Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael Thomas Kurdziel is active.

Publication


Featured researches published by Michael Thomas Kurdziel.


military communications conference | 2010

An overview of cryptanalysis research for the advanced encryption standard

Alan Kaminsky; Michael Thomas Kurdziel; Stanislaw P. Radziszowski

Since its release in November 2001, the Advanced Encryption Standard (NIST FIPS-197) has been the subject of extensive cryptanalysis research. The importance of this research has intensified since AES was named, in 2003, by NSA as a Type-1 Suite B Encryption Algorithm (CNSSP-15). As such, AES is now authorized to protect classified and unclassified national security systems and information. This paper provides an overview of current cryptanalysis research on the AES cryptographic algorithm. Discussion is provided on the impact by each technique to the strength of the algorithm in national security applications. The paper is concluded with an attempt at a forecast of the usable life of AES in these applications.


military communications conference | 2005

An SCA security supplement compliant radio architecture

Michael Thomas Kurdziel; J. Beane; John Fitton

This paper provides an overview of the security features and attributes presented in the software communications architecture (SCA) security supplement along with implementation recommendations. Hardware based security policy enforcement and flexible downloadable security policy mechanisms are also discussed. The paper concludes by presenting an innovative communications architecture that is compliant with the SCA security supplement.


military communications conference | 2002

Baseline requirements for government and military encryption algorithms

Michael Thomas Kurdziel; John Fitton

(U) Foreign government and military organizations are developing formal evaluation criteria for their communications security (COMSEC) procurements. Although many countries have unique requirements, most have a common set of criteria. Due to the value of the information being secured, these criteria are much more comprehensive, rigorous and stringent than the commercial equivalent. It is useful to examine these criteria and use them to construct a threat model and baseline requirements for COMSEC products in military and government applications. This threat model allows customer COMSEC requirements to be more thoroughly understood by equipment providers. The baseline requirements will also provide a set of metrics for evaluating the quality of a COMSEC solution. This paper presents an introduction to threat model assessment. Several example models are provided. A definition and detailed discussion of a government/military COMSEC threat model is also presented Finally, the model is used to derive baseline requirements that can be used to design or evaluate a COMSEC solution intended for military and government applications.


military communications conference | 2007

A Scalable Hardware Architecture to Support Applications of the HAIPE 3.1 Standard

Brian Boorman; Christopher D. Mackey; Michael Thomas Kurdziel

Developers are actively pursuing embedments of the new HAIPE 3.1 standard for secure IP communications. Depending on underlying channel capacities or other aspects of individual applications, different levels of performance may be required. The challenge is to provide a hardware platform that provides the required level of computational support, but optimized with respect to cost, size, weight, etc. This paper will present an overview of these challenges and will describe an innovative, scalable hardware architecture that addresses them. Performance data was gathered for a series of architecture configuration experiments. Performance data is presented along with discussion and recommendations for future work.


military communications conference | 2006

The Secure Communication Interoperability Protocol (SCIP) over a VHF/UHF radio channel

John M. Alvermann; Michael Thomas Kurdziel; William N. Furman

The secure communication interoperability protocol (SCIP) is a newly emerging application layer interoperability standard that is being developed for secure voice and data communication between international coalition partners. It was designed to operate independently of the characteristics of underlying media layers. This paper will present the results of an investigation into the performance of the SCIP point to multi-point protocol over a VHF radio narrowband channel and the SCIP point to point protocol over a VHF wideband channel. An ldquoover the airrdquo field demonstration using the Harris AN/PRC-117G multiband Manpack was designed and is described. Voice quality performance data was gathered over a range of radio configurations and channel conditions. Performance data is presented along with discussion and recommendations on future work.


military communications conference | 2015

Customizable sponge-based authenticated encryption using 16-bit S-boxes

Matthew Kelly; Alan Kaminsky; Michael Thomas Kurdziel; Marcin Lukowiak; Stanislaw P. Radziszowski

Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both confidentiality and data integrity. There are many AE algorithms in existence today. However, they are often far from ideal in terms of efficiency and ease of use. For this reason, there is ongoing effort to develop new AE algorithms that are secure, efficient, and easy to use.


