Implementation of Cryptographic Algorithms Via Multithreading N

Total Page:16

File Type:pdf, Size:1020Kb

Implementation of Cryptographic Algorithms Via Multithreading N Bulgarian Chemical Communications, Volume 52, Issue A (pp. 220-224) 2020 DOI: 10.34049/bcc.52.A.218 Implementation of cryptographic algorithms via multithreading N. Sinyagina1, V. Todorov2, G. Kalpachka1* 1South-West University “Neofit Rilski”, 66 Ivan Mihailov Str., 2700 Blagoevgrad, Bulgaria 2Sofia University “St. Kliment Ohridski”, 15 Tsar Osvoboditel Blvd., 1504 Sofia, Bulgaria Received August 11, 2019; Accepted November 08, 2019 Speed of the encryption and decryption processes is one of the main factors when it comes to implementation of cryptographic algorithms. The use of multithreading can significantly decrease the time required for these processes. The article describes a research on multithreaded execution of the RSA algorithm and proposes a conceptual model for implementation, outlining the main points of its software design. The choice of resources, methods and tools for the application deployment has been made as well as an assessment of the used operating system and programming language. Keywords: Multithreading, Cryptographic Algorithms, Asymmetrical Encryption Algorithm RSA. INTRODUCTION Data encryption is a typical example for an algorithm, usually executed as a serial program. In today’s information age the cyber-attacks Serial programs are directly dependent on the become more and more frequent and dangerous. frequency of the used CPU core. Such algorithms The Internet (the biggest unsecured global system do not benefit from multiple cores or threads. for data transmission) carries large amounts of data The aim of this article is to research and analyze that should not be accessible by anyone. the pros and cons of RSA implementation on a Cryptography is a necessary element for most of multithread architecture. The main focus will lay on the current online applications. evaluating the speed when running the same task on Despite high level of security, the methods for a different number of threads. encryption and decryption of data are expected to also have minimum execution delay. Unfortunately, MAIN STATES OF THE MULTITHREAD security and speed are inversely proportional – ARCHITECTURE AND THE RSA faster algorithms have more vulnerabilities, while CRYPTOGRAPHIC ALGORITHM the secure ones need more computational resources. Multithread architecture – hardware allowing The main goal when selecting a cryptographic using multiple CPU cores or threads in parallel. algorithm is finding the optimal balance between Multithread (or parallel) programming is the execution time and security. method of coding, utilizing hardware running with Fortunately, the technologies are rapidly multiple cores and/or threads [2]. improving. The computer components are always Cryptographic algorithm – method for data being upgraded for faster handling of data and conversion using standardized encrypting and computational tasks. The cryptographic algorithms decrypting operations, aiming to protect the data also need to improve along with the technology. from unauthorized access. The RSA algorithm is an In the recent years the parallel programming has example for a cryptographic algorithm and more been established as the best approach for getting specifically an asymmetrical one. higher speed in data processing. Most of the current st In the middle of the first decade of the 21 CPUs use architecture with more than one century the multithreaded architecture started to operational thread [1]. The operating systems are rapidly appear in personal computers. also adapted to multicore technology. The main strength of the multithread Software development on a multicore hardware architecture is the multitasking. It allows the system requires additional effort. Existing serial algorithms processes and the user applications to be physically need to be adapted to parallel solutions. The separated. The different tasks can be run actually in breaking down of a process to its main components parallel. Additionally, different jobs can be and running them simultaneously is the main assigned with different priorities. A lot of the principle of modern programming. Unfortunately, multithread hardware also provides a separation of not all algorithms are adapted and optimized for the the cache memory between the different cores. multithread architecture. * To whom all correspondence should be sent. E-mail: [email protected] 2020 Bulgarian Academy of Sciences, Union of Chemists in Bulgaria 220 N. Sinyagina et al.: Implementation of cryptographic algorithms via multithreading With the increasing popularity of the mobile on the hardware as on the software optimizations technologies the problem with power consumption [5]. raises its priority. The multithread architecture has Published in 1977, the RSA algorithm remains better energy utilization. If a given core is not used, one of the most widely spread and secure it can be set to idle until it is needed again, which algorithms for data transfers over unsecured drastically reduces its power consumption. channels. On top of that, modern technology has almost The basic implementation of the RSA reached the physical limits of single core clock algorithms does not require complex software speed. The only way to get more computational design but executing it with a high security level power is to use additional processing units. requires significant computation power. Its The pros of a multithread architecture are many relatively slow run speed is the main reason why it and are undoubtedly more than enough to is not more widely spread [6]. overwhelm the single thread systems but the cons The main plus of the RSA algorithm is the fact should also be considered [3]. that it is asymmetric. By definition it does not Using multiple threads definitely expands the require exchange