The Throughput of Technical Channels as an Indicator of Protection Discrete Sources from Information Leakage Igor Korobiichuk1*[0000-0002-5865-7668], Serhii Ivanchenko2[0000-0003-1850-9596], Oleksandr Roma2[0000-0001-9074-6137], Anatolij Golishevsky3[0000-0001-9981-7771], Ruslan Hryshchuk4[0000-0001-9985-8477] 1 Warsaw University of Technology, Institute of Automatic Control and Robotics, Warsaw, 02- 525, Poland i.korobiichuk@mchtr.pw.edu.pl 2 National technical university of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Institute of special communication and information protection, Kyiv, 03056, Ukraine soivanch@ukr.net, proffesor69@ukr.net 3 National scientific research institute of special communications and information protection of Ukraine, Kyiv, 03142, Ukraine tolyan207@ukr.net 4 Sergey Korolyov Zhytomyr Military Institute, Cybersecurity Department of the Research Cen- ter, Zhytomyr, 10004, Ukraine dr.hry@i.ua Abstract. Considered the theoretical conditions of discrete information sources security, analyzed the throughput as an indicator of its protection from informa- tion leaks. Introduced the notion of throughput limit values of information leaks channel, proposed its use as a security norms. The resulting values establish a connection of specified index with the desired probability of error in the chan- nel. Keywords: information, information security, security risk, safety of information, technical channels of information leakage, technical information protection. 1. Introduction One of the tasks of information security management [1, 2], as determined Deming- Shewhart cycle, is a security risk analysis, including risk of a breach of information security from leaking by technical channels. It is known, that work of technical means and systems of processing and transmission of information is almost always accom- panied by a list of adverse effects [3-12]. These are unwanted radiation of electro- magnetic fields to the environment, emission and leakage of electric current to taking off conductors. These carriers may arise from information sources and uncontrolled spread the dangerous signals outside the controlled area. It is known, that the criterion of protection is the condition of impossibility extract semantic content from intercepted message [1, 2], that at the point of interception is determined certain of energy terms – norm the signal/noise ratio. In turn, a quantita- tive norm of this measure must provide authentically needed probability of error in technical leakage channel and, in accordance, previously specified security risk [1, 12-14]. For substantiation of dependence signal/noise ratio with probability of error in work [13, 14] was based on the Kotelnikov’s optimum receiver [15-18]. In its relation was found the assessment of lower limit of the probability of errors in the channel, determined by allowable signal/noise ratio and does not depend from choose of inter- ception receiver. As is evident, determining the desired probability of error in the technical leakage channels requires certain studies and solutions. So, the main task of this article is justification the technical channel throughput as indicator of protection discrete sources from information leakage, and also justifica- tion the dependency of this throughput with the necessary probability of error in the technical leakage channel, that will provide a given state of information security risk by given parameters. 2. Materials and methods of research To resolve this specified task, consider the channel of leakage, as discrete channel, which connects a source of information and enemy receiver with some non-fixed, but different from zero probability of error (Fig. 1). Fig. 1. Discrete channel of information leakage Suppose at the input channel of information sources gets some information sequence data Xnk, for ease, binary symbols, where k – number of combination (k = 1, 2, 3,…, 2n) with probability р(Xnk). The specified probability р(Xnk) – is a priori probability, which characterizes the chances of guessing by enemy before it is transmitted through the channel. In