Key Management V 0.4 Discussion of document revision SeaSec Intermediary Meeting, Heppenheim, October 07 Daniel Fischer Uni Lux SECAN-Lab / ESA OPS-GDA.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Gursharan Singh Tatla SLIP and PPP 27-Mar
<<Date>><<SDLC Phase>>
Space Data Link Security Protocol Compatibility with other standards Bruno Saba DCT/TV/IN 26/10/2010.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Key Management for Space Missions
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Group Key Distribution Chih-Hao Huang
Definition of terms Definition of terms Explain business conditions driving distributed databases Explain business conditions driving distributed databases.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
CCSDS october 2008 meeting – Berlin 1 Space Data Link Security BOF SEA/SLS October 14, 2008 meeting.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) October.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
CCSDS Security WG Management Remarks Martin Pilgram - DLR RB-KOB > Management Remarks on Sec WG > www.DLR.de/rb Slide 1.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
1. 2 Purpose of This Presentation ◆ To explain how spacecraft can be virtualized by using a standard modeling method; ◆ To introduce the basic concept.
Symmetric Key Management Books Development Plan Daniel Fischer (ESA) Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
June 2004 SIW-4 - IP in Space Implementation Guide 1 Handbook for Using IP Protocols for Space Missions James Rash - NASA/GSFC Keith Hogie, Ed Criscuolo,
Secure Group Communication: Key Management by Robert Chirwa.
Chapter 8: Virtual LAN (VLAN)
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) April.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Security Association / Security Context Bruno Saba DCT/TV/IN 03/05/2010.
CCSDS Security WG meeting October 2008, hosted by DLR at DIN premises (Berlin) 1 Data Link Security BOF An ESA contribution on Lessons Learned and Issues/Questions.
Karlstad University IP security Ge Zhang
ESA UNCLASSIFIED – For Official Use Network Layer Security - Food for Thought D. Fischer, I Aguilar-Sanchez CCSDS Fall Meetings.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/PARSONS November 2014 BSI, London.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
FSH/security SLS-SLP fall2009 (version 4) Page 1 Security Headers + Homogeneous approach to FSH and Insert Zone in TM/AOS/TC frames: some problems and.
1 15 November 2004 CCSDS Security Architecture 15 th November 2004 Toulouse.
1 CCSDS Security Working Group Spring Meeting Colorado Springs Security Architecture January 19 th 2007.
1 SecWG New Business Discussions CCSDS CNES, Toulouse FR Howard Weiss NASA/JPL/SPARTA November 2004.
CCSDS march 2008 meeting – Crystal City 1 TC/TM space links security SEA / SLS cross area meeting.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
The CCSDS Cislunar Communications Architecture Keith Scott The MITRE Corporation CCSDS Meeting January 2007.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Delta-DOR SIG Minutes of the meeting Heppenheim, Germany October 2nd, 2007 Roberto Maddè ESA/ESOC
Lightweight Key Establishment & Management Protocol (KEMP) in Dynamic Sensor Networks Update draft-qiu-roll-kemp-01 Ying QIU, Jianying ZHOU, Feng BAO.
1 Document Status CCSDS Security Working Group March 2008.
ESA UNCLASSIFIED – For Official Use SDLS Key Management Extended Procedures Daniel Fischer, Ignacio Aguilar Sanchez CCSDS Fall Meetings 2012 Oct 2012.
Space Data Link Secure Protocol Interoperability Testing Interfaces Definition Proposal Bruno Saba DCT/TV/IN 26/04/2010.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 Systems Architecture WG: Charter and Work Plan October 23, 2003 Takahiro Yamada, JAXA/ISAS.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
3GPP TSG RAN WG2 meeting #92 Nanjing, China 23-27, May 2016 R
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
The CCSDS Security WG is chartered to:
CCSDS Systems Engineering Area: Security Working Group
OmniRAN Introduction and Way Forward
OmniRAN Introduction and Way Forward
Presentation transcript:

Key Management V 0.4 Discussion of document revision SeaSec Intermediary Meeting, Heppenheim, October 07 Daniel Fischer Uni Lux SECAN-Lab / ESA OPS-GDA 04 October 2007

Daniel Fischer 04 th October Agenda Actions from Leatherhead Document Split Key Management Magenta Book Key Management Green Book Description of modified sections Description of new sections Further work Discussion

Daniel Fischer 04 th October Actions Done Document Split Addition of Sections SKIs Timestamps Key Management Data Fields Security Control Commands Still missing Key Generation Section (tog. with Howie) Next generation networks