of private information between possibilities for software development but also the parties at any point during the data transfer. raises some complications. New issues appear that This is important because any sharing of private were previously not present on serial programs. information has a risk of directly violating the One of them is the access to shared memory. In security. On top of that, if the public key is big serial programming memory conflicts (a process enough in length, the cypher becomes virtually modifying another process’ memory during its impossible to crack. execution) are rare. In parallel programming it is METHOD OF IMPLEMENTING RSA ON common for two or more processes to share and MULTITHREAD ARCHITECTURE modify the same memory. If the threads are not properly synchronized problems can occur. To Proposal for speeding up the RSA process via avoid them, mutual exclusions and semaphores multicore architecture need to be implemented to ensure proper system The RSA algorithm is implemented in 4 steps operation. However, their management requires [7]: more complex software solutions, as well as 1. Key generation – the recipient of the additional resources for their implementation [4]. encrypted messages should generate a pair of keys: The order of executing tasks on the different public and private. The public key can be freely threads is also a big problem in multithread distributed while the private key should not be architectures. Often the processes depend on one shared. The public key is used for encryption while another, which requires timeouts and checks for the the private key is used for decryption. completion and integrity of the results of a given 2. Sharing of public keys – after generating job. the key pair, the public key should be delivered to The separation of the processes and the tracking the sender of the encrypted messages. The sharing of their execution require additional system can occur over unsecured channels because the resources. The use of two cores instead of one does public key by itself does not present any security not mean double performance. The complexity of risks. the job synchronization increases with the number 3. Encryption of the message – anyone having of threads used. There even are cases where the public key can generate encrypted messages dividing a process into multiple ones actually slows using the RSA procedure [8]. down its execution. When developing a 4. Decryption of the message – the encrypted multithreaded software there always are resource message can be decrypted only with the private losses because of the needed bandwidth for the key, which should only be available for the communication and management of the sub tasks. recipient. The multithread architectures fit the modern requirements for development of processor Method for multithreaded implementation of the technologies but on the other hand they put more RSA algorithm weight on the software developers. Additionally, to 1. Creating a number of threads – a number (n) optimize any existing serial algorithms, they need of threads is created at the begging of the task. The to be adapted for the new hardware architectures. number n is predefined and corresponds to the The task execution time does not depend as much number of threads to be used. They cannot exceed the number of threads the operating system can 221 N. Sinyagina et al.: Implementation of cryptographic algorithms via multithreading access. All threads should be able to work in based on measuring the executing speed of the parallel with each other. encryption and decryption processes using different 2. Splitting the data for encryption or hardware resources with the same input parameters. decryption into chunks – the input for encryption It is responsible for running
Recommended publications
  • Information Age Anthology Vol II
    DoD C4ISR Cooperative Research Program ASSISTANT SECRETARY OF DEFENSE (C3I) Mr. Arthur L. Money SPECIAL ASSISTANT TO THE ASD(C3I) & DIRECTOR, RESEARCH AND STRATEGIC PLANNING Dr. David S. Alberts Opinions, conclusions, and recommendations expressed or implied within are solely those of the authors. They do not necessarily represent the views of the Department of Defense, or any other U.S. Government agency. Cleared for public release; distribution unlimited. Portions of this publication may be quoted or reprinted without further permission, with credit to the DoD C4ISR Cooperative Research Program, Washington, D.C. Courtesy copies of reviews would be appreciated. Library of Congress Cataloging-in-Publication Data Alberts, David S. (David Stephen), 1942- Volume II of Information Age Anthology: National Security Implications of the Information Age David S. Alberts, Daniel S. Papp p. cm. -- (CCRP publication series) Includes bibliographical references. ISBN 1-893723-02-X 97-194630 CIP August 2000 VOLUME II INFORMATION AGE ANTHOLOGY: National Security Implications of the Information Age EDITED BY DAVID S. ALBERTS DANIEL S. PAPP TABLE OF CONTENTS Acknowledgments ................................................ v Preface ................................................................ vii Chapter 1—National Security in the Information Age: Setting the Stage—Daniel S. Papp and David S. Alberts .................................................... 1 Part One Introduction......................................... 55 Chapter 2—Bits, Bytes, and Diplomacy—Walter B. Wriston ................................................................ 61 Chapter 3—Seven Types of Information Warfare—Martin C. Libicki ................................. 77 Chapter 4—America’s Information Edge— Joseph S. Nye, Jr. and William A. Owens....... 115 Chapter 5—The Internet and National Security: Emerging Issues—David Halperin .................. 137 Chapter 6—Technology, Intelligence, and the Information Stream: The Executive Branch and National Security Decision Making— Loch K.