the channel under the influence of noise sequence Xnk transformed into some consistency Ynl the same length and the same alphabet symbols, where l – number of combination (l = 1, 2, 3,…, 2n). Noise is random nature, that’s why this transforma- tion can be described by conditional probability р(Ynl/Xnk), which is a measure that determines possibility of transition sequences Xnk to Ynl. In this case a posteriori prob- ability, which determines the chances of guessing the information signs by enemy, after taking its continuous implementation, can be expressed by the Bayes formula: p ( X kn ) p (Yl n / X kn ) p ( X kn / Yl n )  , (1) p (Yl n ) where 2n p(Yl n )   p ( X kn ) p (Yl n / X kn ) (2) k 1 – the probability of sequence Ynl at the output of channel. For the given channel its throughput is defined as the maximum amount of infor- mation for all possible its implementation for all probability allocations, which can be transmitted through the channel, [19 - 22]: С  maxI ( X;Y) , (3) Х where I ( X ;Y )  H( X )  H( X / Y )  H(Y )  H(Y / X )  I (Y; X ) (4) – mutual channel information quantity, 1 1  n 1 2 1 H ( X )  M  log a n   lim  p ( X kn ) log p ( X kn ) (5) n p( X k )  n   n k 1 – the average amount of information that produces source for one binary sign - abso- lute source entropy Х, n n 1 2 2 1  H ( X Y )  lim n  n  p( X kn , Yl n )log p( X n Y n ) k 1 l 1 (6) k l – conditional source entropy for a binary sign, n 1 2 1 , n  n  H (Y )  lim l 1 p (Yl n ) log p (Yl n ) (7) – unconditional entropy of channel output Y for one binary sign, n n 1 2 2 1 H (Y / X )  lim n n   p (Yl n , X kn ) log p (Y n n (8) k 1 l 1 l / Xk ) – conditional entropy of channel output for one binary sign or conversion Xnk  Ynl. If k = l, then the combination of sequences Xnk = Ynl and, in accordance, the transmission in the channel occurred unmistakably. It is not difficult to make sure, that Н(Y/X) = 0 bit, and C = 1 bit. In other cases there is an error and if it is probabil- ity higher, than higher the difference between Xnk and Ynl, than greater distorted of symbols and information lost. In this case Н(Y/X)  1 bit, and C  0 bit. It should be noted, that equality of latter achieved by conditions of equal probability and statistic errors independence, but statistical dependence of mistakes, even і by conditions of Its equal probability will result to increased throughput [15-18]. Shannon's information theory also known, that information can freely pass through the channel only on condition, if С  H(X ) . If С  H(X ) information through the channel may partially pass and partially lost. On condition, if С = 0 bit, than chan- nel condition is provided as "channel breakage" or "no channel". Condition of "channel breakage" is theoretically idealized condition, which is de- sirable for all technical information leakage. But in practice it is difficult to reach, and even at all impossible. Typically, ensure of that conditions for the safe processing and transmission of information requires the creation specific objects and building constructions, it is associated with the creation of large-scale controlled areas, using highly efficient surge protector, or autonomous power sources, etc. All it requires large financial and energy costs, which sometimes may not be appropriate because of their dominance over most information precious. Because safety of information should include a balance between deliberately spent and acceptable lost. In order to optimize the costs of securing technical information leakage requires a list of scientific-technical justifications and solutions, associated with providing small but nonzero values of through. This indicator must take into account the variety of modes of technical processing and transmission items, of which information leakage, features of group transmission channels that combine information from different sources with different properties, the possibility of automated regulation of noise im- munity channels, etc. Considering this throughput of technical leakage channels Сtlc can be attributed to indicators of the evaluation of information security. For example, if asked acceptable information security risk, then it possible to put accordance of the limit allowable maximum throughput of technical leakage channel Сtlc l.a.. The presence of of this rule allows to find the probability of error in the leakage channel and power conditions in the point of possible interception – the signal/noise ratio, which will ensure the secu- rity of information with given permissible risk. 3. The results of research Let's analyze the nature of throughput for the general case and justify communication of maximum throughput and needed for ensure probability of errors. In this case will suppose, that data, which simultaneously can be processed by technical means and flow by technical channels, can have very different origins, that is generated from Q different information sources with a different syntax and different semantics (Fig. 2). Obviously, that due to the fragmentation of sources for each one, dangerous signal spreading by the same environment, which provides the same signal/noise ratio at the intercept receiver input, technical leakage channel can create different throughput. It is also obvious, if leakage of information from each source consider separately, then shown on Fig. 2 technical channel may consist of several technical channels, gener- ated from different sources with its throughput. But for all of these channels takes place only one receiver, for which need to justify condition of impossibility of infor- mation interception. Fig. 2. Typical technical channels of information leakage for modern technical means of information processing and transmission with the given limit allowable throughput Suppose that in leakage channels have a place an errors, the presence of which is guaranteed by noise of environment spreading of dangerous signals. All errors in the channel are statistically independent and are characterized by probability, which is not below some certain of intercept receiver features. Based on the used in article the definition of throughput, which is expressed by ra- tios (3), (4), (5), (6), (7) and (8), throughput of technical leakage channel, that calcu- lated on average per one binary sign, may be expressed by the formula [15, 16]: Сtlc  1 H(Y / X ) [bit] . (9) Hmax( X ) One of the approaches for ensure the guaranteed safety, is calculation the indica- tors of security for the worst case in terms of security. In this case protection will be ensured and in the the worst case and in all other cases, with the creation of a certain reserve. Determining of worst case is requires the inspection of conditions security for all of leakage sources. Therefore, will expression the technical leakage channels throughput as averaging of each source throughput and select among from last limit allowable maximum, which will apply as an indicator of security: 1 Q С tlc   Cr . Q r 1 (10) On the other hand, considering (9) and (8) specified throughput will look like: n n 1 2 2 1 С tlc  1  lim   p (Yl n , X kn ) log . (11) n  n k 1 l 1 p (Yl / X kn ) n Is necessary to find identity of ratios (10) and (11) and select in throughput of technical leakage channels a maximum component Cr and to accept it as the norm for Сtlc. To do this will analyze of probability in ratio (11). In view of the independence of errors, mentioned probabilities can be expressed in the form of next ratios. Conditional probability, which characterizes the possibility of sequence at the out- put of channel Ynl, if at the input came Xnk: p(Yl n / X kn )  p( y1 / x1 ) p( y 2 / x2 )  ...  p( yі / xі )  ...  p( y n / x n ) . (12) where р(yі/хі) – the probability of in і- grade of sequence Ynl the sign - y at the output of channel, If at the input came sign хі of sequence Xnk in the same grade. It is not difficult to notice, that the probability р(yі/хі) of additive channel can be expressed as р(yі/хі) = р(yі – xі) = р(еі). (13) In view of the (13) the ratio (12) for conditional probability can be expressed in terms of the multiplication of errors probability р(еі), which taking values within the limits 0 < р(еі) < ½ [7]. p(Yl n / X kn )  p(e1 ) p(e2 )  ...  