1 SecWG New Business Discussions CCSDS CNES, Toulouse FR Howard Weiss NASA/JPL/SPARTA +1-410-872-1515 November 2004.

Slides:



Advertisements
Similar presentations
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Advertisements

1 CCSDS Security Working Group Fall 2008 Meeting October 2008 Berlin Germany.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
11 Authentication Algorithm Trade Study CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA September.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
CCSDS october 2008 meeting – Berlin 1 Space Data Link Security BOF SEA/SLS October 14, 2008 meeting.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) October.
Security WG: Report of the Winter 2007 Meeting Colorado Springs, CO USA January 20, 2007 Howard Weiss NASA/JPL/SPARTA
Security WG: Report of the Spring 2015 Meeting Caltech, Pasadena CA USA 27 March 2015 Howard Weiss NASA/JPL/PARSONS
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
1 Security Policy Framework & CCSDS Common Criteria Use CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Security WG Status Review ESA European Space Operations Centre Darmstadt, Germany 16 April 2012 Howard Weiss NASA/JPL/SPARTA
Security WG: Report of the Fall 2005 Meeting Atlanta GA September 16, 2004 Howard Weiss NASA/JPL/SPARTA.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) April.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
1 SecWG New Business Discussions CCSDS St-Hubert (Montreal) Canada Howard Weiss NASA/JPL/SPARTA May 2004.
1 CCSDS Security Working Group Fall 2010 Meeting October 2010 British Standards Institute London, UK Howard Weiss NASA/JPL.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
1 Authentication Algorithm Document Discussions CCSDS Security Working Group Fall 2007 Meeting 3-5 October 2007 ESA/ESOC, Darmstadt Germany (Hotel am Bruchsee,
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Security WG: Report of the Fall 2008 Meeting DIN, Berlin Germany October 17, 2008 Howard Weiss NASA/JPL/SPARTA
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/PARSONS November 2014 BSI, London.
1 CCSDS Threat Document Discussion CCSDS Security Working Group Fall 2004 Meeting CNES, Toulouse FR Howard Weiss NASA/JPL/SPARTA
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
1 CCSDS Security Working Group Spring Meeting Colorado Springs Security Architecture January 19 th 2007.
Security WG: Report of the Spring 2005 Meeting April 14, 2004 Howard Weiss.
Security WG: Status Briefing Noordwijkerhout, The Netherlands) 31 March 2014 Howard Weiss NASA/JPL/PARSONS
CCSDS march 2008 meeting – Crystal City 1 TC/TM space links security SEA / SLS cross area meeting.
1 Information Security Planning Guide CCSDS Security WG Spring 2005 Athens, GR Howard Weiss NASA/JPL/SPARTA April 2005.
CCSDS Security Working Group Program Space IT Security Standards Products Howard Weiss SPARTA, Inc. (a Parsons Company)
Security WG: Report of the Spring 2008 Meeting Marriott Courtyard Crystal City, VA March 14, 2008 Howard Weiss NASA/JPL/SPARTA
Security WG: Report of the Spring 2010 Meeting Renaissance Hotel Portsmouth, VA May 7, 2010 Howard Weiss NASA/JPL/Cobham
Security WG: Report of the Spring 2012 Meeting European Space Operations Centre Darmstadt, Germany 19 April, 2012 Howard Weiss NASA/JPL/SPARTA
11 Authentication Algorithms Discussions CCSDS Security WG Winter 2007 Colorado Springs, Colorado USA Howard Weiss NASA/JPL/SPARTA
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
1 Document Status CCSDS Security Working Group March 2008.
1 CCSDS Security Working Group January 25 Telecon.
1 CCSDS Security Working Group Spring 2011 Meeting May 2011 Deutsches Institut für Normung (DIN) Berlin, Germany Howard Weiss NASA/JPL.
Security WG: Report of the Fall 2004 Meeting November 19, 2004 Howard Weiss.
1 CCSDS Security Working Group Fall 2011 Meeting 1-2 November 2011 University of Colorado Boulder, Colorado USA Howard Weiss NASA/JPL.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
SDLS Protocol Green Book initiation Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA.
11 Identity Management Spacecraft ID Security CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA September.
Security WG: Report of the Spring 2014 Meeting NH Hotel Leeuwenhorst Noordwijkerhout, The Netherlands 3 April 2014 Howard Weiss NASA/JPL/PARSONS
K. Salah1 Security Protocols in the Internet IPSec.
Security WG: Report of the Fall 2003 Meeting October 28, 2003 Howard Weiss, NASA/JPL/SPARTA.
National Aeronautics and Space Administration 1 CCSDS Information Architecture Working Group Daniel J. Crichton NASA/JPL 24 March 2005.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/Cobham (Parsons) October 2011.
Security WG: Report of the Spring 2013 Meeting Bordeaux, France 18 April, 2013 Howard Weiss NASA/JPL/PARSONS skype:
CCSDS IPsec Compatibility Testing 05/4/2016 CHARLES SHEEHE, CCSDS GRC POC OKECHUKWU MEZU, Test Engineer 1.
Security WG: Report of the Spring 2004 Meeting May 13, 2004 Howard Weiss, NASA/JPL/SPARTA.
The CCSDS Security WG is chartered to:
Web Applications Security Cryptography 1
Security WG: Report of the Fall 2005 Meeting
CCSDS Systems Engineering Area: Security Working Group
Security WG: Report of the Fall 2013 Meeting
Presentation transcript:

