IZi request identifier with KI1 key, at the output we receive a
128-bit encrypted recognition request Ra s, which is sent to the respondent:
Ra = КІ1 IZi
XOR was chosen for speeding up software work – as it is very fast operation to perform on any hardware.
5. The respondent (for example, the UAV) receives the Ra request.
6. The respondent uses the key KI1 and decrypts the received Ra request using the exclusive disjunction
operation (due to the double XOR operation using the key KI1, it deletes itself):
Rb = КІ1 Ra = КІ1 КІ1 IZi = IZi
7. The respondent performs an exclusive disjunction operation on the first and second halves of the deciphered
IZi identifier – IZi1 and IZi2:
Rb = IZi1 IZi2
In this way, the respondent receives a block Rb with a length of 64 bits.
8. The respondent encrypts the received block Rb by an exclusive disjunction operation with the KI2 key:
Rс = Rb КІ2
9. The respondent sends the requester an answer – Rc.
10. The requester decrypts the received answer Rc with the KI2 key:
Rd = Rc КІ2 = Rb КІ2 КІ2 = Rb
11. Immediately after step 4, the requester performs the same action as the responder at the step 7 – an exclusive
disjunction operation on the first and second halves of the used identifier IZi to obtain a control value:
Rk = IZi1 IZi2
12. After receiving and decoding the answer from the respondent, the requester compares the decoded answer Rd
with the control value Rk. If they match, the respondent has successfully passed the check and receives the status
"Possibly friend".
It is also possible to further simplify and speed up Stage 1 – to abandon the use of the KI2 key, and discard steps
8 and 10, then at the cost of a slight decrease in system reliability, you can get rid of two encryption/decryption
operations.
9. The respondent sends the requester an answer – Rc.
10. The requester decrypts the received answer Rc with the KI2 key:
Захист інформації
[Введите текст]
low power-consuming as possible. In the result mostly single-plate computers or even integrated circuits are used. Their
performance in most cases is poor. Therefore, the first stage algorithm should be able to be implemented
programmatically on such hardware and work fast on it. So, it must be as simple as possible. And as the most
cryptographic algorithms (even symmetric ones) are pretty resource-consuming, it should be considered as well.
Now let’s describe the developed fast, but not fully guaranteed reliable algorithm of Stage 1 and aspects of
its software implementation:
1. As described above in the general scheme of the recognition system, the main recognition center generates
random keys (common to all objects of the recognition system) valid for 24 hours. For stage 1, three keys are generated
- a 128-bit request key KI1 and a 64-bit response key KI2. These two keys will be common to all recognition centers
and objects. In addition, an enough number of random request identifiers of one-time use IZi, i= 1...N are generated, the
number of which N depends on the expected volumes of state identification request-response procedures during the next
24 hours. Each of these request identifiers is 128 bits long. Each day, the main center will generate new sets of N IZi,
KI1 and KI2, and it is better to generate more N request identifiers than needed instead of not enough – to have a reserve
in case of an unexpected activity increase in the controlled airspace.
2. Keys and request identifiers are distributed between М recognition centers and launch centers (airports,
military units armed with UAVs etc.). At the same time, everyone is given the KI1 and KI2 keys, but everyone receives
their own disjoint subset Рj (j=1...M) from the entire set N IZi – so each subset:
Рj ⸦ N
Herewith:
Р1 ∩ Р2 = Р1 ∩ Р3 =…= РM-1 ∩ РM = Ø
That means that no subset has elements in common with any other subset.
3. Before letting the recognition object (aircraft, UAV etc.) taking off on a task, the launch center transmits KI1
and KI2 keys, as well as a disjoint subset Рjk (k=1...S, where S is the expected, planned volume of requests from the
object of recognition) of the subset Pj IZi.
4. To carry out Stage 1 of the recognition procedure, the requester (for any of the lines of recognition, the
algorithm is unchanged) forms a request: with the operation of exclusive disjunction (which also has the names
exclusive OR, or XOR) encrypts the previously unused IZi request identifier with KI1 key, at the output we receive a
128-bit encrypted recognition request Ra s, which is sent to the respondent:
Ra = КІ1 IZi
XOR was chosen for speeding up software work – as it is very fast operation to perform on any hardware.
5. The respondent (for example, the UAV) receives the Ra request.
6. The respondent uses the key KI1 and decrypts the received Ra request using the exclusive disjunction
operation (due to the double XOR operation using the key KI1, it deletes itself):
Rb = КІ1 Ra = КІ1 КІ1 IZi = IZi
7. The respondent performs an exclusive disjunction operation on the first and second halves of the deciphered
IZi identifier – IZi1 and IZi2:
Rb = IZi1 IZi2
In this way, the respondent receives a block Rb with a length of 64 bits.
8. The respondent encrypts the received block Rb by an exclusive disjunction operation with the KI2 key:
Rс = Rb КІ2
9. The respondent sends the requester an answer – Rc.
10. The requester decrypts the received answer Rc with the KI2 key:
Rd = Rc КІ2 = Rb КІ2 КІ2 = Rb
11. Immediately after step 4, the requester performs the same action as the responder at the step 7 – an exclusive
disjunction operation on the first and second halves of the used identifier IZi to obtain a control value:
Rk = IZi1 IZi2
12. After receiving and decoding the answer from the respondent, the requester compares the decoded answer Rd
with the control value Rk. If they match, the respondent has successfully passed the check and receives the status
"Possibly friend".
It is also possible to further simplify and speed up Stage 1 – to abandon the use of the KI2 key, and discard steps
8 and 10, then at the cost of a slight decrease in system reliability, you can get rid of two encryption/decryption
operations.
11. Immediately after step 4, the requester performs the same action as the responder at the step 7 – an exclu-
sive disjunction operation on the first and second halves of the used identifier IZi to obtain a control value:
Захист інформації
[Введите текст]
low power-consuming as possible. In the result mostly single-plate computers or even integrated circuits are used. Their
performance in most cases is poor. Therefore, the first stage algorithm should be able to be implemented
programmatically on such hardware and work fast on it. So, it must be as simple as possible. And as the most
cryptographic algorithms (even symmetric ones) are pretty resource-consuming, it should be considered as well.
