Post Quantum Secure Command and Control of Mobile Agents Inserting quantum-resistant encryption schemes in the Secure Robot Operating System

The secure command & control (C&C) of mobile agents arises in various settings including unmanned aerial vehicles, single pilot operations in commercial settings, and mobile robots to name a few. As more and more of these applications get integrated into aerospace and defense use cases, the security of the communication channel between the ground station and the mobile agent is of increasing importance. The development of quantum computing devices poses a unique threat to secure communications due to the vulnerability of asymmetric ciphers to Shor's algorithm. Given the active development of new quantum resistant encryption techniques, we report the first integration of post-quantum secure encryption schemes with robotic operating system (ROS) and C&C of mobile agents, in general. We integrate these schemes in the application and network layers, and study the performance of these methods by comparing them to present-day security schemes such as the widely used RSA algorithm.

[1]  Oded Regev,et al.  The Learning with Errors Problem (Invited Survey) , 2010, 2010 IEEE 25th Annual Conference on Computational Complexity.

[2]  Daniel Apon,et al.  Status report on the first round of the NIST post-quantum cryptography standardization process , 2019 .

[3]  Dimitrios Sikeridis,et al.  Two PQ Signature Use-cases: Non-issues, challenges and potential solutions , 2019, IACR Cryptol. ePrint Arch..

[4]  Micael S. Couceiro,et al.  On the Security of Robotic Applications Using ROS , 2018, Artificial Intelligence Safety and Security.

[5]  Peter Schartner,et al.  Secure communication for the robot operating system , 2017, 2017 Annual IEEE International Systems Conference (SysCon).

[6]  Frederik Vercauteren,et al.  Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM , 2018, IACR Cryptol. ePrint Arch..

[7]  Agostino Cortesi,et al.  Penetration Testing ROS , 2019, Studies in Computational Intelligence.

[8]  Audun Jøsang,et al.  The Impact of Quantum Computing on Present Cryptography , 2018, ArXiv.

[9]  Daniele Micciancio Lattice-Based Cryptography , 2011, Encyclopedia of Cryptography and Security.

[10]  Stefanie Tellex,et al.  Scanning the Internet for ROS: A View of Security in Robotics Research , 2018, 2019 International Conference on Robotics and Automation (ICRA).

[11]  Douglas Stebila,et al.  Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project , 2016, SAC.

[12]  Miklós Ajtai,et al.  Generating Hard Instances of Lattice Problems , 1996, Electron. Colloquium Comput. Complex..

[13]  Henrik I. Christensen,et al.  SROS: Securing ROS over the wire, in the graph, and through the kernel , 2016, ArXiv.

[14]  Peter Schartner,et al.  Application-level security for ROS-based applications , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[15]  Oded Regev,et al.  Lattice-Based Cryptography , 2006, CRYPTO.

[16]  Ishaani Priyadarshini,et al.  Cyber Security Risks in Robotics , 2017 .

[17]  Cynthia Dwork,et al.  A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.

[18]  Angela Orebaugh,et al.  Guide to IPsec VPNs , 2005 .

[19]  María Naya-Plasencia,et al.  Quantum Security Analysis of AES , 2019, IACR Cryptol. ePrint Arch..

[20]  William Whyte,et al.  Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign , 2010, The LLL Algorithm.

[21]  Bernhard Dieber,et al.  Security Considerations in Modular Mobile Manipulation , 2019, 2019 Third IEEE International Conference on Robotic Computing (IRC).

[22]  O. Regev The Learning with Errors problem , 2010 .

[23]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[24]  Carl Pomerance,et al.  A Tale of Two Sieves , 1998 .