CCSDS march 2008 meeting – Crystal City 1 TC/TM space links security SEA / SLS cross area meeting.

Slides:



Advertisements
Similar presentations
SDLS impact on TM, AOS, TC Space Data Link Protocols Greg Kazz NASA/JPL Oct 16/17, 2012.
Advertisements

1 CCSDS Security Working Group Fall 2008 Meeting October 2008 Berlin Germany.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Wired Equivalent Privacy (WEP)
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Lecture 2: Message Authentication Anish Arora CSE5473 Introduction to Network Security.
CCSDS october 2008 meeting – Berlin 1 Space Data Link Security BOF SEA/SLS October 14, 2008 meeting.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) October.
Security WG: Report of the Winter 2007 Meeting Colorado Springs, CO USA January 20, 2007 Howard Weiss NASA/JPL/SPARTA
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Symmetric Key Management Books Development Plan Daniel Fischer (ESA) Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Space Communications Cross Support Architecture WG: Charter and Work Plan October 2010 London, UK Takahiro Yamada, JAXA/ISAS.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) April.
PS 1 12 June 2006 SEA Opening Plenary Rome, Italy, 12 June 2006.
1 SecWG New Business Discussions CCSDS St-Hubert (Montreal) Canada Howard Weiss NASA/JPL/SPARTA May 2004.
1 CCSDS Security Working Group Fall 2010 Meeting October 2010 British Standards Institute London, UK Howard Weiss NASA/JPL.
WEP Protocol Weaknesses and Vulnerabilities
CCSDS Security WG meeting October 2008, hosted by DLR at DIN premises (Berlin) 1 Data Link Security BOF An ESA contribution on Lessons Learned and Issues/Questions.
ESA UNCLASSIFIED – For Official Use Network Layer Security - Food for Thought D. Fischer, I Aguilar-Sanchez CCSDS Fall Meetings.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
1 Authentication Algorithm Document Discussions CCSDS Security Working Group Fall 2007 Meeting 3-5 October 2007 ESA/ESOC, Darmstadt Germany (Hotel am Bruchsee,
March 7, 2008Security Proposal 1 CCSDS Link Security Proposal Ed Greenberg Greg Kazz Howard Weiss March 7, 2008.
Application Layer Security Mike Pajevski (NASA/JPL) April 2009.
Ajh January 2007 CCSDS “Books” Adrian J. Hooke CMC Meeting, Colorado Springs 26 January 2007.
Security WG: Report of the Fall 2008 Meeting DIN, Berlin Germany October 17, 2008 Howard Weiss NASA/JPL/SPARTA
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/PARSONS November 2014 BSI, London.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
FSH/security SLS-SLP fall2009 (version 4) Page 1 Security Headers + Homogeneous approach to FSH and Insert Zone in TM/AOS/TC frames: some problems and.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CCSDS Security Working Group Spring Meeting Colorado Springs Security Architecture January 19 th 2007.
Security WG: Report of the Spring 2005 Meeting April 14, 2004 Howard Weiss.
1 SecWG New Business Discussions CCSDS CNES, Toulouse FR Howard Weiss NASA/JPL/SPARTA November 2004.
Security WG: Status Briefing Noordwijkerhout, The Netherlands) 31 March 2014 Howard Weiss NASA/JPL/PARSONS
1 19 September 2005 Space Link Services Area report to CMC Reston, Virginia, USA, 26 September 2005.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Potential vulnerabilities of IPsec-based VPN
The CCSDS Cislunar Communications Architecture Keith Scott The MITRE Corporation CCSDS Meeting January 2007.
Security WG: Report of the Spring 2008 Meeting Marriott Courtyard Crystal City, VA March 14, 2008 Howard Weiss NASA/JPL/SPARTA
Space Data Link Secure Protocol Simulator Bruno Saba DCT/TV/IN 15/04/2010.
Security WG: Report of the Spring 2012 Meeting European Space Operations Centre Darmstadt, Germany 19 April, 2012 Howard Weiss NASA/JPL/SPARTA
Key Management V 0.4 Discussion of document revision SeaSec Intermediary Meeting, Heppenheim, October 07 Daniel Fischer Uni Lux SECAN-Lab / ESA OPS-GDA.
Information Architecture BOF: Report of the Fall 2003 Meeting October 28, 2003 Dan Crichton, NASA/JPL.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
1 CCSDS Security Working Group Spring 2014 Meeting 31 March – 1 April 2014 Noordwijkerhout, The Netherlands Howard Weiss NASA/JPL/PARSONS* Identity crisis:
ESA UNCLASSIFIED – For Official Use SDLS Key Management Extended Procedures Daniel Fischer, Ignacio Aguilar Sanchez CCSDS Fall Meetings 2012 Oct 2012.
1 CCSDS Security Working Group Spring 2011 Meeting May 2011 Deutsches Institut für Normung (DIN) Berlin, Germany Howard Weiss NASA/JPL.
Space Data Link Secure Protocol Interoperability Testing Interfaces Definition Proposal Bruno Saba DCT/TV/IN 26/04/2010.
Security WG: Report of the Fall 2004 Meeting November 19, 2004 Howard Weiss.
1 CCSDS Security Working Group Fall 2011 Meeting 1-2 November 2011 University of Colorado Boulder, Colorado USA Howard Weiss NASA/JPL.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 Systems Architecture WG: Charter and Work Plan October 23, 2003 Takahiro Yamada, JAXA/ISAS.
SDLS Protocol Green Book initiation Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA.
1 19 September 2005 Space Link Services Area report to CESG Atlanta, Georgia, USA, 19 September 2005.
Security WG: Report of the Fall 2003 Meeting October 28, 2003 Howard Weiss, NASA/JPL/SPARTA.
10-Dec-2012-cesg-1 Presentation to ESTEC Nordwijk, Netherlands 8 April 2014 CCSDS Space Link Services (SLS) Area Area Director: Gian Paolo Calzolari (ESA/ESOC)
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/Cobham (Parsons) October 2011.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Security WG: Report of the Spring 2013 Meeting Bordeaux, France 18 April, 2013 Howard Weiss NASA/JPL/PARSONS skype:
Message Authentication Code
Encryption and Network Security
Bruno Saba DCT/TV/IN 26/04/2010
Joint Meeting of the CCSDS and the OMG-SDTF
Application Layer Security Mike Pajevski (NASA/JPL) April 2009
Systems Architecture WG: Charter and Work Plan
CCSDS Link Security Proposal
Space Data Link Security BOF SEA/SLS October 14, 2008 meeting
Outline Using cryptography in networks IPSec SSL and TLS.
Presentation transcript:

CCSDS march 2008 meeting – Crystal City 1 TC/TM space links security SEA / SLS cross area meeting

CCSDS march 2008 meeting – Crystal City 2 Meeting agenda ■ Main objectives of meeting :  Discuss among SEA-Security and SLS specialists the opportunity to embark on the CCSDS standardization of security protocols for CCSDS TM/TC protocol stack and more specifically at data link layer  Eventually agree on a cross-area BOF charter to start the process ■ Proposed agenda :  Overview presentation (CNES)  Security WG status report (H.Weiss)  Link layer security implementation (BNSC/QinetiQ)  CCSDS Link layer Security proposal (NASA/JPL)  Wrap-up : agreement on BOF charter

CCSDS march 2008 meeting – Crystal City 3 TC/TM space links security Overview presentation

CCSDS march 2008 meeting – Crystal City 4 Outline ■ Context of TM/TC link security ■ Opportunity for CCSDS to standardize security at data link layer ■ Types of missions to be covered ■ Security functions to be developed as standard protocol(s) ■ CCSDS data link protocols to be covered ■ What kind of security protocol should be used :  symmetric / asymmetric ■ Adequacy of CCSDS recommended algorithms for authentication and encryption ■ Decision on cross-area BOF creation :  charter, workplan, participating agencies

CCSDS march 2008 meeting – Crystal City 5 Context of TM/TC link security ■ Defense missions :  authentication / encryption / anti-jamming on the uplink and downlink  usually bulk encryption, non interoperable  secret algorithms  not suited for international open standardization ■ Dual-use missions :  authentication/encryption on the uplink, encryption on the downlink  Usually data link layer authentication/encryption preserving compatibility with civilian CCSDS compliant ground segment used by the civilian part of the mission  defense stakeholders usually impose confidentiality on the algorithm & protocol  not suited for international open standardization

CCSDS march 2008 meeting – Crystal City 6 Context of TM/TC link security ■ Commercial missions :  authentication and optionally encryption on the uplink  no security or encryption on the downlink (for P/L TM only)  usually using public algorithms (open standards – e.g. AES, DES) & open protocols (CCSDS). Symmetric systems. Security based on secret keys shared by SCC and S/L.  for US & non US commercial telecom S/L operators who want to provide telecom services to US government  necessity to use plug-in CENTURION/CARIBOU  confidential algorithm and protocol (TBC)  suited for international open standardization (apart from telecom S/L doing business with US government) ■ Science missions, earth observation :  no security so far  emerging requirement : TC authentication as a minimum  international open standard would be welcomed because it would facilitate interoperability for cooperative missions between agencies ■ Manned missions

CCSDS march 2008 meeting – Crystal City 7 Context of TM/TC link security ■ Potential constraints :  Is there any constraints (for each CCSDS participating agency) on the selection of authentication or encryption algorithms & protocols ?  in particular, is an open international standard specifying protocol & algorithm acceptable for civilian (e.g. science) missions ? In other word, is security relying entirely on secret keys sufficient for all or some space agencies ?  Is there a rationale for a CCSDS TC authentication/encryption protocol ?

