Cryptographic protection for military radio communications

Robert Białas, Marcin Grzonkowski, Robert Wicik


Protecting the confidentiality, integrity and availability of information is very important in any telecommunications system. Information protection requires use of necessary physical, personal, information and communication technologies and above all – electromagnetic and cryptographic security measures. Equipment and tools for cryptographic protection should be examined and assessed in terms of resistance to known threats. Additional requirements are put on information protection for radio communication, especially military, where radio transmission is characterized by uncertainty of establishing and maintaining connections, bit rates are relatively low, often without full duplex. All this has an impact on the methods of cryptographic synchronization and implementation of cryptographic functions. A different approach to information protection is required by classic narrowband radio communications, a different one in time-division multi-access modes, and another one in broadband packet data transmission. Systems designed for information protection in radio communications implement appropriate operating modes of operation for cryptographic algorithms and protocols. Latest threats from quantum computers pose new challenges, especially in systems using public-key cryptography, because there are algorithms that can be used to attack these schemes with polynomial complexity.

Full Text:



M. Wiśniewski, A. Dobkowski, R. Matyszkiel, P. Kaniewski, B. Grochowina, Test results of Polish SDR narrowband radio, IEEE Communication and Information Technologies, 2017.

M. Małowidzki, P. Kaniewski, R. Matyszkiel, P. Bereziński, Standard tactical services in a military disruption-tolerant network: Field tests, IEEE Military Communications Conference (MILCOM), 2017.

R. Matyszkiel, P. Kaniewski, R. Polak, D. Laskowski, The results of transmission tests of polish broadband SDR radios, IEEE Communication and Information Technologies, 2017.

STANAG 5068, Secure Communications Interoperability Protocol (SCIP).

STANAG 4787, Network and Information Infrastructure (NII) Internet Protocol Network Encryption (NINE)

M. Borowski, R. Wicik, Cryptographic protection of classified information in military radio communication faced with threats from quantum computers, Proc. SPIE. 11442, Radioelectronic Systems Conference, Jachranka, 2019.

P. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on quantum computer, SIAM Journal on Computing, Volume 26 Issue 5, 1997, p. 1484-1509.

M. Kaplan, G. Laurent, A. Leverrier, M. Naya-Plasencia, Breaking symmetric cryptosystems using quantum period finding, Advances in Cryptology – CRYPTO 2016, LNCS vol. 9815, Springer, 2016.

L. K. Grover, A fast quantum mechanical algorithm for database search, Bell Labs, 1996.

D. R. Simon, On the Power of Quantum Computation, SIAM Journal on Computing, Volume 26, Issue 5, 1997

P. Dąbrowski, R. Gliwa, J. Szmidt, R. Wicik, Generation and Implementation of Cryptographically Strong Elliptic Curves, Number Theory Methods in Cryptology (NuTMiC), Warszawa, LNCS 10737, 2017, p. 25-36.

M. Borowski, J. Gocałek, R. Wicik, Securing the session key agreement protocol against cryptanalysis using quantum computers, Polish: Zabezpieczenia protokołu uzgadniania kluczy sesji przed kryptoanalizą przy wykorzystaniu komputerów kwantowych, KSTiT, Wrocław, Przegląd Telekomunikacyjny nr 7/2019.


  • There are currently no refbacks.

International Journal of Electronics and Telecommunications
is a periodical of Electronics and Telecommunications Committee
of Polish Academy of Sciences

eISSN: 2300-1933