New method of personal data protection from covert channel leakage worked out in MEPhI
05.02.2016

The department №42 of “Cryptology and Discrete Mathematics” employees have worked out methods to limit capacity to carry digital information and prevent data from covert channel leakage minimizing functional and performance losses. The resulting algorithms and software can be applied, first of all, in critical objects protection. 5 students and two post-graduate students working on it are supervised by Anna Epishkina and Konstantine Kogos.

The high-speed network technology development and the significant rise in protocol stack TCP/IP functionality create new threats connected with hidden peculiarities of IP usage for so-called covert channel leakage. This problem has become more current with Edward Snowden’s data about RSA which has been paid $ 10 million annually for encryption tools embedding in their products. The possibility of making and the complexity of covert channel oppression are highly estimated by IBM specialists: covert channels with the capacity up to 0.1 bit/s, and in some cases up to 100 bit/s are allowed.

Anna Epishkina has a PhD in Computer Science, Konstantine Kogos has a PhD as well (since 2015). The research results have been discussed in the Center of Special Development of Ministry of Defense of RF, Federal State Research Institution “Centre of Information Technologies and Systems for Executive Power Authorities” (CIT&S), Lomonosov Moscow State University and other scientific institutes and at international conferences: International Conference on IT Convergence and Security ICITCS (Kuala Lumpur, Malaysia, 2015), Workshop on Emerging Aspects in Information Security EAIS (Lodz, Poland, 2015) etc.