CCSDS march 2008 meeting – Crystal City 8 Opportunity for CCSDS to standardize security at data link layer ■ Security Architecture draft 1.8 recommends implementing security at network or application layer :  rationale  provide end-to-end security instead of hop by hop link layer security  Drawback  spreads security functions on-board ■ Nevertheless, for simple missions with only one hop, link layer security is attractive because :  it provides in that case end-to-end security  the security functions are centralized both on-board (in the TC decoder) and on-ground (in the control center) and not spread in all the sources and destinations of TC/TM packets ■ Several options for insertion of security function at data link layer:  Between channel coding sublayer and frame layer  At frame layer  At segment layer (for TC)

CCSDS march 2008 meeting – Crystal City 9 Type of missions to be covered ■ Governmental & commercial missions with no defense-related security constraints :  science missions, …  commercial (non US telecom) missions ■ Rationale :  provide a standard industry supported solution for minimal security (TC authentication) to project with no expertise on security and (almost) no budget for security  enable interoperability between agencies on security functions for cooperative missions :  agencies would have to agree on key management only  security based on open standardized algorithms should be acceptable for this kind of missions

CCSDS march 2008 meeting – Crystal City 10 Security functions to be developed as standard protocol(s) ■ TC authentication providing :  originator authentication  integrity ■ TC encryption :  confidentiality ■ TM authentication providing :  originator authentication  integrity ■ TM (P/L-TM or HK-TM) encryption :  confidentiality ■ TM/TC anti-jamming :  denial of service mitigation ■ Priority in terms of development ?

CCSDS march 2008 meeting – Crystal City 11 CCSDS link layer protocols to be compatible with ? ■ For uplink :  TC space data link protocol  AOS space data link protocol ■ For downlink :  TM space data link protocol  AOS space data link protocol

CCSDS march 2008 meeting – Crystal City 12 What kind of security protocols should be considered ? ■ Authentication :  clear text with appended Message Authentication Code  security based on secret keys shared by source and destination (symmetric system)  anti-replay protection  unauthenticated mode (e.g. for emergency mode)  multiple LAC (Logical Authentication Channels) ■ Encryption :  security based on secret keys shared by source and destination (symmetric system)  anti-replay protection  unciphered mode  multiple LEC (Logical Encryption Channels) ■ Key management  reloadable keys

CCSDS march 2008 meeting – Crystal City 13 Adequacy of CCSDS recommended algorithms for authentication and encryption ■ CCSDS security WG in the process of recommending a set of algorithms for :  clear text with appended signature authentication based on symmetric secret keys :  (HMAC + SHA256) or GMAC (AES based) or CMAC (AES based)  256-bit down to 128-bit signature  fixed size block encryption based on symmetric secret keys (XOR of information message with encryption sequence) :  AES CTR mode (GCM)  128, 256 bits keys ■ CCSDS recommended algorithms (magenta books) can be used for link layer security ■ Link layer protocols should be modular wrt auth & encryp algorithms so that change of algos can be done easily if state of the art algos need to be introduced later

CCSDS march 2008 meeting – Crystal City 14 Creation of cross-area BOF for TC(TM) link security protocol(s) ? ■ Charter  perimeter ? :  TC authentication, TC encryption, TM encryption  TC space data link protocol, TM space data link protocol, AOS downlink, AOS uplink  objectives ? :  review existing CCSDS compatible link layer security implementations  check that respective agencies security and operational constraints will not prevent agreement on a common internationally agreed open solution  establish Users Requirements Document (URD) for those protocols selected in the perimeter  establish WG charter for standard(s) development

CCSDS march 2008 meeting – Crystal City 15 Creation of cross-area BOF for TC(TM) link security protocol(s) ? ■ Workplan  fall 2008 CCSDS meeting (Berlin) :  Existing implementations review, agencies security constraints check completed, first draft for sec protocol URD(s)  spring 2009 CCSDS meeting (Colorado) :  final sec protocol URD(s)  WG charter ■ Participating agencies and key personnel