Now let’s describe the developed fast, but not fully guaranteed reliable algorithm of Stage 1 and aspects of
its software implementation:
1. As described above in the general scheme of the recognition system, the main recognition center generates
random keys (common to all objects of the recognition system) valid for 24 hours. For stage 1, three keys are generated
- a 128-bit request key KI1 and a 64-bit response key KI2. These two keys will be common to all recognition centers
and objects. In addition, an enough number of random request identifiers of one-time use IZi, i= 1...N are generated, the
number of which N depends on the expected volumes of state identification request-response procedures during the next
24 hours. Each of these request identifiers is 128 bits long. Each day, the main center will generate new sets of N IZi,
KI1 and KI2, and it is better to generate more N request identifiers than needed instead of not enough – to have a reserve
in case of an unexpected activity increase in the controlled airspace.
2. Keys and request identifiers are distributed between М recognition centers and launch centers (airports,
military units armed with UAVs etc.). At the same time, everyone is given the KI1 and KI2 keys, but everyone receives
their own disjoint subset Рj (j=1...M) from the entire set N IZi – so each subset:
Рj ⸦ N
Herewith:
Р1 ∩ Р2 = Р1 ∩ Р3 =…= РM-1 ∩ РM = Ø
That means that no subset has elements in common with any other subset.
3. Before letting the recognition object (aircraft, UAV etc.) taking off on a task, the launch center transmits KI1
and KI2 keys, as well as a disjoint subset Рjk (k=1...S, where S is the expected, planned volume of requests from the
object of recognition) of the subset Pj IZi.
4. To carry out Stage 1 of the recognition procedure, the requester (for any of the lines of recognition, the
algorithm is unchanged) forms a request: with the operation of exclusive disjunction (which also has the names
exclusive OR, or XOR) encrypts the previously unused IZi request identifier with KI1 key, at the output we receive a
128-bit encrypted recognition request Ra s, which is sent to the respondent:
Ra = КІ1 IZi
XOR was chosen for speeding up software work – as it is very fast operation to perform on any hardware.
5. The respondent (for example, the UAV) receives the Ra request.
6. The respondent uses the key KI1 and decrypts the received Ra request using the exclusive disjunction
operation (due to the double XOR operation using the key KI1, it deletes itself):
Rb = КІ1 Ra = КІ1 КІ1 IZi = IZi
7. The respondent performs an exclusive disjunction operation on the first and second halves of the deciphered
IZi identifier – IZi1 and IZi2:
Rb = IZi1 IZi2
In this way, the respondent receives a block Rb with a length of 64 bits.
8. The respondent encrypts the received block Rb by an exclusive disjunction operation with the KI2 key:
Rс = Rb КІ2
9. The respondent sends the requester an answer – Rc.
10. The requester decrypts the received answer Rc with the KI2 key:
Rd = Rc КІ2 = Rb КІ2 КІ2 = Rb
11. Immediately after step 4, the requester performs the same action as the responder at the step 7 – an exclusive
disjunction operation on the first and second halves of the used identifier IZi to obtain a control value:
Rk = IZi1 IZi2
12. After receiving and decoding the answer from the respondent, the requester compares the decoded answer Rd
with the control value Rk. If they match, the respondent has successfully passed the check and receives the status
"Possibly friend".
It is also possible to further simplify and speed up Stage 1 – to abandon the use of the KI2 key, and discard steps
8 and 10, then at the cost of a slight decrease in system reliability, you can get rid of two encryption/decryption
operations.
12. After receiving and decoding the answer from the respondent, the requester compares the decoded answer
Rd with the control value Rk. If they match, the respondent has successfully passed the check and receives the status
“Possibly friend”.
It is also possible to further simplify and speed up Stage 1 – to abandon the use of the KI2 key, and discard
steps 8 and 10, then at the cost of a slight decrease in system reliability, you can get rid of two encryption/decryption
operations.
Let’s consider what data an attacker can get from a request and response exchange intercepted on the radio
during the Stage 1.
An attacker can intercept two messages transmitted over the radio air – the request Ra = КІ1
Захист інформації
Let's consider what data an attacker can get from a request and response exchange intercepted on the radio
during the Stage 1.
An attacker can intercept two messages transmitted over the radio air – the request Ra = КІ1 IZi at step 4 and
the response Rс = Rb КІ2 at step 9.
If the public key KI1 and the identifier IZi are presented in the form of two parts of 64 bits each (respectively
KI11 and KI12, as well as IZi1 and IZi2), then an attacker in the request can intercept at the step 4 next data:
DATAPACK1= 11
12
1
2
i
i
КІ IZ
КІ IZ
In response, he can intercept:
DATAPACK2= IZ1i IZ2i КІ2
Since all the initial data that should remain hidden from the adversary (KI11, KI12 and КІ2, as well as IZi1 and
IZi2) according to statistical characteristics should not differ from random ones, the means of statistical analysis will not
be able to give the adversary any clues about these initial data according to intercepted datapacks.
If he tries to use the intercepted data to find out more by performing XOR operation, he can get the following
combinations:
КІ11 IZ2i КІ2
КІ12 IZ21 КІ2
КІ11 IZ2i КІ12 IZ21
КІ11 КІ12 КІ2
If an attacker sends (for the purpose of determining secret keys) a false identification request according to Stage
1, for example (for ease of understanding), it will consist of all zeros – then the respondent will perform a decryption
operation on this request, receiving a sequence of two halves of the key KI1 – KI11 and KI12, then perform XOR
operation on these keys – KI11 and KI12 – and then perform a XOR operation on the received result with the key КІ2 –
and sending the received result to the attacker.
That is, the attacker will again receive the sequence КІ11 КІ12 КІ2 (or, in the case of using the simplified
algorithm of Stage 1 – КІ11 КІ12).
Since the statistical characteristics of the keys and identifiers will not differ from random ones, the obtained data
will not give the attacker any useful information about the values of KI11, KI12, and КІ2 – there is a very large (limited
only by the size of the keys) number of variants of KI11, KI12, and КІ2 sets (or in the simplified case - KI11 and KI12),
which will correspond to the data known to the attacker. And he will not have the opportunity to determine which
option from this set is correct, without going through them sequentially, using it as an answer to a request to the object
of recognition, facing all the consequences of the fact that after an incorrect answer, this the object will be marked by
the recognition system with the status "foe".
Now, after this analysis, let’s describe the advantages of Stage 1:
1. Stage 1 is the fastest and does not require many hardware resources. To prepare a request, the requester should
perform only one operation of exclusive disjunction (XOR) of two data blocks of 128 bits each. The length of the
request is also only 128 bits. The respondent must perform three exclusive disjunction operations, the first for data
blocks of 128 bits each, the second and third for blocks of 64 bits each. The response to the request is only 64 bits long.