Proceedings of SPIE | 2014

Cyber threat model for tactical radio networks

Michael Thomas Kurdziel

The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.


military communications conference | 2010

FPGA-based, multi-processor HW-SW system for Single-Chip Crypto applications

Andrew Fitzgerald; Marcin Lukowiak; Michael Thomas Kurdziel; Christopher D. Mackey; Kenneth Smith; Brian Boorman; Duncan G. Harris; William Skiba

This paper discusses design and analysis of an FPGA-based system containing two isolated, Altera Nios II softcore processors that share data through two custom crypto-engines. FPGA-based Single-Chip Cryptographic (SCC) techniques were employed to ensure full red/black separation. Each crypto-engine is a hardware implementation of the Advanced Encryption Standard (AES), operating in Galois/Counter mode (GCM). The features of the AES crypto-engines were varied with the goal of determining which best achieve high performance or minimal hardware usage. To quantify the costs of red/black separation, a thorough analysis of resource requirements was performed. The hardware/software approach was utilized in order to provide appropriate levels of flexibilty and performance, allowing for a range of target applications.


military communications conference | 2016

Implementing authenticated encryption algorithm MK-3 on FPGA

Gordon Werner; Steven Farris; Alan Kaminsky; Michael Thomas Kurdziel; Marcin Lukowiak; Stanislaw P. Radziszowski

Authenticated encryption (AE) algorithms provide both data security and integrity. While a number of AE algorithms exist, they can be inefficient and difficult to use. Recent efforts have focused on the development of secure, efficient and easy to use AE algorithms. MK-3 is one such algorithm, developed through a joint effort between Rochester Institute of Technology (RIT) and Harris Corporation. It uses the duplex construction, which builds on the sponge primitive popularized by Keccak, the SHA-3 competition winner. MK-3 is intended for hardware implementations with a novelty being the use of 16-bit substitution boxes. This paper presents the first fully parallel hardware implementation of MK-3 using Field Programmable Gate Array (FPGA). We also lay the groundwork for future design optimizations.


Journal of Telecommunications System & Management | 2014

Stochastic Analysis and Modeling of a Tree-Based Group Key Distribution Method in Tactical Wireless Networks

Peter Bajorski; Alan Kaminsky; Michael Thomas Kurdziel; Marcin Lukowiak; StanisÅaw Radziszowski; Christopher A. Wood

A number of key management challenges are encountered when operating tactical communication systems using a group-wide shared key. A large portion of such communications occurs over low bit-rate channels, and all communication channels must be available at any moment for mission action. Current over-the-air rekeying protocols consume too much channel bit-rate to be practical for large tactical radio networks. This caused an off-line pre-placed key (PPK) approach to become most commonly used key distribution method in these environments. Unfortunately, with this key management scheme, revoking group membership requires a full intra-mission rekey, which can be dangerous in a battlefield situation. This paper introduces a new group key distribution method called Viral Electronic Key Exchange (VEKE). This paper examines the protocol as an extension to the Internet Key Exchange (IKE) protocol, but any electronic key exchange protocol can be used (Ex. IKE v2). A feature of this protocol is a parallel key distribution scheme enabled by propagating the key management role to authenticated nodes while establishing security associations across the network. We performed a comprehensive stochastic analysis to develop a model for computing the expected rekey time across the entire group, taking into account the likelihood of node jamming, channel failures, and message corruption. This model was verified with a Monte-Carlo simulation. Our results confirmed that the VEKE protocol can accomplish an over-the-air rekey in a short period of time, even over low bit-rate systems, while preserving rigid security and channel availability properties of the network. It also allows for the amount of pre-placed public-key material and other preparations necessary in tactical networks to be minimized.

Collaboration


Dive into the Michael Thomas Kurdziel's collaboration.

Top Co-Authors

Avatar

Marcin Lukowiak

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Alan Kaminsky

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stanislaw P. Radziszowski

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge