Ccsds 350.9-G-1

Ccsds 350.9-G-1

Report Concerning Space Data System Standards CCSDS CRYPTOGRAPHIC ALGORITHMS INFORMATIONAL REPORT CCSDS 350.9-G-1 GREEN BOOK December 2014 Report Concerning Space Data System Standards CCSDS CRYPTOGRAPHIC ALGORITHMS INFORMATIONAL REPORT CCSDS 350.9-G-1 GREEN BOOK December 2014 CCSDS REPORT CONCERNING CRYPTOGRAPHIC ALGORITHMS AUTHORITY Issue: Informational Report, Issue 1 Date: December 2014 Location: Washington, DC, USA This document has been approved for publication by the Management Council of the Consultative Committee for Space Data Systems (CCSDS) and reflects the consensus of technical panel experts from CCSDS Member Agencies. The procedure for review and authorization of CCSDS Reports is detailed in Organization and Processes for the Consultative Committee for Space Data Systems (CCSDS A02.1-Y-4). This document is published and maintained by: CCSDS Secretariat National Aeronautics and Space Administration Washington, DC, USA E-mail: [email protected] CCSDS 350.9-G-1 Page i December 2014 CCSDS REPORT CONCERNING CRYPTOGRAPHIC ALGORITHMS FOREWORD This document is a companion to the CCSDS Cryptographic Algorithms specification (reference [1]). In this document, the reasoning and rationale for the use of specific algorithms and their respective modes of operation are discussed. Through the process of normal evolution, it is expected that expansion, deletion, or modification of this document may occur. This Report is therefore subject to CCSDS document management and change control procedures, which are defined in Organization and Processes for the Consultative Committee for Space Data Systems (CCSDS A02.1-Y-4). Current versions of CCSDS documents are maintained at the CCSDS Web site: http://www.ccsds.org/ Questions relating to the contents or status of this document should be sent to the CCSDS Secretariat at the e-mail address indicated on page i. CCSDS 350.9-G-1 Page ii December 2014 CCSDS REPORT CONCERNING CRYPTOGRAPHIC ALGORITHMS At time of publication, the active Member and Observer Agencies of the CCSDS were: Member Agencies – Agenzia Spaziale Italiana (ASI)/Italy. – Canadian Space Agency (CSA)/Canada. – Centre National d’Etudes Spatiales (CNES)/France. – China National Space Administration (CNSA)/People’s Republic of China. – Deutsches Zentrum für Luft- und Raumfahrt (DLR)/Germany. – European Space Agency (ESA)/Europe. – Federal Space Agency (FSA)/Russian Federation. – Instituto Nacional de Pesquisas Espaciais (INPE)/Brazil. – Japan Aerospace Exploration Agency (JAXA)/Japan. – National Aeronautics and Space Administration (NASA)/USA. – UK Space Agency/United Kingdom. Observer Agencies – Austrian Space Agency (ASA)/Austria. – Belgian Federal Science Policy Office (BFSPO)/Belgium. – Central Research Institute of Machine Building (TsNIIMash)/Russian Federation. – China Satellite Launch and Tracking Control General, Beijing Institute of Tracking and Telecommunications Technology (CLTC/BITTT)/China. – Chinese Academy of Sciences (CAS)/China. – Chinese Academy of Space Technology (CAST)/China. – Commonwealth Scientific and Industrial Research Organization (CSIRO)/Australia. – Danish National Space Center (DNSC)/Denmark. – Departamento de Ciência e Tecnologia Aeroespacial (DCTA)/Brazil. – European Organization for the Exploitation of Meteorological Satellites (EUMETSAT)/Europe. – European Telecommunications Satellite Organization (EUTELSAT)/Europe. – Geo-Informatics and Space Technology Development Agency (GISTDA)/Thailand. – Hellenic National Space Committee (HNSC)/Greece. – Indian Space Research Organization (ISRO)/India. – Institute of Space Research (IKI)/Russian Federation. – KFKI Research Institute for Particle & Nuclear Physics (KFKI)/Hungary. – Korea Aerospace Research Institute (KARI)/Korea. – Ministry of Communications (MOC)/Israel. – National Institute of Information and Communications Technology (NICT)/Japan. – National Oceanic and Atmospheric Administration (NOAA)/USA. – National Space Agency of the Republic of Kazakhstan (NSARK)/Kazakhstan. – National Space Organization (NSPO)/Chinese Taipei. – Naval Center for Space Technology (NCST)/USA. – Scientific and Technological Research Council of Turkey (TUBITAK)/Turkey. – South African National Space