In the memory of the respondent (if it is not planned that he will perform the identification procedure as a requester)
there should be space for only two keys with a total volume of 192 bits and the same amount of free memory should be
available for performing decryption/encryption operations. So, from the software development point of view this
algorithm is very fast.
2. Stage 1 recognition is sufficiently reliable. No data is transmitted with it in open form. The operation of
exclusive disjunction is used for encryption, which is vulnerable to an attack on known plaintext. But in the case when
each request identifier is used only once, and all request identifiers and encryption keys are generated in a truly random
manner, then XOR provides sufficient robustness because:
a) Text and password have the same length.
b) No data in the message (request identifiers) is used more than once (reverse requirement of "no password is
used more than once).
c) Both the password and the message are random and cannot be guessed either by a dictionary or by other
methods (an enhanced requirement compared to the classic "password is random").
d) If we consider request identifiers as one-time keys, then in the absence of any statistical regularities during
their generation, the algorithm is close to 100% security.
3. Due to the physical features and limitations of the recognition procedure (blocking repeated requests for some
time to prevent the processing of reflected signals behind the side lobes of the multi-channel receivers’ radar), it is
IZi
at step 4 and the response Rс = Rb
Захист інформації
Let's consider what data an attacker can get from a request and response exchange intercepted on the radio
during the Stage 1.
An attacker can intercept two messages transmitted over the radio air – the request Ra = КІ1 IZi at step 4 and
the response Rс = Rb КІ2 at step 9.
If the public key KI1 and the identifier IZi are presented in the form of two parts of 64 bits each (respectively
KI11 and KI12, as well as IZi1 and IZi2), then an attacker in the request can intercept at the step 4 next data:
DATAPACK1= 11
12
1
2
i
i
КІ IZ
КІ IZ
In response, he can intercept:
DATAPACK2= IZ1i IZ2i КІ2
Since all the initial data that should remain hidden from the adversary (KI11, KI12 and КІ2, as well as IZi1 and
IZi2) according to statistical characteristics should not differ from random ones, the means of statistical analysis will not
be able to give the adversary any clues about these initial data according to intercepted datapacks.
If he tries to use the intercepted data to find out more by performing XOR operation, he can get the following
combinations:
КІ11 IZ2i КІ2
КІ12 IZ21 КІ2
КІ11 IZ2i КІ12 IZ21
КІ11 КІ12 КІ2
If an attacker sends (for the purpose of determining secret keys) a false identification request according to Stage
1, for example (for ease of understanding), it will consist of all zeros – then the respondent will perform a decryption
operation on this request, receiving a sequence of two halves of the key KI1 – KI11 and KI12, then perform XOR
operation on these keys – KI11 and KI12 – and then perform a XOR operation on the received result with the key КІ2 –
and sending the received result to the attacker.
That is, the attacker will again receive the sequence КІ11 КІ12 КІ2 (or, in the case of using the simplified
algorithm of Stage 1 – КІ11 КІ12).
Since the statistical characteristics of the keys and identifiers will not differ from random ones, the obtained data
will not give the attacker any useful information about the values of KI11, KI12, and КІ2 – there is a very large (limited
only by the size of the keys) number of variants of KI11, KI12, and КІ2 sets (or in the simplified case - KI11 and KI12),
which will correspond to the data known to the attacker. And he will not have the opportunity to determine which
option from this set is correct, without going through them sequentially, using it as an answer to a request to the object
of recognition, facing all the consequences of the fact that after an incorrect answer, this the object will be marked by
the recognition system with the status "foe".
Now, after this analysis, let’s describe the advantages of Stage 1:
1. Stage 1 is the fastest and does not require many hardware resources. To prepare a request, the requester should
perform only one operation of exclusive disjunction (XOR) of two data blocks of 128 bits each. The length of the
request is also only 128 bits. The respondent must perform three exclusive disjunction operations, the first for data
blocks of 128 bits each, the second and third for blocks of 64 bits each. The response to the request is only 64 bits long.
In the memory of the respondent (if it is not planned that he will perform the identification procedure as a requester)
there should be space for only two keys with a total volume of 192 bits and the same amount of free memory should be
available for performing decryption/encryption operations. So, from the software development point of view this
algorithm is very fast.
2. Stage 1 recognition is sufficiently reliable. No data is transmitted with it in open form. The operation of
exclusive disjunction is used for encryption, which is vulnerable to an attack on known plaintext. But in the case when
each request identifier is used only once, and all request identifiers and encryption keys are generated in a truly random
manner, then XOR provides sufficient robustness because:
a) Text and password have the same length.
b) No data in the message (request identifiers) is used more than once (reverse requirement of "no password is
used more than once).
c) Both the password and the message are random and cannot be guessed either by a dictionary or by other
methods (an enhanced requirement compared to the classic "password is random").
d) If we consider request identifiers as one-time keys, then in the absence of any statistical regularities during
their generation, the algorithm is close to 100% security.
3. Due to the physical features and limitations of the recognition procedure (blocking repeated requests for some
time to prevent the processing of reflected signals behind the side lobes of the multi-channel receivers’ radar), it is
КІ2 at step 9.
If the public key KI1 and the identifier IZi are presented in the form of two parts of 64 bits each (respectively
KI11 and KI12, as well as IZi1 and IZi2), then an attacker in the request can intercept at the step 4 next data:
Захист інформації
Let's consider what data an attacker can get from a request and response exchange intercepted on the radio
during the Stage 1.
An attacker can intercept two messages transmitted over the radio air – the request Ra = КІ1 IZi at step 4 and
the response Rс = Rb КІ2 at step 9.
If the public key KI1 and the identifier IZi are presented in the form of two parts of 64 bits each (respectively
KI11 and KI12, as well as IZi1 and IZi2), then an attacker in the request can intercept at the step 4 next data:
DATAPACK1= 11
12
1
2
i
i
КІ IZ
КІ IZ
In response, he can intercept:
DATAPACK2= IZ1i IZ2i КІ2
Since all the initial data that should remain hidden from the adversary (KI11, KI12 and КІ2, as well as IZi1 and
IZi2) according to statistical characteristics should not differ from random ones, the means of statistical analysis will not
be able to give the adversary any clues about these initial data according to intercepted datapacks.
If he tries to use the intercepted data to find out more by performing XOR operation, he can get the following
combinations:
КІ11 IZ2i КІ2
КІ12 IZ21 КІ2
КІ11 IZ2i КІ12 IZ21
КІ11 КІ12 КІ2
If an attacker sends (for the purpose of determining secret keys) a false identification request according to Stage
1, for example (for ease of understanding), it will consist of all zeros – then the respondent will perform a decryption
operation on this request, receiving a sequence of two halves of the key KI1 – KI11 and KI12, then perform XOR
operation on these keys – KI11 and KI12 – and then perform a XOR operation on the received result with the key КІ2 –
and sending the received result to the attacker.
That is, the attacker will again receive the sequence КІ11 КІ12 КІ2 (or, in the case of using the simplified
algorithm of Stage 1 – КІ11 КІ12).
Since the statistical characteristics of the keys and identifiers will not differ from random ones, the obtained data
will not give the attacker any useful information about the values of KI11, KI12, and КІ2 – there is a very large (limited
only by the size of the keys) number of variants of KI11, KI12, and КІ2 sets (or in the simplified case - KI11 and KI12),
which will correspond to the data known to the attacker. And he will not have the opportunity to determine which
option from this set is correct, without going through them sequentially, using it as an answer to a request to the object
of recognition, facing all the consequences of the fact that after an incorrect answer, this the object will be marked by
the recognition system with the status "foe".
Now, after this analysis, let’s describe the advantages of Stage 1:
1. Stage 1 is the fastest and does not require many hardware resources. To prepare a request, the requester should
perform only one operation of exclusive disjunction (XOR) of two data blocks of 128 bits each. The length of the
request is also only 128 bits. The respondent must perform three exclusive disjunction operations, the first for data
blocks of 128 bits each, the second and third for blocks of 64 bits each. The response to the request is only 64 bits long.
In the memory of the respondent (if it is not planned that he will perform the identification procedure as a requester)
there should be space for only two keys with a total volume of 192 bits and the same amount of free memory should be
available for performing decryption/encryption operations. So, from the software development point of view this
algorithm is very fast.
2. Stage 1 recognition is sufficiently reliable. No data is transmitted with it in open form. The operation of
exclusive disjunction is used for encryption, which is vulnerable to an attack on known plaintext. But in the case when
each request identifier is used only once, and all request identifiers and encryption keys are generated in a truly random
manner, then XOR provides sufficient robustness because:
a) Text and password have the same length.
b) No data in the message (request identifiers) is used more than once (reverse requirement of "no password is
used more than once).
c) Both the password and the message are random and cannot be guessed either by a dictionary or by other
methods (an enhanced requirement compared to the classic "password is random").
d) If we consider request identifiers as one-time keys, then in the absence of any statistical regularities during
their generation, the algorithm is close to 100% security.
3. Due to the physical features and limitations of the recognition procedure (blocking repeated requests for some
time to prevent the processing of reflected signals behind the side lobes of the multi-channel receivers’ radar), it is
In response, he can intercept:
Захист інформації
Let's consider what data an attacker can get from a request and response exchange intercepted on the radio
during the Stage 1.
An attacker can intercept two messages transmitted over the radio air – the request Ra = КІ1 IZi at step 4 and
the response Rс = Rb КІ2 at step 9.
If the public key KI1 and the identifier IZi are presented in the form of two parts of 64 bits each (respectively
KI11 and KI12, as well as IZi1 and IZi2), then an attacker in the request can intercept at the step 4 next data:
DATAPACK1= 11
12
1
2
i
i
КІ IZ
КІ IZ
In response, he can intercept:
DATAPACK2= IZ1i IZ2i КІ2
Since all the initial data that should remain hidden from the adversary (KI11, KI12 and КІ2, as well as IZi1 and
IZi2) according to statistical characteristics should not differ from random ones, the means of statistical analysis will not
be able to give the adversary any clues about these initial data according to intercepted datapacks.
If he tries to use the intercepted data to find out more by performing XOR operation, he can get the following
combinations:
КІ11 IZ2i КІ2
КІ12 IZ21 КІ2
КІ11 IZ2i КІ12 IZ21
КІ11 КІ12 КІ2
If an attacker sends (for the purpose of determining secret keys) a false identification request according to Stage
1, for example (for ease of understanding), it will consist of all zeros – then the respondent will perform a decryption
operation on this request, receiving a sequence of two halves of the key KI1 – KI11 and KI12, then perform XOR
operation on these keys – KI11 and KI12 – and then perform a XOR operation on the received result with the key КІ2 –
and sending the received result to the attacker.
That is, the attacker will again receive the sequence КІ11 КІ12 КІ2 (or, in the case of using the simplified
algorithm of Stage 1 – КІ11 КІ12).
Since the statistical characteristics of the keys and identifiers will not differ from random ones, the obtained data
will not give the attacker any useful information about the values of KI11, KI12, and КІ2 – there is a very large (limited
only by the size of the keys) number of variants of KI11, KI12, and КІ2 sets (or in the simplified case - KI11 and KI12),
which will correspond to the data known to the attacker. And he will not have the opportunity to determine which
option from this set is correct, without going through them sequentially, using it as an answer to a request to the object
of recognition, facing all the consequences of the fact that after an incorrect answer, this the object will be marked by
the recognition system with the status "foe".
Now, after this analysis, let’s describe the advantages of Stage 1:
1. Stage 1 is the fastest and does not require many hardware resources. To prepare a request, the requester should
perform only one operation of exclusive disjunction (XOR) of two data blocks of 128 bits each. The length of the
request is also only 128 bits. The respondent must perform three exclusive disjunction operations, the first for data
blocks of 128 bits each, the second and third for blocks of 64 bits each. The response to the request is only 64 bits long.
In the memory of the respondent (if it is not planned that he will perform the identification procedure as a requester)
there should be space for only two keys with a total volume of 192 bits and the same amount of free memory should be
available for performing decryption/encryption operations. So, from the software development point of view this
algorithm is very fast.
