Skip to main content

An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1132))

Abstract

Satellite communication is among those applications where data confidentiality is required, but at the same time, computational resources are limited as well as the delay is critical. For these types of applications, symmetric key encryption algorithms are preferred over asymmetric key algorithms, due to lower computational cost and faster speed of operation. Furthermore, due to various critical aspects of information security, using Perfect Forward Secrecy (PFS) in many communication applications is advantageous. There are two ways to achieve PFS; either a mechanism for new key generation is required, or some protocols are used for sharing new session keys before communication. Both of these ways, at minimum, append additional computational load and delay in communication, which are critical in satellite communication. This is probably the most significant barrier that satellites do not use PFS for every communication. This paper presents a novel encryption algorithm where a message key is generated such that later only Exclusive OR (XOR) operation can be used to produce the ciphertext. Hence, the proposed algorithm eliminates the need for two separate algorithms for message key generation and encryption for PFS. Security analysis and experimental results show that proposed encryption algorithm is not only secure but also faster and cheaper than the widely used AES-CTR encryption algorithm. Therefore it is suitable to be used in satellite communication for PFS.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. CCSDS: The Application of Security to CCSDS Protocols. Informational report (Green Book), CCSDS 350, March 2019

    Google Scholar 

  2. CCSDS: CCSDS Cryptographic Algorithms. CCSDS 352.0-B-1, no. November 2012

    Google Scholar 

  3. M. Stamp, Information Security : Principles and Practice, 2nd Edition (2011)

    Book  Google Scholar 

  4. WhatsApp Inc.: WhatsApp Encryption Overview (2017)

    Google Scholar 

  5. Koko, S.O.F.M., Babiker, M.A.: Comparison of various encryption algorithms and techniques for improving secured data communication. Int. J. Comput. Eng. 17(1), 62–69 (2015)

    Google Scholar 

  6. Sharma, S., Bisht, J.S.: Performance analysis of data encryption algorithms. Int. J. Sci. Res. Netw. Secur. Commun. 3(1), 1–5 (2015)

    Google Scholar 

  7. Abd Elminaam, D.S., Kader, H.M.A., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 213–219 (2010)

    Google Scholar 

  8. Mushtaq, M.F., Jamel, S., Hassan Disina, A., Pindar, Z.A., Shakir, N.S.A., Mat Deris, M.: A survey on the cryptographic encryption algorithms. Int. J. Adv. Comput. Sci. Appl. 8(11), 333–344 (2017)

    Google Scholar 

  9. Murtaza, A., Jahanzeb, S., Pirzada, H., Jianwei, L.: A new symmetric key encryption algorithm with higher performance. In: IEEE International Conference on Computing, Mathematics and Engineering Technologies – iCoMET, pp. 1–7 (2019)

    Google Scholar 

  10. NIST: Advanced Encryption Standard (AES). Fed. Inf. Process. Stand. Spec. Publ. 197 (2001)

    Google Scholar 

  11. Weiss, H.: CCSDS standardization of security algorithms for civil space missions. In: SpaceOps 2012 Conference, pp. 1–11 (2012)

    Google Scholar 

  12. Forhad, M.S.A., Riaz, S., Sabir Hossain, M., Das, M.: An improvement of advanced encryption standard. IJCSNS Int. J. Comput. Sci. Netw. Secur. 18(11) (2018)

    Google Scholar 

  13. Jahanzeb, S., Murtaza, A., Jianwei, L.: The AES implementation for avoiding single event effects for satellite application. In: IEEE ICEIEC 2019 (2019). In press

    Google Scholar 

  14. NIST: Recommendation for Block Cipher Modes of Operation: Methods and Techniques, Spec. Publ. 800-38A

    Google Scholar 

  15. Prakash, A., Kumar, U.: Authentication protocols and techniques : a survey. Int. J. Comput. Sci. Eng. 6(June), 1014–1020 (2018)

    Article  MathSciNet  Google Scholar 

  16. Zhang, C., Wang, X.: A novel self-certified security access authentication protocol in the space network. In: 14th IEEE ICCT, pp. 1014–1020 (2012)

    Google Scholar 

  17. Xue, K., Meng, W., Li, S., Wei, D.S.L., Zhou, H., Yu, N.: A secure and efficient access and handover authentication protocol for Internet of Things in space information networks. In: IEEE Internet Things J. (2019, in press)

    Google Scholar 

  18. Yantao, Z., Jianfeng, M.: A highly secure identity-based authenticated key-exchange protocol for satellite communication. J. Commun. Netw. 12(6), 592–599 (2010)

    Article  Google Scholar 

  19. Fereidooni, H., Taheri, H., Mahramian, M.: E2E KEEP : end to end key exchange and encryption protocol for accelerated satellite networks. Int. J. Commun. Netw. Syst. Sci. 2012(April), 228–237 (2012)

    Article  Google Scholar 

  20. Murtaza, A., Jianwei, L.: A simple, secure and efficient authentication protocol for real-time earth observation through satellite. In: IEEE Proceedings of 15th International Bhurban Conference on Applied Sciences and Technology, Islamabad, pp. 822–830 (2018)

    Google Scholar 

  21. Lee, Y.: Improvement of key exchange protocol to prevent man-in-the-middle attack in the satellite environment. In: 2016 Eighth International Conference on Ubiquitous Future Networks, pp. 408–413 (2016)

    Google Scholar 

  22. Murtaza, A., Xu, T., Jahanzeb, S., Pirzada, H., Jianwei, L.: A lightweight authentication and key sharing protocol for satellite communication. Int. J. Comput. Commun. Control (2019, in press)

    Google Scholar 

  23. Bader, A.S., Sagheer, A.M.: Modification on AES-GCM to increment ciphertext randomness. Trans. Int. J. Math. Sci. Comput. 4(Nov), 34–40 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abid Murtaza .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Murtaza, A., Pirzada, S.J.H., Hasan, M.N., Xu, T., Jianwei, L. (2020). An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2019. Communications in Computer and Information Science, vol 1132. Springer, Singapore. https://doi.org/10.1007/978-981-15-2693-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2693-0_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2692-3

  • Online ISBN: 978-981-15-2693-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics