Skip to main content

Research on the Authenticated Encryption Technology in CCSDS

  • Conference paper
  • 1824 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 224))

Abstract

U.S. NASA, European ESA, Japanese NASDA and other institutions all have adopted the CCSDS as space communication standards; CCSDS has shown the latest technological developments in space communication system. This paper analyzed security threats in space communications system. The TC data protection methods were summarized firstly, then the performance of several encryption algorithms used in TC protocol was compared. SCPS-SP protocol and SCPS-SP data security process were introduced also. At last, an interoperation method between SCPS –SP and IPSec will be put forward.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CCSDS 132.0-B-1 TM space data Link protocol, Recommendation for Space Data System Standards. Blue Book, Issue 1, Washington, DC, CCSDS (September 2003)

    Google Scholar 

  2. CCSDS 132.0-B-1 TC space data Link protocol, Recommendation for Space Data System Standards. Blue Book, Issue 1, Washington, DC, CCSDS (September 2003)

    Google Scholar 

  3. CCSDS 732.0-B-2 AOS Space Data Link protocol, Recommendation for Space Data System Standards. Blue Book, Issue 2, Washington, DC, CCSDS (July 2006)

    Google Scholar 

  4. CCSDS 713.0-B-1 Space Communications Protocol Specification(SCPS)-Network protocol(SCPS-NP), Recommendation for Space Data System Standards. Blue Book, Issue 1, Washington, DC, CCSDS (May 1999)

    Google Scholar 

  5. CCSDS 713.5-B-1 Space Communications Protocol Specification(SCPS)-Security protocol(SCPS-SP), Recommendation for Space Data System Standards. Blue Book, Issue 2, Washington, DC, CCSDS (July 2006)

    Google Scholar 

  6. CCSDS 714.0-B-2 Space Communications Protocol Specification(SCPS)- Transport protocol(SCPS-TP), Recommendation for Space Data System Standards. Blue Book, Issue 2, Washington, DC, CCSDS (July 2006)

    Google Scholar 

  7. CCSDS 717.0-B-1 Space Communications Protocol Specification (SCPS)-File Protocol (SCPS-FP), Recommendation for Space Data System Standards. Blue Book, Issue 1, Washington, DC, CCSDS (May 1999)

    Google Scholar 

  8. CCSDS 350.0-G-1 the Application of CCSDS Protocols to Secure Systems, Report concerning space data System standards. Green Book, Issue1, Washington DC, CCSDS, (March 1999)

    Google Scholar 

  9. CCSDS 232.0.B-l,TC Space data link protocol. Washington, USA, National Aeronautics Space Administration (2003)

    Google Scholar 

  10. Spinsante S, Chiaraluce F, Gambi E. New Perspectives in Telecommand Security: The Application of EAX to TC Segment s. In: Proc. Data Systems in Aerospace (DASIA), Naples, Italy (2007)

    Google Scholar 

  11. Horster, P., Michels, M., Petersen, H.: Authenticated encryption schemes with low communication costs. Electronics Letters 30(15), 1212–1213 (1994)

    Article  Google Scholar 

  12. Lee, W., Chang, C.: Authenticated encryption scheme without using a one-way function. Electronics Letters 31(19), 1656–1657 (1995)

    Article  Google Scholar 

  13. Chen, K.: Signature with message recovery. Electronics Letters 34(20), 1934 (1998)

    Article  Google Scholar 

  14. Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) < < cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  15. Whiting D, Housley R, and Ferguson. Counter with CBC-MAC (CCM). IETF Network working Group, Request For Comments, 3610 (September 2003)

    Google Scholar 

  16. Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 389–407. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  17. McGrew, D.A., Viega, J.: The security and performance of the galois/Counter mode (GCM) of operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 343–355. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Kohno, T., Viega, J., Whiting, D., The, C.W.C.-A.E.S.: dual-use mode. Internet Draft, Cryto Form Research Group (May 20, 2003) (work in progress)

    Google Scholar 

  19. Huang, Z., Li, L., Mi, X.-m., Gu, X.-m.: Space Communication Protocol Specification (SCPS) and Application: Status, Problem and Prospect. Telecommunication Engineering 47(06), 8–11 (2007)

    Google Scholar 

  20. Duan, X.-f., An, H.-z., Xie, S.-m.: Space Communi-cation Security Protocols. Communications Technology 42(12), 101–102 (2009)

    Google Scholar 

  21. Liu, Y., Dong, Y., Li, Z.-h.: Discussion of Data Security about Space-Earth All-in-One Networking and Analysis of CCSDS SCPS. Chinese Space Science and Technology 1, 35–36 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chang-Qing, G., Ya-Hui, Y. (2011). Research on the Authenticated Encryption Technology in CCSDS. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23214-5_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23213-8

  • Online ISBN: 978-3-642-23214-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics