Authentication/Integrity Algorithm Issues Survey
Total Page:16
File Type:pdf, Size:1020Kb
CCSDS Historical Document This document’s Historical status indicates that it is no longer current. It has either been replaced by a newer issue or withdrawn because it was deemed obsolete. Current CCSDS publications are maintained at the following location: http://public.ccsds.org/publications/ CCSDS HISTORICAL DOCUMENT Report Concerning Space Data System Standards AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY INFORMATIONAL REPORT CCSDS 350.3-G-1 GREEN BOOK March 2008 CCSDS HISTORICAL DOCUMENT Report Concerning Space Data System Standards AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY INFORMATIONAL REPORT CCSDS 350.3-G-1 GREEN BOOK March 2008 CCSDS HISTORICAL DOCUMENT CCSDS REPORT ON AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY AUTHORITY Issue: Informational Report, Issue Date: March 2008 Location: Washington, DC, USA This document has been approved for publication by the Management Council of the Consultative Committee for Space Data Systems (CCSDS) and reflects the consensus of technical panel experts from CCSDS Member Agencies. The procedure for review and authorization of CCSDS Reports is detailed in the Procedures Manual for the Consultative Committee for Space Data Systems. This document is published and maintained by: CCSDS Secretariat Space Communications and Navigation Office, 7L70 Space Operations Mission Directorate NASA Headquarters Washington, DC 20546-0001, USA CCSDS 350.3-G-1 Page i March 2008 CCSDS HISTORICAL DOCUMENT CCSDS REPORT ON AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY FOREWORD Through the process of normal evolution, it is expected that expansion, deletion, or modification of this document may occur. This Recommended Standard is therefore subject to CCSDS document management and change control procedures, which are defined in the Procedures Manual for the Consultative Committee for Space Data Systems. Current versions of CCSDS documents are maintained at the CCSDS Web site: http://www.ccsds.org/ Questions relating to the contents or status of this document should be addressed to the CCSDS Secretariat at the address indicated on page i. CCSDS 350.3-G-1 Page ii March 2008 CCSDS HISTORICAL DOCUMENT CCSDS REPORT ON AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY At time of publication, the active Member and Observer Agencies of the CCSDS were: Member Agencies – Agenzia Spaziale Italiana (ASI)/Italy. – British National Space Centre (BNSC)/United Kingdom. – Canadian Space Agency (CSA)/Canada. – Centre National d’Etudes Spatiales (CNES)/France. – Deutsches Zentrum für Luft- und Raumfahrt e.V. (DLR)/Germany. – European Space Agency (ESA)/Europe. – Federal Space Agency (FSA)/Russian Federation. – Instituto Nacional de Pesquisas Espaciais (INPE)/Brazil. – Japan Aerospace Exploration Agency (JAXA)/Japan. – National Aeronautics and Space Administration (NASA)/USA. Observer Agencies – Austrian Space Agency (ASA)/Austria. – Belgian Federal Science Policy Office (BFSPO)/Belgium. – Central Research Institute of Machine Building (TsNIIMash)/Russian Federation. – Centro Tecnico Aeroespacial (CTA)/Brazil. – Chinese Academy of Sciences (CAS)/China. – Chinese Academy of Space Technology (CAST)/China. – Commonwealth Scientific and Industrial Research Organization (CSIRO)/Australia. – Danish National Space Center (DNSC)/Denmark. – European Organization for the Exploitation of Meteorological Satellites (EUMETSAT)/Europe. – European Telecommunications Satellite Organization (EUTELSAT)/Europe. – Hellenic National Space Committee (HNSC)/Greece. – Indian Space Research Organization (ISRO)/India. – Institute of Space Research (IKI)/Russian Federation. – KFKI Research Institute for Particle & Nuclear Physics (KFKI)/Hungary. – Korea Aerospace Research Institute (KARI)/Korea. – MIKOMTEK: CSIR (CSIR)/Republic of South Africa. – Ministry of Communications (MOC)/Israel. – National Institute of Information and Communications Technology (NICT)/Japan. – National Oceanic and Atmospheric Administration (NOAA)/USA. – National Space Organization (NSPO)/Taiwan. – Naval Center for Space Technology (NCST)/USA. – Space and Upper Atmosphere Research Commission (SUPARCO)/Pakistan. – Swedish Space Corporation (SSC)/Sweden. – United States Geological Survey (USGS)/USA. CCSDS 350.3-G-1 Page iii March 2008 CCSDS HISTORICAL DOCUMENT CCSDS REPORT ON AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY DOCUMENT CONTROL Document Title Date Status CCSDS Authentication/Integrity Algorithm March 2008 Original issue 350.3-G-1 Issues Survey, Informational Report, Issue CCSDS 350.3-G-1 Page iv March 2008 CCSDS HISTORICAL DOCUMENT CCSDS REPORT ON AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY CONTENTS Section Page 1 PURPOSE AND SCOPE ............................................................................................... 