Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (6): 1-19.doi: 10.11959/j.issn.2096-109x.2023079

• Comprehensive Review •    

Review of cryptographic application security evaluation techniques for new critical infrastructures

Gaolei LI1, Jianhua LI1, Zhihong ZHOU1, Hao ZHANG2   

  1. 1 School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
    2 China Information Security Evaluation Center, Beijing 100085, China
  • Revised:2023-08-05 Online:2023-12-01 Published:2023-12-01
  • Supported by:
    TheNational Nature Science Foundation of China(62202303);TheNational Nature Science Foundation of China(U20B2048);Shanghai Sailing Program(21YF1421700);Defence Industrial Technology Development Program(JCKY2020604B004)

Abstract:

The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technologies such as 5G/6G, artificial intelligence, and blockchain in various fields.The security evaluation of cryptography applications, as a key technological resource for ensuring the security of national information, integration, and innovation infrastructure, has risen to the level of international law and national development strategy.It is urgent to construct a comprehensive, fine-grained, and self-evolving cryptography security evaluation system throughout the data lifecycle.The typical APT attacks and ransomware attacks faced by new critical infrastructure in industries such as energy, medicine, and transportation in recent years were considered.And then the growing demand for security evaluation of cryptography applications was analyzed in the face of new business requirements such as preventing endogenous data security risks, achieving differentiated privacy protection, and supporting authenticated attack traceability.The new challenges were also examined, which were brought by new information infrastructure (including big data, 5G communication, fundamental software, etc.), integration infrastructure (including intelligent connected vehicles, intelligent connected industrial control systems, etc.), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.

Key words: new critical infrastructure, APT attack, cryptography application, security evaluation, domestication, intelligentization

CLC Number: 

No Suggested Reading articles found!