    [Show full text]
  • The Marketing of Information in the Information Age Hofacker and Goldsmith
    The Marketing of Information in the Information Age Hofacker and Goldsmith THE MARKETING OF INFORMATION IN THE INFORMATION AGE CHARLES F. HOFACKER, Florida State University RONALD E. GOLDSMITH, Florida State University The long-standing distinction made between goods and services must now be joined by the distinction between these two categories and “information products.” The authors propose that marketing management, practice, and theory could benefit by broadening the scope of what marketers market by adding a third category besides tangible goods and intangible services. It is apparent that information is an unusual and fundamental physical and logical phenomenon from either of these. From this the authors propose that information products differ from both tangible goods and perishable services in that information products have three properties derived from their fundamental abstractness: they are scalable, mutable, and public. Moreover, an increasing number of goods and services now contain information as a distinct but integral element in the way they deliver benefits. Thus, the authors propose that marketing theory should revise the concept of “product” to explicitly include an informational component and that the implications of this revised concept be discussed. This paper presents some thoughts on the issues such discussions should address, focusing on strategic management implications for marketing information products in the information age. INTRODUCTION “information,” in addition to goods and services (originally proposed by Freiden et al. 1998), A major revolution in marketing management while identifying unique characteristics of pure and theory occurred when scholars established information products. To support this position, that “products” should not be conceptualized the authors identify key attributes that set apart solely as tangible goods, but also as intangible an information product from a good or a services.
    [Show full text]
  • War Gaming in the Information Age—Theory and Purpose Paul Bracken
    Naval War College Review Volume 54 Article 6 Number 2 Spring 2001 War Gaming in the Information Age—Theory and Purpose Paul Bracken Martin Shubik Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Bracken, Paul and Shubik, Martin (2001) "War Gaming in the Information Age—Theory and Purpose," Naval War College Review: Vol. 54 : No. 2 , Article 6. Available at: https://digital-commons.usnwc.edu/nwc-review/vol54/iss2/6 This Article is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Bracken and Shubik: War Gaming in the Information Age—Theory and Purpose WAR GAMING IN THE INFORMATION AGE Theory and Purpose Paul Bracken and Martin Shubik ver twenty years ago, a study was carried out under the sponsorship of the ODefense Advanced Research Projects Agency and in collaboration with the General Accounting Office to survey and critique the models, simulations, and war games then in use by the Department of Defense.1 From some points of view, twenty years ago means ancient history; changes in communication tech- nology and computers since then can be measured Paul Bracken, professor of management and of political science at Yale University, specializes in national security only in terms of orders of magnitudes. The new world and management issues. He is the author of Command of the networked battlefield, super-accurate weapons, and Control of Nuclear Forces (1983) and of Fire in the and the information technology (IT) revolution, with its East: The Rise of Asian Military Power and the Second Nuclear Age (HarperCollins, 1999).
    [Show full text]
  • Technology and Economic Growth in the Information Age Introduction
    Technology and Economic Growth in the Information Age 1 POLICY BACKGROUNDER No. 147 For Immediate Release March 12, 1998 Technology and Economic Growth in the Information Age Introduction The idea of rapid progress runs counter to well-publicized reports of an American economy whose growth rate has slipped. Pessimists, citing statistics on weakening productivity and gross domestic product growth, contend the economy isn’t strong enough to keep improving Americans’ standard of living. They offer a dour view: the generation coming of age today will be the first in American history not to live better than its parents.1 Yet there is plenty of evidence that this generation is better off than any that have gone before, and given the technologies likely to shape the next quarter century, there are reasons to believe that progress will be faster than ever — a stunning display of capitalism’s ability to lift living standards. To suppose otherwise would be to exhibit the shortsightedness of Charles H. Du- ell, commissioner of the U.S. Office of Patents, who in 1899 said, “Everything that can be invented has been invented.” Ironically, though, our economic statistics may miss the show. The usual measures of progress — output and productivity — are losing relevance “The usual measures of prog- in this age of increasingly rapid technological advances. As the economy ress — output and produc- evolves, it is delivering not only a greater quantity of goods and services, but tivity — are losing relevance also improved quality and greater variety. Workers and their families will be in this age of increasingly rapid technological advanc- better off because they will have more time off, better working conditions, es.” more enjoyable jobs and other benefits that raise our living standards but aren’t easily measured and therefore often aren’t counted in gross domestic product (GDP).