2. Stage 1 recognition is sufficiently reliable. No data is transmitted with it in open form. The operation of
exclusive disjunction is used for encryption, which is vulnerable to an attack on known plaintext. But in the case when
each request identifier is used only once, and all request identifiers and encryption keys are generated in a truly random
manner, then XOR provides sufficient robustness because:
a) Text and password have the same length.
b) No data in the message (request identifiers) is used more than once (reverse requirement of "no password is
used more than once).
c) Both the password and the message are random and cannot be guessed either by a dictionary or by other
methods (an enhanced requirement compared to the classic "password is random").
d) If we consider request identifiers as one-time keys, then in the absence of any statistical regularities during
their generation, the algorithm is close to 100% security.
3. Due to the physical features and limitations of the recognition procedure (blocking repeated requests for some
time to prevent the processing of reflected signals behind the side lobes of the multi-channel receivers’ radar), it is
Since all the initial data that should remain hidden from the adversary (KI11, KI12 and КІ2, as well as IZi1 and
IZi2) according to statistical characteristics should not differ from random ones, the means of statistical analysis will
not be able to give the adversary any clues about these initial data according to intercepted datapacks.
If he tries to use the intercepted data to find out more by performing XOR operation, he can get the following
combinations:
Захист інформації
Let's consider what data an attacker can get from a request and response exchange intercepted on the radio
during the Stage 1.
An attacker can intercept two messages transmitted over the radio air – the request Ra = КІ1 IZi at step 4 and
the response Rс = Rb КІ2 at step 9.
If the public key KI1 and the identifier IZi are presented in the form of two parts of 64 bits each (respectively
KI11 and KI12, as well as IZi1 and IZi2), then an attacker in the request can intercept at the step 4 next data:
DATAPACK1= 11
12
1
2
i
i
КІ IZ
КІ IZ
In response, he can intercept:
DATAPACK2= IZ1i IZ2i КІ2
Since all the initial data that should remain hidden from the adversary (KI11, KI12 and КІ2, as well as IZi1 and
IZi2) according to statistical characteristics should not differ from random ones, the means of statistical analysis will not
be able to give the adversary any clues about these initial data according to intercepted datapacks.
If he tries to use the intercepted data to find out more by performing XOR operation, he can get the following
combinations:
КІ11 IZ2i КІ2
КІ12 IZ21 КІ2
КІ11 IZ2i КІ12 IZ21
КІ11 КІ12 КІ2
If an attacker sends (for the purpose of determining secret keys) a false identification request according to Stage
1, for example (for ease of understanding), it will consist of all zeros – then the respondent will perform a decryption
operation on this request, receiving a sequence of two halves of the key KI1 – KI11 and KI12, then perform XOR
operation on these keys – KI11 and KI12 – and then perform a XOR operation on the received result with the key КІ2 –
and sending the received result to the attacker.
That is, the attacker will again receive the sequence КІ11 КІ12 КІ2 (or, in the case of using the simplified
algorithm of Stage 1 – КІ11 КІ12).
Since the statistical characteristics of the keys and identifiers will not differ from random ones, the obtained data
will not give the attacker any useful information about the values of KI11, KI12, and КІ2 – there is a very large (limited
only by the size of the keys) number of variants of KI11, KI12, and КІ2 sets (or in the simplified case - KI11 and KI12),
which will correspond to the data known to the attacker. And he will not have the opportunity to determine which
option from this set is correct, without going through them sequentially, using it as an answer to a request to the object
of recognition, facing all the consequences of the fact that after an incorrect answer, this the object will be marked by
the recognition system with the status "foe".
Now, after this analysis, let’s describe the advantages of Stage 1:
1. Stage 1 is the fastest and does not require many hardware resources. To prepare a request, the requester should
perform only one operation of exclusive disjunction (XOR) of two data blocks of 128 bits each. The length of the
request is also only 128 bits. The respondent must perform three exclusive disjunction operations, the first for data
blocks of 128 bits each, the second and third for blocks of 64 bits each. The response to the request is only 64 bits long.
In the memory of the respondent (if it is not planned that he will perform the identification procedure as a requester)
there should be space for only two keys with a total volume of 192 bits and the same amount of free memory should be
available for performing decryption/encryption operations. So, from the software development point of view this
algorithm is very fast.
2. Stage 1 recognition is sufficiently reliable. No data is transmitted with it in open form. The operation of
exclusive disjunction is used for encryption, which is vulnerable to an attack on known plaintext. But in the case when
each request identifier is used only once, and all request identifiers and encryption keys are generated in a truly random
manner, then XOR provides sufficient robustness because:
a) Text and password have the same length.
b) No data in the message (request identifiers) is used more than once (reverse requirement of "no password is
used more than once).
c) Both the password and the message are random and cannot be guessed either by a dictionary or by other
methods (an enhanced requirement compared to the classic "password is random").
d) If we consider request identifiers as one-time keys, then in the absence of any statistical regularities during
their generation, the algorithm is close to 100% security.
3. Due to the physical features and limitations of the recognition procedure (blocking repeated requests for some
time to prevent the processing of reflected signals behind the side lobes of the multi-channel receivers’ radar), it is
394
Захист інформації
If an attacker sends (for the purpose of determining secret keys) a false identification request according to
Stage 1, for example (for ease of understanding), it will consist of all zeros – then the respondent will perform a de-
cryption operation on this request, receiving a sequence of two halves of the key KI1 – KI11 and KI12, then perform
XOR operation on these keys – KI11 and KI12 – and then perform a XOR operation on the received result with the key
КІ2 – and sending the received result to the attacker.
That is, the attacker will again receive the sequence КІ11
Захист інформації
Let's consider what data an attacker can get from a request and response exchange intercepted on the radio
during the Stage 1.
An attacker can intercept two messages transmitted over the radio air – the request Ra = КІ1 IZi at step 4 and
the response Rс = Rb КІ2 at step 9.
If the public key KI1 and the identifier IZi are presented in the form of two parts of 64 bits each (respectively
KI11 and KI12, as well as IZi1 and IZi2), then an attacker in the request can intercept at the step 4 next data:
DATAPACK1= 11
12
1
2
i
i
КІ IZ
КІ IZ
In response, he can intercept:
DATAPACK2= IZ1i IZ2i КІ2
Since all the initial data that should remain hidden from the adversary (KI11, KI12 and КІ2, as well as IZi1 and
IZi2) according to statistical characteristics should not differ from random ones, the means of statistical analysis will not
be able to give the adversary any clues about these initial data according to intercepted datapacks.
