GPS Security in the Military Past, Present, and Future.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Side-Channel Attacks on RSA with CRT Weakness of RSA Alexander Kozak Jared Vanderbeck.
Smart Card Authentication. Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques.
Emmanuel Kollie.
IE 419/519 Wireless Networks Lecture Notes #6 Spread Spectrum.
Modern Navigation Thomas Herring MW 11:00-12:30 Room A
GPS Signal Structure Sources: –GPS Satellite Surveying, Leick –Kristine Larson Lecture Notes 4519/asen4519.html.
T GPS Fundamentals Your location is: 37 o ’ N 122 o ’ W.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
Making “Good” Encryption Algorithms
Computer Networking Revision Dr Sandra I. Woolley.
COIN-GPS: Indoor Localization from Direct GPS Receiving.
9/21/12. I can identify which factors are prime numbers. LEARNING TARGET.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
GPS - Global Positioning System Presented By Brindha Narayanan.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
14/03/2005 CGSIC Meeting, Prague, Czech Republic Oscar Pozzobon Chris Wullems Prof. Kurt Kubik Security issues in next generation satellite systems.
A SINGLE FREQUENCY GPS SOFTWARE RECEIVER
GPS and other GNSS signals GPS signals and receiver technology MM10 Darius Plausinaitis
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Presented by Rehana Jamal (GIS Expert & Geographer) Dated: Advance Applications of RS/GIS in Geo-Environmental Conservation Subject Lecture-6.
GPSS (Global Positioning Satellite System). 2 What is GPSS 24 satellites operating in a low-earth orbit, each transmitting a direct-sequence signal with.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Global Positioning System Trey Brown September 19, 2000.
Patrick Caldwell Chris Kellar. Overview  Basic Concepts  History  Structure  Applications  Communication  Typical Sources of Error.
EE 570: Location and Navigation: Theory & Practice The Global Positioning System (GPS) Thursday 11 April 2013 NMT EE 570: Location and Navigation: Theory.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Informatics and Control Systems Faculty. Student: Levan Julakidze Informatics and Control Systems Faculty Doctorate II year Leader: Zurab Kochladze TSU.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
Modern Navigation Thomas Herring
How Global Positioning Devices (GPS) work
Introduction to the NAVSTAR Global Positioning System (GPS)
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1/28/2010PRRMEC What is GPS… The Global Positioning System (GPS) is a U.S. space- based global navigation satellite system. It provides reliable positioning,
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
SVY 207: Lecture 4 GPS Description and Signal Structure
Lecture 4 – Examining GPS data Question #1 – How does GPS receiver know where the satellites are? Issac Newton and Johannes Kepler will help to estimate.
Oscar Pozzzobon Technical Director, Qascom ION GNSS 2011, September 23, Portland, US.
GROUP 11 Dhita Puspita Larasati Topan Firmansyah Dimas Kurnia Ayatullah Galih Purwanti Rahma Aprilia Handayani
Tripp Corbin, CFM, GISP CEO eGIS Associates, Inc. Relationships Matter.
Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
By Andrew Y.T. Kudowor, Ph.D. Lecture Presented at San Jacinto College.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e 1 GPS Operations Past, Present, Future Colonel John E. Hyten Commander, 50th Space Wing 29 Mar.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
GPS NAVSTAR (Navigation System with Timing And Ranging), known as GPS (Global Positioning System), launched by U.S. Department of Defense for military.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
EE 495 Modern Navigation Systems
CGSIC 43rd Meeting Arlington, Virginia 10 March 2004.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Breaking RSA Encryption Nick Manners. History of Cryptography  Used to be strictly in the domain of governments… state secrets.  Particularly important.
Navy GPS GPS Users Conference 02 November 2000 LCDR Drew Williams SSC-SD, Code D315 GPS Division GPS Vulnerability.
Paper On Cryptography CS300 Technical Paper Review Avinash Chambhare Abdus Samad.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Revised 10/30/20061 Overview of GPS FORT 130 Forest Mapping Systems.
Hybrid Cryptography using symmetric key Encryption Sean Laurel Rex Bashyam, Karthik Shankar, Sai Theja kadiyala and Abdelshakour Abuzneid Department of.
Test Vectors First, an overview of the data coming from the satellites: GPS Message Consists of a NAV message modulated with a much higher-frequency code.
GPS - Global Positioning System
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Sindhusha Doddapaneni
Geodesy & Crustal Deformation
GPS: MAJOR COMPONENTS AND
DATA COMMUNICATION Lecture-3.
SAASM PRODUCTS OVERVIEW
Presentation transcript:

GPS Security in the Military Past, Present, and Future

Some Background the C/A code the P(Y) code red key and black key cryptography

C/A (Coarse Acquisition) Code 1023 chips (PRN code) repeats every millisecond used to be degraded by SA (Selective Availability) but now is subject to “spoofing” is modulated (along with timing, ephemeris, and other almanac data – and the P(Y) code) onto the L1 frequency ( MHz) carries a handover word (HOW) that aids in acquiring the P(Y) code

Source:

Source:

P(Y) Code P when unencrypted Y when encrypted exists on both the L1 and L2 frequencies the PRN repeats every week

Symmetric and Asymmetric Cryptography symmetric cryptography requires the (single) “red” key to be kept secret asymmetric cryptography has one “black” key for encryption and another for decryption – only the decryption key need be kept secret uses the RSA algorithm

The Past — PPS-SM (Precise Positioning Service Security Module) FeaturesProblem red crypto-key, changed weekly or yearly a distribution nightmare used the C/A code on L1 and a handover word (HOW) to acquire P(Y) on L1 and L2 military missions might require the jamming of L1

The Solution: SAASM (Selective Availability Anti-Spoofing Module) acquires the P(Y) code directly without the C/A code receivers equipped with SAASM must go through a rigorous security system during production implements both symmetric and asymmetric cryptography

Source: SAASM and Direct P(Y) Signal Acquisition, GPS World, July 2002

The Future – The M-code and Satellite Types IIR-M II-F IIR-M and II-F are basically equivalent in terms of military security both will utilize the new M-code will broadcast at a higher power level

Conclusion as with all cryptography today, the security of GPS will only be compromised by human error or deliberate giving of information the steps being taken try to reduce as much as possible the consequences of information leaking out

Partial Bibliography GPS World National Defense Magazine GPS SPS Signal Specification, 2nd Edition (June 2, 1995) - ( ) Overview of the GPS M Code Signal - ( z_overview.pdf )