Abstract
Satellite communication is among those applications where data confidentiality is required, but at the same time, computational resources are limited as well as the delay is critical. For these types of applications, symmetric key encryption algorithms are preferred over asymmetric key algorithms, due to lower computational cost and faster speed of operation. Furthermore, due to various critical aspects of information security, using Perfect Forward Secrecy (PFS) in many communication applications is advantageous. There are two ways to achieve PFS; either a mechanism for new key generation is required, or some protocols are used for sharing new session keys before communication. Both of these ways, at minimum, append additional computational load and delay in communication, which are critical in satellite communication. This is probably the most significant barrier that satellites do not use PFS for every communication. This paper presents a novel encryption algorithm where a message key is generated such that later only Exclusive OR (XOR) operation can be used to produce the ciphertext. Hence, the proposed algorithm eliminates the need for two separate algorithms for message key generation and encryption for PFS. Security analysis and experimental results show that proposed encryption algorithm is not only secure but also faster and cheaper than the widely used AES-CTR encryption algorithm. Therefore it is suitable to be used in satellite communication for PFS.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
CCSDS: The Application of Security to CCSDS Protocols. Informational report (Green Book), CCSDS 350, March 2019
CCSDS: CCSDS Cryptographic Algorithms. CCSDS 352.0-B-1, no. November 2012
M. Stamp, Information Security : Principles and Practice, 2nd Edition (2011)
WhatsApp Inc.: WhatsApp Encryption Overview (2017)
Koko, S.O.F.M., Babiker, M.A.: Comparison of various encryption algorithms and techniques for improving secured data communication. Int. J. Comput. Eng. 17(1), 62–69 (2015)
Sharma, S., Bisht, J.S.: Performance analysis of data encryption algorithms. Int. J. Sci. Res. Netw. Secur. Commun. 3(1), 1–5 (2015)
Abd Elminaam, D.S., Kader, H.M.A., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 213–219 (2010)
Mushtaq, M.F., Jamel, S., Hassan Disina, A., Pindar, Z.A., Shakir, N.S.A., Mat Deris, M.: A survey on the cryptographic encryption algorithms. Int. J. Adv. Comput. Sci. Appl. 8(11), 333–344 (2017)
Murtaza, A., Jahanzeb, S., Pirzada, H., Jianwei, L.: A new symmetric key encryption algorithm with higher performance. In: IEEE International Conference on Computing, Mathematics and Engineering Technologies – iCoMET, pp. 1–7 (2019)
NIST: Advanced Encryption Standard (AES). Fed. Inf. Process. Stand. Spec. Publ. 197 (2001)
Weiss, H.: CCSDS standardization of security algorithms for civil space missions. In: SpaceOps 2012 Conference, pp. 1–11 (2012)
Forhad, M.S.A., Riaz, S., Sabir Hossain, M., Das, M.: An improvement of advanced encryption standard. IJCSNS Int. J. Comput. Sci. Netw. Secur. 18(11) (2018)
Jahanzeb, S., Murtaza, A., Jianwei, L.: The AES implementation for avoiding single event effects for satellite application. In: IEEE ICEIEC 2019 (2019). In press
NIST: Recommendation for Block Cipher Modes of Operation: Methods and Techniques, Spec. Publ. 800-38A
Prakash, A., Kumar, U.: Authentication protocols and techniques : a survey. Int. J. Comput. Sci. Eng. 6(June), 1014–1020 (2018)
Zhang, C., Wang, X.: A novel self-certified security access authentication protocol in the space network. In: 14th IEEE ICCT, pp. 1014–1020 (2012)
Xue, K., Meng, W., Li, S., Wei, D.S.L., Zhou, H., Yu, N.: A secure and efficient access and handover authentication protocol for Internet of Things in space information networks. In: IEEE Internet Things J. (2019, in press)
Yantao, Z., Jianfeng, M.: A highly secure identity-based authenticated key-exchange protocol for satellite communication. J. Commun. Netw. 12(6), 592–599 (2010)
Fereidooni, H., Taheri, H., Mahramian, M.: E2E KEEP : end to end key exchange and encryption protocol for accelerated satellite networks. Int. J. Commun. Netw. Syst. Sci. 2012(April), 228–237 (2012)
Murtaza, A., Jianwei, L.: A simple, secure and efficient authentication protocol for real-time earth observation through satellite. In: IEEE Proceedings of 15th International Bhurban Conference on Applied Sciences and Technology, Islamabad, pp. 822–830 (2018)
Lee, Y.: Improvement of key exchange protocol to prevent man-in-the-middle attack in the satellite environment. In: 2016 Eighth International Conference on Ubiquitous Future Networks, pp. 408–413 (2016)
Murtaza, A., Xu, T., Jahanzeb, S., Pirzada, H., Jianwei, L.: A lightweight authentication and key sharing protocol for satellite communication. Int. J. Comput. Commun. Control (2019, in press)
Bader, A.S., Sagheer, A.M.: Modification on AES-GCM to increment ciphertext randomness. Trans. Int. J. Math. Sci. Comput. 4(Nov), 34–40 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Murtaza, A., Pirzada, S.J.H., Hasan, M.N., Xu, T., Jianwei, L. (2020). An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2019. Communications in Computer and Information Science, vol 1132. Springer, Singapore. https://doi.org/10.1007/978-981-15-2693-0_21
Download citation
DOI: https://doi.org/10.1007/978-981-15-2693-0_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2692-3
Online ISBN: 978-981-15-2693-0
eBook Packages: Computer ScienceComputer Science (R0)