    [Show full text]
  • Introduction the Information Age Has Changed How Literacy Can Be Defined
    Introduction The information age has changed how literacy can be defined. Broadband access, along with other technologies, is changing the world and the information within it (Headrick, 2000; Williams, 1997; Mason, 1986). Tools used in learning and literacy are evolving at an incredible rate (Baron, 1999; Bruce, 2001; Bruce, Michaels, & Watson-Gegeo, 1985). Many would argue that a single definition could not encompass what literacy in the information age is. Further, the conceptual idea of literacy and information is continually evolving. Some would say that literacy is contextual and similar to constructivism, as each situation requires unique and interdependent skills. Winner (1986) suggests: No idea is more provocative in controversies about technology and society than the notion that technical things have political qualities. At issue is the claim that the machines, structures, and systems of modern material culture can be accurately judged not only for their contributions to efficiency and productivity and their positive and negative environmental side effects, but also for the ways in which they can embody specific forms of power and authority. Being literate, in many situations, also affords one power; the power of information can be life changing. For example, where does one obtain the information needed to vote - from a friend, post office, blog, wiki, newspaper, magazine, radio, television, or flyer? And possibly more important, who is distributing the information about a potential candidate? In many communities, local information is deemed more trustworthy than cooperate sources. Understanding and being able to disseminate information in a vast array of contexts is essential to staying literate. Definition Literacy in the information age can be defined as the ability to acquire and utilize knowledge, skills, and other resources to facilitate learning.
    [Show full text]
  • The Effect of E-Commerce on the International Trade of Small And
    Southern Illinois University Carbondale OpenSIUC Research Papers Graduate School 5-2016 The ffecE t of E-commerce on The nI ternational Trade of Small and Medium Enterprises in China Yanan Chang [email protected] Follow this and additional works at: http://opensiuc.lib.siu.edu/gs_rp Recommended Citation Chang, Yanan. "The Effect of E-commerce on The nI ternational Trade of Small and Medium Enterprises in China." (May 2016). This Article is brought to you for free and open access by the Graduate School at OpenSIUC. It has been accepted for inclusion in Research Papers by an authorized administrator of OpenSIUC. For more information, please contact [email protected]. THE EFFECT OF E-COMMERCE ON THE INTERNATIONAL TRADE OF SMALL AND MEDIUM ENTERPRISES IN CHINA by Yanan Chang B.S., Zhengzhou University of Light Industry, 2013 A Research Paper Submitted in Partial Fulfillment of the Requirements for the Master of Arts Department of Economics in the Graduate School Southern Illinois University Carbondale May 2016 RESEARCH PAPER APPROVAL THE EFFECT OF E-COMMERCE ON THE INTERNATIONAL TRADE OF SMALL AND MEDIUM ENTERPRISES IN CHINA By Yanan Chang A Research Paper Submitted in Partial Fulfillment of the Requirements for the Degree of Master in the field of Economics Approved by: Professor Chifeng Dai Graduate School Southern Illinois University Carbondale December 15, 2015: AN ABSTRACT OF THE RESEARCH PAPER OF YANAN CHANG, for the Master degree in ECONOMICS, presented on December 15, 2015, at Southern Illinois University Carbondale. TITLE: THE EFFECT OF E-COMMERCE ON THE INTERNATIONAL TRADE OF SMALL AND MEDIUM ENTERPRISES IN CHINA MAJOR PROFESSOR: Professor Chifeng Dai In modern world, economic globalization is the trend of the economic development.
