Statistical reliability of noise hindrance for ensuring protection against leakage of information through technical channels
The statistical reliability of the noise hindrance that used to protect the information against leakage through technical channels is grounded in this paper. It is a component of technical reliability of information security system and it is defined as the probability that the statistical characteristics of the studied noise hindrance will not go beyond the permissible limits. The use of this noise hindrance in security systems will guarantee to act with an effective spectral density, which will provide the necessary probability of errors and other security indicators in channel of leakage. Assessment of the effective spectral density is carried out regarding the decisive scheme of the ideal receiver, which is built on the criterion of Kotelnikov and it includes the following steps: determination function of correlation of noise process, the verification process on stationary and ergodicity, its verification on the normal distribution and the calculation of the sought effective spectral density. Determining the function of correlation of noise process is carried out with so-called “margin” on the error for the worst case from the point of view of security. Verification of the process on the temporal homogeneity and ergodic performed using Slutsky conditions. The resulting statistical reliability of the noise hindrance is the product of the statistical reliability of the estimates at all stages. It is an indicator of the reliability guarantee and component information security system as a whole.
International Organization for Standardization. (2013, Okt. 01). ISO/IEC 27001, Information technology. Security techniques. Information security management. Requirements. [Online]. Available: https://www.iso.org/standard/54534.html. Accessed on: Aug., 28, 2016.
International Organization for Standardization. (2013, Okt. 01). ISO/IEC 27002, Information technology. Security Techniques. Code of practice for information security controls. [Online]. Available: https://www.iso.org/standard/54533.html. Accessed on: Aug., 28, 2016.
G.A. Buzov, S.V. Kalinin, and A.V. Kondratev, Protection Information Against Leakage Through Technical Channels. Moscow, Russia: Goryachaya liniya, Telekom, 2005.
S.V Lenkov, D.A. Peregudov and V.A. Khoroshko, Methods and Means of Information Protection. Volume I.Unauthorized Receiving the Information. Kyiv, Ukraine: Arii, 2008.
G. Kuhn, Compromising Emanations: Eavesdropping Risks of Computer Displays. Technical Report. [Online]. Available: http://www. cl. cam. ас. uk/techreports. Accessed on: Aug., 28, 2016.
Ueli M. Maurer, “A Universal Statistical Test for Random Bit Generators”, Journal of Cryptology, vol. 5, iss. 2, pp. 89-105, January 1992.
S.O. Ivanchenko, “Justification Risk Security of Information From Leakage by Technical Channels”, Legal, Regulatory and Metrological Support of Information in Ukraine, no.1 (31), pp. 9-13, 2016.
S.I. Baskakov, Radio Technical Circuits and Signals. Moscow, Russia: Vysshaia shkola, 1988.
D L Burachenko et al., Common Theory of Communication. Moscow, Russia: VAS, 1970.
S.O Ivanchenko, V.O. Khoroshko, O.V. Ghavrylenko, and O.M. Kulinich. ”The method of diagnosing noise hindrances to provide information security from leakage technical channels”, Zahist ìnformacìi: sbornyk nauchnykh trudov. Kyiv, NAU, Release 22, p. 74-86, 2015.
J. Bendat, and A. Pirsol. Applied Analysis of Random Data. Moscow, Russia: Mir, 1989.
This work is licensed under a Creative Commons Attribution 4.0 International License.
ISSN 2411-1031 (Print), ISSN 2518-1033 (Online)