1 SecWG New Business Discussions CCSDS CNES, Toulouse FR Howard Weiss NASA/JPL/SPARTA November 2004

2 Discussion Topics CCSDS documents mandatory security section Future Standards: – Encryption – Authentication – Integrity – Key Management Future Documents as discussed at previous meetings Others?

3 Mandatory CCSDS Document Security Section Background: – follow the lead of the Internet Engineering Task Force (IETF) to mandate a serious “security considerations” section in all CCSDS documents » Example SLE security section (FCLTU-Security- Section)FCLTU-Security- Section

4 Success – CESG/CMC Adopts Mandatory Security Section Proposal Proposal submitted to CESG/CMC for mandatory security section in all forthcoming CCSDS documents Wording accepted by CESG/CMC: – Provide rationale and explanation as to why or why not security plays a role in this CCSDS document. – Template headings: » 1.0 Security Background/Introduction » 2.0 Statements of security concerns with respect to the CCSDS document: data privacy data integrity authentication of communicating entities control of access to resources availability of resources auditing of resource usage » 3.0 Potential threats and attack scenarios (how could someone break the technology and why) » 4.0 Consequences of not applying security to the technology (e.g., loss of life, loss of mission).

5 Future Standards Discussions As discussed in Montreal, CCSDS does not have standards for: – Encryption – Authentication – Integrity – (or much of anything security-wise) Previous discussions in the (old) P1A (link layer) panel to create such “link-layer” standards (Spring 2002 mtg in Darmstadt) – Good discussion which didn’t lead to anything (P1A Security Briefing)P1A Security Briefing Created a “draft” P1A Security White Book to address some “strawman” proposals

6 Authentication Existing 1992 ESA standard: 5- byte signature w/4-byte counter for replay protection – Recently examined as part of NASA study » Weak algorithm as originally believed – based on “hard knapsack” problem which has been found to be flawed. (ESA Authentication)ESA Authentication Proposed adoption of “modern” digital signature standard such as Digital Signature Standard (DSS) using SHA-1 hash algorithm. – Propose FIPS (DSS) as CCSDS standard – Certificate standard as well: » X.509 profile to state which certificate fields are required and which are optional.

7 Integrity Existing 1992 ESA standard: 5- byte signature w/4-byte counter for replay protection Again propose adoption of a modern standard such as DSS – Propose FIPS as CCSDS Standard

8 Encryption Several Security Green Book solutions to pick from depending on existing link layer chip sets versus entirely new design. – Several algorithms should be supported for civilian missions such as AES and 3DES – Propose FIPS 197 – AES with 128-bit key as minimum CCSDS encryption algorithm standard.

9 Key Management Always a problem child – – Symmetric keys (the good ol’ standby) » Burned into spacecraft or need for secure distribution channels – Public key agreement (e.g., Diffie-Hellman) » Removes the need for burned in keys or secure distribution channel, but…. » Lots of bits exchanged over the link » Can be problematic over narrow links or with short passes – Public key encryption » Use public/private key pairs to encrypt “content encryption keys” (a la PGP) » Certificates containing public keys have to be “magically” distributed or obtained from a key server Internet Key Exchange (IKE) holds promise – Currently being revised by IETF (v1 too complicated w/too much overhead) – Use key updating to minimize the number of round-trips necessary to agree on a key

10 Discussion What do we want to propose??

11 Future Documents Some of the documents we talked about producing previously: – Do we still think they are relevant? – What about ground systems? – Are we ready to get started? – Volunteers? Information Security Guide for Mission Planners to include threat/risk analysis, security planning, and contingency and disaster recovery Security policy framework for developing trust agreements, rules for operational engagement, ensuring security compliance of legacy systems, and standard, secure interfaces between systems and across security domains Use of Common Criteria for Information Technology Security Evaluation (ISO 15408) “Protection Profiles” to describe security requirements for use cases

12 Ground Systems SecWG has been (for the most part) concerned with security for space missions – aka, the spacecraft. Meeting in March at JPL turned my head around: – Spacecraft is, of course, a concern and an issue – But….. We can’t ignore the ground systems that also have many, many security problems. – Many of the ground system security issues are not unique to space systems » Mission (closed) networks vs. Internet/public network interconnectivity » Connectivity between agencies with varying security policies » Etc.

13 Discussion