p(eі )  ...  p(en ) . (14) Compatible probability, which describes the possibility of simultaneous existence on the channel input a sequence Xnk and on the channel input Ynl, equals: p(Yl n , X kn )  p ( X kn ) p (Yl n / X kn )   p( x1 ) p ( x2 )  ...  p ( xі )  ...  p ( xn ) (15)   p( y1 / x1 ) p ( y 2 / x2 )  ...  p( yі / xі )  ...  p ( y n / xn ) and considering (13) will view as: p(Yl n , X kn )   p ( x1 ) p ( x2 )  ...  p( xі )  ...  p ( xn )   , (16)   p(e1 ) p(e2 )  ...  p (eі )  ...  p (en )  where р(хі) – probability of хi - sign on the channel output. Inserting (14) and (16) to (11) and simplifying its, we get next: 1 n   1 n С  lim n  n  1   p (eі ) log 2 p(eі )   lim  Ci , (17) і 1  e  n n і 1 where Сі – channel throughput for і- information sign. Equating Q = n, we get the required identity, where С tlc l.a  мах Ci  1   p (eі ) log 2 p (eі ) (18) i , n ,Q e It should be noted, that the ratio (14), which expresses technical leakage channels throughput, is multidimensional convex downwards function of the probability of errors р(еі). It is not difficult to verify, taking by all arguments the second derivative and identifying a sign. The specified can be shown graphically for arguments р(еі), having fixed everyone else in the range from 0 to 1/2 (Fig. 3): р(еj) = const, 0 < р(еj) < 1/2 for all j = 1, 2,…, n, j  і. (19) As seen from the graphical representation of throughput, ensuring its limit allow- able value Сl.a. for different values і can be determined different values of errors prob- ability. Fig 3. Graphs of dependence of throughput leakage sources from errors probability in the technical channel Assertion. If asked a discrete binary channel for which presence of errors is guaran- teed, all errors are statistically independent and their probabilities for all і (і = 1, 2,…, n) are within the limits рmin  p(eі)  1 – рmin, then its throughput by average does not exceed limit allowable value as expressed by the ratio: Cl.a  1  pmin log 2 pmin  (1  pmin ) log 2 (1  pmin )  С (20) The proof. If you know the errors probability p(eі), then throughput channel for і- information signs may be expressed by ratio: Сі  1   p (eі ) log 2 p (eі )  1  p (eі ) log 2 p (eі )  e , (21)  (1  p (eі )) log 2 (1  p (eі ))  1  h( p (eі )) where h( p )  p log 2 1  (1  p ) log 2 1 – entropy function of the argument р. р (1  p ) From the convexity properties of entropic function h(p) and its symmetry from р = 1/2 it follows that for argument p( рmin; 1 – рmin) its value is limited from below: 1 1 h( p)  hmin  p min log 2  (1  pmin ) log 2 , (22) pmin (1  pmin ) and throughput from top Сі  Cgr.d  1  pmin log 2 pmin  (1  pmin ) log 2 (1  pmin ) . (23) Inserting inequality (19) to the value (14) we obtain upper limit, or limit allowable channel throughput for a given рmin: 1 n С  lim n  n  і 1 Ci  Cгр.д  1  pmin log 2 pmin  , (24)  (1  pmin ) log 2 (1  pmin ) that had to prove. Therefore, based on Shannon information theory provided considered theoretical security of discrete sources analysis throughput as an indicator of security from leak- ing by technical channels. The concept of limit allowable throughput leakage channel and suggested its to use as a security norms. Conclusions Obtained analytical ratios, establishing communication of norms given index with the necessary of errors probability in the channel. In establishing consistency between the set of security risks and necessary limit allowable throughput of the technical leakage channel, using of these ratios allows determining the desired probability of error in the channel and in the next -desired signal/noise ratio in the point of possible information interception. Obtained results in the article is the development of the theory of information se- curity from leaking by technical channels, and also could form the basis for the im- plementation in standards of information security series ISO/IEC 27000. References 1. Information technology. Security techniques. Information security management systems. Requirements [ISO/IEC 27001:2013]. 