Daniel Fischer 04 th October Document Split Magenta Book Recommended Practice for Space Link Key Management Recommended Practice for Ground Segment Key Management Key Revocation? Green Book Introduction to Key Management Cryptographic Keys (Lifetime, Applications, etc) Key Infrastructures Public Key Infrastructure Secret Key Infrastructure Security Policies Key Management Guidance

Daniel Fischer 04 th October Document Split Green Book (contd) Space Link Key Management Data Fields Key Management Security Commands Ground Segment Key Management Key Management in Future Missions

Daniel Fischer 04 th October MAG: Key Revocation Key Revocation is an essential part of key management We did not discuss this in detail before, is it part of the magenta or more the green book (or both)? Space Link Revocation happens via security control command from the ground and requires confirmation by the spacecraft Ground still keeps the keys for backwards compatibility on data archives Key is deleted onboard the spacecraft Mechanism that not the same key is used twice or two keys from different hierarchy levels are identical Autonomous revocation procedure? Local policy decision  Not in the magenta book, but mention the options (requirements)(options in MB, examples and problem solving in the GB) Ground Segment Key Revocation managed by PKI within the core GS Key Revocation enforced by policies in the communication with the external ground segment; key changes therefore forced by the core ground segment onto the external ground segment

Daniel Fischer 04 th October GR: Secret Key Infrastructure Section on SKI was added Use a key hierarchy on three different levels Master Keys Key Encryption Keys Traffic Protection Keys Special Key Generation and Distribution Requirements Initial Secret (External Channel) Classification Issues SKI Trade-Off External Channel Requirement Scalability Identity Binding

Daniel Fischer 04 th October GR: Space Link Key Management Addition of key management data structure descriptions and control commands was decided in Leatherhead Key Management Data Structure Fields Encrypted Keys Key Identification Number (Key ID) Spacecraft Identifier (SPID) May already be provided by transfer frame header if applicable If a global key management system applies, keys can be directly addressed by SPID + Key ID Timestamp Clock synchronization issues? Signature

Daniel Fischer 04 th October GR: Space Link Key Management Security Control Commands Those include: Upload of a new key [Traffic Protection Key / KEK] Encrypted Key Key revocation [Traffic Protection Key / KEK / MK] Key Reference Key switch [Traffic Protection Key / KEK / MK] Key Reference Combine switch and revocation but keep option to destroy a key General discussion in the GB but the primitives should show up the MB as well Key inventory [] Those commands require a working reporting mechanism Part of the green book?

Daniel Fischer 04 th October GR: Timestamps Timestamps may help in the synchronization between the space and the ground segment Key Management Commands Example: Key Switch Command: Spacecraft must accept commands protected with the old key until switch confirmation has reached the ground. Those can then be identified by a timestamp window Is this discussion really appropriate here or should we not have a separate anti-replay / timestamping discussion How good is ground / space time sync?

Daniel Fischer 04 th October GR: GSAKMP Group Security Association Key Management Protocol Group controllers (GC) Group Members (GM) Three kinds of security associations SA1 For the registration of new members, establishment of SA2s SA2 Control Messages from the GC to GM (also establishment of SA3s) SA3 Communication between GMs I fail to see real application scenarios for present infrastructures Space Segment Ground Segment

Daniel Fischer 04 th October GR: Future Key Management Some information collected but this is still in early draft status Key Management in real spacecraft constellations Synchronization If the OCC is responsible for the key management facility, its backups must always be in the same state Solutions exist here which can be adapted Of course, those need also to be protected Same for ground stations Routing Ground Stations must be able to take a routing decision for the key management control commands and key uploads Likely to be done the same way as for the other data Routing in the space network will also become an issue e.g. Mars Telecommunications Orbiter Multiple Ground Stations The best way to come around this problem is to make the GS unaware of the security  end-to-end Key Management still central? Distributed key and identity management protocols may perform better at some point

Daniel Fischer 04 th October GR: Future Key Management Key management for real spacecraft constellations currently lacks solutions for central questions How does a satellite network topology look like, what properties does it have? What kind of network infrastructure will be used? How high is the level of node autonomy? Will there be multi-purpose constellations (e.g. military / civilian)? Will there be nodes that are not under direct control of an agency (e.g. another agency, customers, … Key management gets a lot more complex Key management protocols build on top of those solutions. So they cannot be proposed before the solutions are on the table Some of those points induce or address real open research questions. Therefore I recommend not to include that in the green book at the moment but wait for results. Maybe a short section addressing the problems is appropriate.

Daniel Fischer 04 th October Discussion