Application and performance analysis of various AEAD techniques for space telecommand authentication

Secure communications in the context of civil space missions gained a major attention in the last few years, mainly thanks to the activities promoted in this field by the Consultative Committee for Space Data Systems. Risk analyses performed by several space agencies have provided indications of the impact of different security threats on several categories of space missions. As a result, to ensure a minimum level of security, at least Telecommand authentication should be applied to all missions. Besides standard and well known algorithms, alternative authentication solutions are to be considered, and tested for possible adoption in the space context, in order to provide a scalable and flexible authentication framework. To this aim, this paper focuses on some Authenticated Encryption with Associated Data techniques, and on their thorough evaluation by a detailed model of the space Telecommand channel and protocol stack, in order to achieve an optimal selection for application in the real space communication environment.

[1]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[2]  D. McGrew,et al.  The Galois/Counter Mode of Operation (GCM) , 2005 .

[3]  John S. Baras,et al.  An authentication framework for a hybrid satellite network with resource-constrained nodes , 2005, International Conference on Space Information Technology.

[4]  Quan Zhang,et al.  A new method of enhancing telecommand security: the application of GCM in TC protocol , 2007, Other Conferences.

[5]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[6]  Elaine B. Barker,et al.  The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .

[7]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[8]  E. McKinney Generalized Birthday Problem , 1966 .

[9]  Phillip Rogaway,et al.  Authenticated-encryption with associated-data , 2002, CCS '02.

[10]  Susanna Spinsante,et al.  New Perspectives in Telecommand Security: The Application of EAX to TC Segments , 2007 .

[11]  Elaine B. Barker Digital Signature Standard (DSS) [includes Change Notice 1 from 12/30/1996] | NIST , 1994 .

[12]  Mihir Bellare,et al.  The EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency) , 2004 .

[13]  Özgür B. Akan,et al.  InterPlaNetary Internet: state-of-the-art and research challenges , 2003, Comput. Networks.

[14]  Russ Housley,et al.  Counter with CBC-MAC (CCM) , 2003, RFC.