    [Show full text]
  • Rejuvenation and the Age of Information Daniel Menasché, Kishor Trivedi, Eitan Altman
    Rejuvenation and the Age of Information Daniel Menasché, Kishor Trivedi, Eitan Altman To cite this version: Daniel Menasché, Kishor Trivedi, Eitan Altman. Rejuvenation and the Age of Information. WoSAR 2019 - 11th International Workshop on Software Aging and Rejuvenation, Oct 2019, Berlin, Germany. hal-02293628 HAL Id: hal-02293628 https://hal.inria.fr/hal-02293628 Submitted on 21 Sep 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Rejuvenation and the Age of Information Daniel Sadoc Menasche´ Kishor Trivedi Eitan Altman Department of Computer Science Department of Computer Science Inria, Universite´ Coteˆ D’Azur Federal University of Rio de Janeiro Duke University, United States Sophia Antipolis, France Rio de Janeiro, RJ, Brazil [email protected] [email protected] [email protected] Abstract—Two decades after the seminal paper on software data [6]. There is a cost to refresh a software system (and aging and rejuvenation appeared in 1995, a new concept and met- decrease software aging) or to refresh a virtual message ric referred to as the age of information (AoI) has been gaining (and decrease age of information). In Section IV we attention from practitioners and the research community.
    [Show full text]
  • A Brief History of IT
    IT Computer Technical Support Newsletter A Brief History of IT May 23, 2016 Vol.2, No.29 TABLE OF CONTENTS Introduction........................1 Pre-mechanical..................2 Mechanical.........................3 Electro-mechanical............4 Electronic...........................5 Age of Information.............6 Since the dawn of modern computers, the rapid digitization and growth in the amount of data created, shared, and consumed has transformed society greatly. In a world that is interconnected, change happens at a startling pace. Have you ever wondered how this connected world of ours got connected in the first place? The IT Computer Technical Support 1 Newsletter is complements of Pejman Kamkarian nformation technology has been around for a long, long time. Basically as Ilong as people have been around! Humans have always been quick to adapt technologies for better and faster communication. There are 4 main ages that divide up the history of information technology but only the latest age (electronic) and some of the electromechanical age really affects us today. 1. Pre-Mechanical The earliest age of technology. It can be defined as the time between 3000 B.C. and 1450 A.D. When humans first started communicating, they would try to use language to make simple pictures – petroglyphs to tell a story, map their terrain, or keep accounts such as how many animals one owned, etc. Petroglyph in Utah This trend continued with the advent of formal language and better media such as rags, papyrus, and eventually paper. The first ever calculator – the abacus was invented in this period after the development of numbering systems. 2 | IT Computer Technical Support Newsletter 2.
    [Show full text]
  • Development in the Information Age: Issues in the Regulation of Intellectual Property Rights, Computer Software and Electronic C
    May 2004 Intellectual Property Rights and Sustainable Development UNCTAD-ICTSD Project on IPRs and Sustainable Development Development in the Information Age Issues in the Regulation of Intellectual Property Rights, Computer Software and Electronic Commerce By Ruth L. Okediji William L. Prosser Professor of law, University of Minnesota, USA ICTSD Issue Paper No. 9 International Centre for Trade and Sustainable Development UNCTAD May 2004│Intellectual Property Rights and Sustainable Development UNCTAD-ICTSD Project on IPRs and Sustainable Development Development in the Information Age Issues in the Regulation of Intellectual Property Rights, Computer Software and Electronic Commerce By Ruth L. Okediji William L. Prosser Professor of Law, University of Minnesota, USA Issue Paper No. 9 UNCTAD ii Published by International Centre for Trade and Sustainable Development (ICTSD) International Environment House 13 chemin des Anémones, 1219 Geneva, Switzerland Tel: +41 22 917 8492 Fax: +41 22 917 8093 E-mail: [email protected] Internet: www.ictsd.org United Nations Conference on Trade and Development (UNCTAD) Palais des Nations 8-14 avenue de la Paix, 1211 Geneva 10, Switzerland Tel: +41 22 907 1234 Fax: +41 22 907 0043 E-mail: [email protected] Internet: www.unctad.org Funding for the UNCTAD-ICTSD Project on Intellectual Property Rights and Sustainable Development has been received from the Department of International Development (DFID, UK), the Swedish International Development Agency (SIDA, Sweden) and the Rockefeller Foundation. The Project is being implemented by the International Centre for Trade and Sustainable Development (ICTSD) and the secretariat of the United Nations Conference on Trade and Development (UNCTAD) (Project Number INT/OT/1BH).