If he tries to use the intercepted data to find out more by performing XOR operation, he can get the following
combinations:
КІ11 IZ2i КІ2
КІ12 IZ21 КІ2
КІ11 IZ2i КІ12 IZ21
КІ11 КІ12 КІ2
If an attacker sends (for the purpose of determining secret keys) a false identification request according to Stage
1, for example (for ease of understanding), it will consist of all zeros – then the respondent will perform a decryption
operation on this request, receiving a sequence of two halves of the key KI1 – KI11 and KI12, then perform XOR
operation on these keys – KI11 and KI12 – and then perform a XOR operation on the received result with the key КІ2 –
and sending the received result to the attacker.
That is, the attacker will again receive the sequence КІ11 КІ12 КІ2 (or, in the case of using the simplified
algorithm of Stage 1 – КІ11 КІ12).
Since the statistical characteristics of the keys and identifiers will not differ from random ones, the obtained data
will not give the attacker any useful information about the values of KI11, KI12, and КІ2 – there is a very large (limited
only by the size of the keys) number of variants of KI11, KI12, and КІ2 sets (or in the simplified case - KI11 and KI12),
which will correspond to the data known to the attacker. And he will not have the opportunity to determine which
option from this set is correct, without going through them sequentially, using it as an answer to a request to the object
of recognition, facing all the consequences of the fact that after an incorrect answer, this the object will be marked by
the recognition system with the status "foe".
Now, after this analysis, let’s describe the advantages of Stage 1:
1. Stage 1 is the fastest and does not require many hardware resources. To prepare a request, the requester should
perform only one operation of exclusive disjunction (XOR) of two data blocks of 128 bits each. The length of the
request is also only 128 bits. The respondent must perform three exclusive disjunction operations, the first for data
blocks of 128 bits each, the second and third for blocks of 64 bits each. The response to the request is only 64 bits long.
In the memory of the respondent (if it is not planned that he will perform the identification procedure as a requester)
there should be space for only two keys with a total volume of 192 bits and the same amount of free memory should be
available for performing decryption/encryption operations. So, from the software development point of view this
algorithm is very fast.
2. Stage 1 recognition is sufficiently reliable. No data is transmitted with it in open form. The operation of
exclusive disjunction is used for encryption, which is vulnerable to an attack on known plaintext. But in the case when
each request identifier is used only once, and all request identifiers and encryption keys are generated in a truly random
manner, then XOR provides sufficient robustness because:
a) Text and password have the same length.
b) No data in the message (request identifiers) is used more than once (reverse requirement of "no password is
used more than once).
c) Both the password and the message are random and cannot be guessed either by a dictionary or by other
methods (an enhanced requirement compared to the classic "password is random").
d) If we consider request identifiers as one-time keys, then in the absence of any statistical regularities during
their generation, the algorithm is close to 100% security.
3. Due to the physical features and limitations of the recognition procedure (blocking repeated requests for some
time to prevent the processing of reflected signals behind the side lobes of the multi-channel receivers’ radar), it is
КІ12
Захист інформації
Let's consider what data an attacker can get from a request and response exchange intercepted on the radio
during the Stage 1.
An attacker can intercept two messages transmitted over the radio air – the request Ra = КІ1 IZi at step 4 and
the response Rс = Rb КІ2 at step 9.
If the public key KI1 and the identifier IZi are presented in the form of two parts of 64 bits each (respectively
KI11 and KI12, as well as IZi1 and IZi2), then an attacker in the request can intercept at the step 4 next data:
DATAPACK1= 11
12
1
2
i
i
КІ IZ
КІ IZ
In response, he can intercept:
DATAPACK2= IZ1i IZ2i КІ2
Since all the initial data that should remain hidden from the adversary (KI11, KI12 and КІ2, as well as IZi1 and
IZi2) according to statistical characteristics should not differ from random ones, the means of statistical analysis will not
be able to give the adversary any clues about these initial data according to intercepted datapacks.
If he tries to use the intercepted data to find out more by performing XOR operation, he can get the following
combinations:
КІ11 IZ2i КІ2
КІ12 IZ21 КІ2
КІ11 IZ2i КІ12 IZ21
КІ11 КІ12 КІ2
If an attacker sends (for the purpose of determining secret keys) a false identification request according to Stage
1, for example (for ease of understanding), it will consist of all zeros – then the respondent will perform a decryption
operation on this request, receiving a sequence of two halves of the key KI1 – KI11 and KI12, then perform XOR
operation on these keys – KI11 and KI12 – and then perform a XOR operation on the received result with the key КІ2 –
and sending the received result to the attacker.
That is, the attacker will again receive the sequence КІ11 КІ12 КІ2 (or, in the case of using the simplified
algorithm of Stage 1 – КІ11 КІ12).
Since the statistical characteristics of the keys and identifiers will not differ from random ones, the obtained data
will not give the attacker any useful information about the values of KI11, KI12, and КІ2 – there is a very large (limited
only by the size of the keys) number of variants of KI11, KI12, and КІ2 sets (or in the simplified case - KI11 and KI12),
which will correspond to the data known to the attacker. And he will not have the opportunity to determine which
option from this set is correct, without going through them sequentially, using it as an answer to a request to the object
of recognition, facing all the consequences of the fact that after an incorrect answer, this the object will be marked by
the recognition system with the status "foe".
Now, after this analysis, let’s describe the advantages of Stage 1:
1. Stage 1 is the fastest and does not require many hardware resources. To prepare a request, the requester should
perform only one operation of exclusive disjunction (XOR) of two data blocks of 128 bits each. The length of the
request is also only 128 bits. The respondent must perform three exclusive disjunction operations, the first for data
blocks of 128 bits each, the second and third for blocks of 64 bits each. The response to the request is only 64 bits long.
In the memory of the respondent (if it is not planned that he will perform the identification procedure as a requester)
there should be space for only two keys with a total volume of 192 bits and the same amount of free memory should be
available for performing decryption/encryption operations. So, from the software development point of view this
algorithm is very fast.
2. Stage 1 recognition is sufficiently reliable. No data is transmitted with it in open form. The operation of
exclusive disjunction is used for encryption, which is vulnerable to an attack on known plaintext. But in the case when
each request identifier is used only once, and all request identifiers and encryption keys are generated in a truly random
manner, then XOR provides sufficient robustness because:
a) Text and password have the same length.
b) No data in the message (request identifiers) is used more than once (reverse requirement of "no password is
used more than once).
c) Both the password and the message are random and cannot be guessed either by a dictionary or by other
methods (an enhanced requirement compared to the classic "password is random").
d) If we consider request identifiers as one-time keys, then in the absence of any statistical regularities during
their generation, the algorithm is close to 100% security.