2. The Law of Ukraine "About protection of information in telecommunication systems". http://www.zakon.rada.gov.ua/go 3. Buzov G.А., Kalinin S.V., Kondratev А.V. Protection of information from leaks through technical channels, Goryachaya liniya: Moskva, Telecom (2005) 4. Parshutkin, A.V., Levin, D.V., Zaytsev, S.A., Egin, A.V.: Application of structural inter- ference for data protection from information Leakage in the stray electromagnetic radia- tions channel. SPIIRAS Proceedings, vol 3 (58), pp. 160-181. (2018) doi: 10.15622/sp.58.7 5. Kuhn G.: Compromising emanations: eavesdropping risks of computer displays. This technical report is based on a dissertation submitted June 2002 by the author for the degree of Doctor of Philosophy to the University of Cambridge, Wolfson College (2002) http://www.cl.cam.ас.uk/techreports 6. Kuhn, M.G.: Electromagnetic eavesdropping risks of flat-panel displays. Lecture Notes in Computer Science, 3424, pp. 88-107 (2005) 7. Kuhn, M.G.: Optical time-domain eavesdropping risks of CRT displays. Proceedings - IEEE Symposium on Security and Privacy, 2002-January, art. no. 1004358, pp. 3-18 (2002) doi: 10.1109/SECPRI.2002.1004358 8. Korobiichuk, I., Dobrzhansky, O., Kachniarz, M.: Remote control of nonlinear motion for mechatronic machine by means of CoDeSys compatible industrial controller. Tehnički vjesnik/Technical Gazette, Vol. 24/No. 6, pp. 1661-1667 (2017) doi: 10.17559/TV- 20151110164217 9. Lenkov, S.V., Peregudov, D.А., Horoshko, V.А.: Methods and means of information pro- tection. Tom І. Unauthorized receipt of information, Ariy: Kyiv (2008) 10. Qiu, J., Li, H., Zhao, C.: Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication. Computers and Security, 82, pp. 1-14 (2019) doi: 10.1016/j.cose.2018.12.003 11. Korobiichuk I.V., Hryshchuk R.V., Horoshko V.O., Hokhlacheva Yu.E. Self-diagnostics of complex systems with a software-configurable structure. Informatics and Mathematical Methods in Simulation, vol 8, No. 1, pp. 36-47 (2018) 12. Korobiichuk, I., Hryshchuk, R., Mamarev, V., Okhrimchuk, V., Kachniarz, M.: Cyberat- tack Classificator Verification. International Conference on Diagnostics of Processes and Systems DPS 2017: Advanced Solutions in Diagnostics and Fault Tolerant Control, pp. 402-41 (2018) doi: 10.1007/978-3-319-64474-5_34 13. Ivanchenko, S.О.: Justification safety risk information about its security from leaking by technical channels. Scientific and technical digest "Legal, regulatory and metrological support of information security in Ukraine", Kiev, NTUU "KPI" SRC "Tezis", vol 1 (31), pp. 9 – 13 (2016) 14. Duc, A., Faust, S., Standaert, F.-X.: Making masking security proofs concrete: Or how to evaluate the security of any leaking device. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9056, pp. 401-429 (2015) doi: 10.1007/978-3-662-46800-5_16 15. Fink L. М.: The theory of transfer of discrete messages [2-d edition], Sov. Radio: Moskva, (1970) 16. Kulkarni, A.N., Bukate, R.R., Nanaware, S.D.: Study of Various Attacks and Routing Pro- tocols in MANETS. 2018 International Conference on Information, Communication, En- gineering and Technology, ICICET 2018, art. no. 8533696 (2018) doi: 10.1109/ICICET.2018.8533696 17. Burachenko, D.L., Zavarin, G.D., Klyuyev, N.I. et. al.: General theory of communication, VAS: Leningrad (1970) 18. Lee, M., Neifeld, M.A., Ashok, A.: Capacity of electromagnetic communication modes in a noise-limited optical system. Applied Optics, 55 (6), pp. 1333-1342 (2016) doi: 10.1364/AO.55.001333 19. Ivanovsky, R.I.: Theory of probability and mathematical statistics, BHV: Petersburg (2008) 20. Niyato, D., Hossain, E.: A queuing-theoretic and optimization-based model for radio re- source management in IEEE 802.16 broadband wireless networks. IEEE Transactions on Computers, 55 (11), pp. 1473-1488 (2006) doi: 10.1109/TC.2006.172 21. Gallagher R. G.: Information theory and reliable communication, Sovetskoe radio: Moskva (1974) 22. Qian, Y., Zhou, X., Li, J., Shu, F., Jayakody, D.N.K.: A Novel Precoding and Impulsive Noise Mitigation Scheme for MIMO Power Line Communication Systems. IEEE Systems Journal (2018) doi: 10.1109/JSYST.2018.2880962