1-1 2 OVERVIEW ................................................................................................................... 2-1 2.1 BACKGROUND .................................................................................................... 2-1 2.2 TRADE STUDY SPACE ....................................................................................... 2-1 3 POTENTIAL ALGORITHMS (BY CATEGORY) FOR CCSDS ADOPTION ...... 3-1 3.1 GENERAL .............................................................................................................. 3-1 3.2 DIGITAL SIGNATURE ALGORITHMS ............................................................. 3-2 3.3 HASH-BASED MESSAGE AUTHENTICATION CODES (HMAC) ................. 3-2 3.4 ENCRYPTION-BASED MESSAGE AUTHENTICATION CODES ................... 3-4 4 SUMMARY AND CONCLUSIONS ............................................................................ 4-1 Table 3-1 Digital Signature Algorithms ........................................................................................ 3-1 3-2 Hash-Based Message Authentication Codes and Hashes ............................................. 3-3 3-3 Encryption-based Message Authentication Codes ....................................................... 3-5 CCSDS 350.3-G-1 Page v March 2008 CCSDS HISTORICAL DOCUMENT CCSDS REPORT ON AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY 1 INTRODUCTION 1.1 PURPOSE AND SCOPE This Report presents the results of a survey conducted by the CCSDS Security Working Group (SecWG), which has been actively engaged in developing a recommendation for a CCSDS standard algorithm for authentication and integrity. This algorithm may be used by all member agencies to provide command (uplink) authentication, command integrity, as well as telemetry (downlink) housekeeping or mission data authentication and integrity. A single algorithm is used to provide both authentication and integrity; integrity essentially comes for ‘free’ as a side-affect of the authentication algorithm. Authentication provides a service that allows a receiver of data to verify the source of the data and be assured that it came from the claimed source. Integrity provides a service that allows the receiver of data to be assured that what the sender transmitted has been received and that no unauthorized modification of the data (accidental or intentional) has occurred in transit. The information contained in this report is not part of any of the CCSDS Recommended Standard. In the event of any conflict between any CCSDS Recommended Standard and the material presented herein, the CCSDS Recommended Standard shall prevail. 1.2 REFERENCES The following documents are referenced in this Report. At the time of publication, the editions indicated were valid. All documents are subject to revision, and users of this Report are encouraged to investigate the possibility of applying the most recent editions of the documents indicated below. The CCSDS Secretariat maintains a register of currently valid CCSDS documents. [1] Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA). ANSI X9.31:1998. New York: ANSI, 1998. [2] Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62:2005. New York: ANSI, 2005. [3] Digital Signature Standard (DSS). Federal Information Processing Standards Publication 186-2. Gaithersburg, Maryland: NIST, January 2000. <http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf> [4] H. Krawczyk, M. Bellar, and M. Bellar. HMAC: Keyed-Hashing for Message Authentication. RFC 2104. Reston, Virginia: ISOC, February 1997. [5] The Keyed-Hash Message Authentication Code (HMAC). Federal Information Processing Standards Publication 198. Gaithersburg, Maryland: NIST, March 2002. <http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf> CCSDS 350.3-G-1 Page 1-1 March 2008 CCSDS HISTORICAL DOCUMENT CCSDS REPORT ON AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY [6] T. Krovetz, ed. UMAC: Message Authentication Code using Universal Hashing. RFC 4418. Reston, Virginia: ISOC, March 2006. [7] P. Metzger and W. Simpson. IP Authentication using Keyed MD5. RFC 1828. Reston, Virginia: ISOC, August 1995. [8] Computer Data Authentication. Federal Information Processing Standards Publication 113. Gaithersburg, Maryland: NIST, May 1985. <http://www.itl.nist.gov/fipspubs/fip113.htm> [9] Morris Dworkin. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. National Institute of Standards and Technology Special Publication 800-38B (Draft). Gaithersburg, Maryland: NIST, March 9, 2005. <http://www.mirrors.wiretapped.net/security/info/reference/nist/special- publications/sp-800-38b-draft.pdf> [10]