3. Due to the physical features and limitations of the recognition procedure (blocking repeated requests for some
time to prevent the processing of reflected signals behind the side lobes of the multi-channel receivers’ radar), it is
КІ2 (or, in the case of using the simplified
algorithm of Stage 1 – КІ11
Захист інформації
Let's consider what data an attacker can get from a request and response exchange intercepted on the radio
during the Stage 1.
An attacker can intercept two messages transmitted over the radio air – the request Ra = КІ1 IZi at step 4 and
the response Rс = Rb КІ2 at step 9.
If the public key KI1 and the identifier IZi are presented in the form of two parts of 64 bits each (respectively
KI11 and KI12, as well as IZi1 and IZi2), then an attacker in the request can intercept at the step 4 next data:
DATAPACK1= 11
12
1
2
i
i
КІ IZ
КІ IZ
In response, he can intercept:
DATAPACK2= IZ1i IZ2i КІ2
Since all the initial data that should remain hidden from the adversary (KI11, KI12 and КІ2, as well as IZi1 and
IZi2) according to statistical characteristics should not differ from random ones, the means of statistical analysis will not
be able to give the adversary any clues about these initial data according to intercepted datapacks.
If he tries to use the intercepted data to find out more by performing XOR operation, he can get the following
combinations:
КІ11 IZ2i КІ2
КІ12 IZ21 КІ2
КІ11 IZ2i КІ12 IZ21
КІ11 КІ12 КІ2
If an attacker sends (for the purpose of determining secret keys) a false identification request according to Stage
1, for example (for ease of understanding), it will consist of all zeros – then the respondent will perform a decryption
operation on this request, receiving a sequence of two halves of the key KI1 – KI11 and KI12, then perform XOR
operation on these keys – KI11 and KI12 – and then perform a XOR operation on the received result with the key КІ2 –
and sending the received result to the attacker.
That is, the attacker will again receive the sequence КІ11 КІ12 КІ2 (or, in the case of using the simplified
algorithm of Stage 1 – КІ11 КІ12).
Since the statistical characteristics of the keys and identifiers will not differ from random ones, the obtained data
will not give the attacker any useful information about the values of KI11, KI12, and КІ2 – there is a very large (limited
only by the size of the keys) number of variants of KI11, KI12, and КІ2 sets (or in the simplified case - KI11 and KI12),
which will correspond to the data known to the attacker. And he will not have the opportunity to determine which
option from this set is correct, without going through them sequentially, using it as an answer to a request to the object
of recognition, facing all the consequences of the fact that after an incorrect answer, this the object will be marked by
the recognition system with the status "foe".
Now, after this analysis, let’s describe the advantages of Stage 1:
1. Stage 1 is the fastest and does not require many hardware resources. To prepare a request, the requester should
perform only one operation of exclusive disjunction (XOR) of two data blocks of 128 bits each. The length of the
request is also only 128 bits. The respondent must perform three exclusive disjunction operations, the first for data
blocks of 128 bits each, the second and third for blocks of 64 bits each. The response to the request is only 64 bits long.
In the memory of the respondent (if it is not planned that he will perform the identification procedure as a requester)
there should be space for only two keys with a total volume of 192 bits and the same amount of free memory should be
available for performing decryption/encryption operations. So, from the software development point of view this
algorithm is very fast.
2. Stage 1 recognition is sufficiently reliable. No data is transmitted with it in open form. The operation of
exclusive disjunction is used for encryption, which is vulnerable to an attack on known plaintext. But in the case when
each request identifier is used only once, and all request identifiers and encryption keys are generated in a truly random
manner, then XOR provides sufficient robustness because:
a) Text and password have the same length.
b) No data in the message (request identifiers) is used more than once (reverse requirement of "no password is
used more than once).
c) Both the password and the message are random and cannot be guessed either by a dictionary or by other
methods (an enhanced requirement compared to the classic "password is random").
d) If we consider request identifiers as one-time keys, then in the absence of any statistical regularities during
their generation, the algorithm is close to 100% security.
3. Due to the physical features and limitations of the recognition procedure (blocking repeated requests for some
time to prevent the processing of reflected signals behind the side lobes of the multi-channel receivers’ radar), it is
КІ12).
Since the statistical characteristics of the keys and identifiers will not differ from random ones, the obtained
data will not give the attacker any useful information about the values of KI11, KI12, and КІ2 – there is a very large
(limited only by the size of the keys) number of variants of KI11, KI12, and КІ2 sets (or in the simplified case - KI11 and
KI12), which will correspond to the data known to the attacker. And he will not have the opportunity to determine which
option from this set is correct, without going through them sequentially, using it as an answer to a request to the object
of recognition, facing all the consequences of the fact that after an incorrect answer, this the object will be marked by
the recognition system with the status “foe”.
Now, after this analysis, let’s describe the advantages of Stage 1:
1. Stage 1 is the fastest and does not require many hardware resources. To prepare a request, the requester should
perform only one operation of exclusive disjunction (XOR) of two data blocks of 128 bits each. The length of the request
is also only 128 bits. The respondent must perform three exclusive disjunction operations, the first for data blocks of 128
bits each, the second and third for blocks of 64 bits each. The response to the request is only 64 bits long. In the memory
of the respondent (if it is not planned that he will perform the identification procedure as a requester) there should be space
for only two keys with a total volume of 192 bits and the same amount of free memory should be available for performing
decryption/encryption operations. So, from the software development point of view this algorithm is very fast.
2. Stage 1 recognition is sufficiently reliable. No data is transmitted with it in open form. The operation of
exclusive disjunction is used for encryption, which is vulnerable to an attack on known plaintext. But in the case when
each request identifier is used only once, and all request identifiers and encryption keys are generated in a truly random
manner, then XOR provides sufficient robustness because:
a) Text and password have the same length.
b) No data in the message (request identifiers) is used more than once (reverse requirement of “no password
is used more than once).
c) Both the password and the message are random and cannot be guessed either by a dictionary or by other
methods (an enhanced requirement compared to the classic “password is random”).
d) If we consider request identifiers as one-time keys, then in the absence of any statistical regularities during
their generation, the algorithm is close to 100% security.
3. Due to the physical features and limitations of the recognition procedure (blocking repeated requests for
some time to prevent the processing of reflected signals behind the side lobes of the multi-channel receivers’ radar), it
is protected from bruteforce attacks. In addition, you can set timeouts and block responses to requests from the same
requester after a certain number of attempts.
Disadvantages of Stage 1:
1. Does not answer the question “Who are you?” and “Where are you?”.
2. Anyone can impersonate a legitimate requester. When performing Stage 1 recognition, the responder can-
not verify the legitimacy of the request – and therefore will respond to any request of this format, including from an
attacker sending a random 128-bit request without knowing any of the keys and identifiers.
3. Does not provide protection against “man-in-the-middle” attacks. If an attacker receives a Stage 1 request
and sends it to a legitimate respondent, and then forwards its response to the requester, it can impersonate the legitimate
respondent. The probability of this can be reduced by limiting the maximum response waiting time, but the theoretical
possibility of such an attack remains.
4. Requires the daily generation of a large number of recognition identifiers.
To compensate for these shortcomings, the Stage 2 algorithm should be applied.
As an algorithm of Stage 2, it is possible to use the algorithm, based on Ukrainian symmetric cryptography
standard [10] proposed and detailly described in [11-12]. In case the direct object-object recognition (“plane-plane”,
“plane-tank” etc.) should be provided without any of the objects being the recognition center, analogue of Kerberos
protocol [13] may be used.
Conclusions
In this work the main requirements for recognition systems of aerial objects of civil application were determined,
which includes maximum compatibility; support for a large number of objects; outdated recognition complexes support;
support for alternative ways of recognition; support for alternative data entry methods; determining the coordinates of
aerial objects in an emergency situation.
Home-foreign recognition systems for military applications are also considered. In contrast to civilian systems,
the following basic requirements have been identified for them: maximum speed of the recognition process; protec-
tion against false positive; protection against legitimate aerial object imitation; support for a large number of objects;
protection against cases of loss of a legitimate aerial object; rotation of the secret part; protection against false-negative
results to prevent friendly fire; protection against man-in-the-middle attacks; flexible integration with the NATO block
395
Захист інформації
recognition system; availability of opportunities for purely domestic production and support of the object recognition
system; protection against electronic warfare means; support for several recognition modes; automatic blocking of the
launch of ground-to-air and air-to-air weapons against objects that confirm their legitimacy by a correct response to a
request; determining the coordinates of aerial objects in an emergency.
Based on the formulated requirements, a new friend-or-foe algorithm for the state identification system for military
use is proposed, built based on the state standards, and taking into account the features of its software implementation in
order to increase speed. Its implementation will ensure sufficient scalability, stability, reliability, and multi-level recognition.
References
1. The Government Portal. (2022) The General Staff of the Armed Forces, the Ministry of Digital Transformation and UNITED24 are gathering the
“Army of Drones”. The Government Portal. 1st July, 13:25. Available from: https://www.kmu.gov.ua/news/genshtab-zsu-mincifri-ta-united24-
zbirayut-armiyu-droniv. [Accessed: 2nd July 2022].
2. ERMAK, S.N., KASANIN, O.A. & KHOZHEVETS, S.N., (2017) The Construction and Operation Principles of Ground Means of the State
Identification System. Minsk: BGUIR.
3. UNITED STATES OF AMERICA. Defense Technical Information Center, Department of Defense (1996) Fratricide: Incorporating DESERT
STORM Lessons Learned. VA: Defense Technical Information Center.
4. ZAKREVSKYI O. (2014) Friend-or-foe. [Online] June 11, 2014. Available from: https://dou.ua/forums/topic/10097/ [Accessed: 2nd July 2022].
5. NATO (2016) STANAG 4193:2016. Technical Characteristics of the IFF Mk XIIA System Part I: System Description and General Characteristics. NATO.
6. KAMALTINOV G.G., et al. (2016) Recognition of objects on the battlefield. Analysis of world experience. Armament and military equipment. 4. p. 22-26.
7. Putatunda, R., Gangopadhyay, A., Erbacher, R. F., & Busart, C. (2022, May). Camouflaged object detection system at the edge. In Automatic Target
Recognition XXXII (Vol. 12096, pp. 177-187). SPIE.
8. Pearce, N. and Hamilton, S., (2021, October). IFF using Beamforming in Telemetry Beacons. In 2021 IEEE Western New York Image and Signal
Processing Workshop (WNYISPW) (pp. 1-5). IEEE.
9. ZHUYKOV V.Y. et al. (2016) Adjustable power supply filters to protect information in microcontrollers. Monograph. Kyiv, 184.
10. MINISTRY OF ECONOMIC DEVELOPMENT (2014) DSTU 7624:2014 Information technologies. Cryptographic protection of information.
Algorithm of symmetric block transformation. SE “UkrNDNC”: SSY.
11. Korolyov V.Y., Ogurtsov M.I. & Kochubinskyi A.I. (2021) Identification of Technical Objects in the Special Networks According to the Principle
of “Friend or Foe”. Control Systems and Computers. 4. p. 2-14.
12. OGURTSOV M.I. (2021) Development of a special algorithm for multifactor users’ authentication. In International Scientific Conference “Math-
ematical modeling, optimization and information technologies”. Chişinău – Kyiv – Batumi, 15 - 19 November, 2021. p. 27.
13. Kuperberg, M. and Klemens, R., (2022). Integration of Self-Sovereign Identity into Conventional Software using Established IAM Protocols: A
Survey. Open Identity Summit 2022.
Received 02.08.2022
About authors:
Ogurtsov Maksym Igorovych,
researcher,
number of domestic scientific publications – 49,
number of foreign scientific publications – 4,
Hirsch index – 4, ORCID number – 0000-0002-6167-5111.
Mobile phone number: +380637902010.
Email: maksymogurtsov@gmail.com.
Place of work:
V.M. Glushkov Institute of Cybernetics
of the National Academy of Sciences of Ukraine,
03187, Kyiv, Ac. Hlushkova str. 40, building 1, apt. 801,
fax/phone +380445262008, email: incyb@incyb.kiev.ua
Прізвища та ініціали авторів і назва доповіді українською мовою:
Огурцов М.І.
Розробка алгоритму державного впізнавання типу «свій-чужий»
для побудови відповідного програмного забезпечення
Прізвища та ініціали авторів і назва доповіді англійською мовою:
Ogurtsov M.I.
Friend-or-Foe Recognition Algorithm Development
for the Corresponding Software Building
|