    [Show full text]
  • Potts, David S. the Big Issue Command and Combat in the Information Age
    About the CCRP The Command and Control Research Program (CCRP) has the mission of improving DoD’s understanding of the national security implications of the Information Age. Focusing upon improving both the state of the art and the state of the practice of command and control, the CCRP helps DoD take full advantage of the opportunities afforded by emerging technologies. The CCRP pursues a broad program of research and analysis in information superiority, information operations, command and control theory, and associated operational concepts that enable us to leverage shared awareness to improve the effectiveness and efficiency of assigned missions. An important aspect of the CCRP program is its ability to serve as a bridge between the operational, technical, analytical, and educational communities. The CCRP provides leadership for the command and control research community by: • articulating critical research issues; • working to strengthen command and control research infrastructure; • sponsoring a series of workshops and symposia; • serving as a clearing house for command and control related research funding; and • disseminating outreach initiatives that include the CCRP Publication Series. This is a continuation in the series of publications produced by the Center for Advanced Concepts and Technology (ACT), which was created as a “skunk works” with funding provided by the CCRP under the auspices of the Assistant Secretary of Defense (C3I). This program has demonstrated the importance of having a research program focused on the national security implications of the Information Age. It develops the theoretical foundations to provide DoD with information superiority and highlights the importance of active outreach and dissemination initiatives designed to acquaint senior military personnel and civilians with these emerging issues.
    [Show full text]
  • Information Age Conflicts
    Zürcher Beiträge zur Sicherheitspolitik und Konfliktforschung Nr. 64 Myriam Dunn Information Age Conflicts A Study of the Information Revolution and a Changing Operating Environment Hrsg.: Kurt R. Spillmann und Andreas Wenger Forschungsstelle für Sicherheitspolitik und Konfliktanalyse der ETH Zürich Inhaltsverzeichnis Preface 5 Abbreviations 9 List of Tables and Figures 13 Introduction 15 Part I – Model Development of a Research Framework 25 1 Theoretical Background 27 2 Developing a Model 42 3 Deducing the Hypotheses and Operationalization 46 Part II – Theory Concepts to Explain a Changing International System 55 1 The Background of Change: A Phenomenon Dubbed Information Revolution 59 2 Redistribution and Changing Nature of Power 73 3 The Information Revolution’s Impact on Military Affairs 85 Part III – Data Collection Operation Allied Force, 25 March–10 June 1999 99 1 Current Military Doctrinal Perception of Information’s Role in Warfare 102 2 Struggle for Air and Information Superiority: Aspects of Information Operations 121 3 Influencing Factors in Kosovo 161 4 Level of Credibility throughout Operation Allied Force 162 5 Intervening Variables 166 6 Level of Success of Operation Allied Force 167 Part IV – Analysis Identifying Factors that Influence Information Age Conflicts 173 1 Asymmetric Credibility 176 2 Technology, Terrain, Weather, International Law 182 3 Asymmetrical Challenge 187 4 Blurring State Boundaries and Multiplication of Actors 191 5 Multiplication of Influential Actors 195 6 Blurring of Boundaries between Military and Politics 199 7 Blurring of Boundaries between Battlefield and Civilian Realm 204 8 Information Operations Decisive in Information Age Conflicts 207 9 Conclusion: Which Influencing Factors Hamper Information Age Conflicts and How Strongly 208 Part V – Review Criticizing the Model 213 1 Reassessing the Five Theorems 215 2 Revising the Model 219 Conclusion 223 Bibliography 233 4 5 Preface The basic conditions in which international relations operate have undergone some fundamental changes in the past decade.
    [Show full text]
  • Information Age Anthology Vol III: the Information Age Military
    About the CCRP The C4ISR Cooperative Research Program (CCRP) has the mission of improving DoD’s understanding of the national security implications of the Information Age. Focusing upon improving both the state of the art and the state of the practice of command and control, the CCRP helps DoD take full advantage of the opportunities afforded by emerging technologies. The CCRP pursues a broad program of research and analysis in information superiority, information operations, command and control theory, and associated operational concepts that enable us to leverage shared awareness to improve the effectiveness and efficiency of assigned missions. An important aspect of the CCRP program is its ability to serve as a bridge between the operational, technical, analytical, and educational communities. The CCRP provides leadership for the command and control research community by: n articulating critical research issues; n working to strengthen command and control research infrastructure; n sponsoring a series of workshops and symposia; n serving as a clearing house for command and control related research funding; and n disseminating outreach initiatives that include the CCRP Publication Series. This is a continuation in the series of publications produced by the Center for Advanced Concepts and Technology (ACT), which was created as a “skunk works” with funding provided by the CCRP under the auspices of the Assistant Secretary of Defense (C3I). This program has demonstrated the importance of having a research program focused on the national security implications of the Information Age. It develops the theoretical foundations to provide DoD with information superiority and highlights the importance of active outreach and dissemination initiatives designed to acquaint senior military personnel and civilians with these emerging issues.
    [Show full text]