Agency (SANSA)/Republic of South Africa. – Space and Upper Atmosphere Research Commission (SUPARCO)/Pakistan. – Swedish Space Corporation (SSC)/Sweden. – Swiss Space Office (SSO)/Switzerland. – United States Geological Survey (USGS)/USA. CCSDS 350.9-G-1 Page iii December 2014 CCSDS REPORT CONCERNING CRYPTOGRAPHIC ALGORITHMS DOCUMENT CONTROL Document Title Date Status CCSDS CCSDS Cryptographic Algorithms, December Original issue 350.9-G-1 Informational Report, Issue 1 2014 EC 1 Editorial Correction May 2015 Corrects erroneous minimum key length for AES on page 1-1. CCSDS 350.9-G-1 Page iv DecemberMay 2014 2015 CCSDS REPORT CONCERNING CRYPTOGRAPHIC ALGORITHMS CONTENTS Section Page 1 INTRODUCTION .......................................................................................................... 1-1 1.1 PURPOSE ............................................................................................................... 1-1 1.2 SCOPE .................................................................................................................... 1-1 1.3 APPLICABILITY ................................................................................................... 1-1 1.4 RATIONALE .......................................................................................................... 1-2 1.5 REFERENCES ....................................................................................................... 1-2 2 OVERVIEW ................................................................................................................... 2-1 3 ENCRYPTION ALGORITHM AND MODE OF OPERATION ............................. 3-1 3.1 GENERAL .............................................................................................................. 3-1 3.2 AES OVERVIEW ................................................................................................... 3-1 3.3 AES MODES OF OPERATION ............................................................................ 3-1 3.4 AUTHENTICATED ENCRYPTION ..................................................................... 3-5 4 AUTHENTICATION ALGORITHMS AND MODES OF OPERATION .............. 4-1 4.1 GENERAL .............................................................................................................. 4-1 4.2 HASH MESSAGE BASED AUTHENTICATION ................................................ 4-1 4.3 CIPHER BASED AUTHENTICATION ................................................................ 4-3 4.4 DIGITAL SIGNATURE BASED AUTHENTICATION ...................................... 4-4 5 SUMMARY .................................................................................................................... 5-1 ANNEX A ABBREVIATIONS AND ACRONYMS ........................................................ A-1 Figure 3-1 Overview of AES .......................................................................................................... 3-2 3-2 Counter Mode ............................................................................................................... 3-3 3-3 GCM Authenticated Encryption Function .................................................................... 3-6 4-1 CMAC ........................................................................................................................... 4-3 4-2 Digital Signature Generation and Verification ............................................................. 4-4 CCSDS 350.9-G-1 Page v December 2014 CCSDS REPORT CONCERNING CRYPTOGRAPHIC ALGORITHMS 1 INTRODUCTION 1.1 PURPOSE This Informational Report provides background information regarding the standard CCSDS cryptographic algorithms specified in (reference [1]). The CCSDS Cryptographic Algorithms Recommended Standard recommends the use of a single symmetric block-cipher encryption algorithm, the Advanced Encryption Standard (AES), to provide confidentiality. It also recommends several algorithms to provide authentication and integrity. AES is the sole symmetric encryption algorithm that is recommended for use by all CCSDS missions and ground systems. In addition, a specific mode of operation (counter mode) for the algorithm and a minimum key length (128 bits) are recommended. The Recommended Standard recommends the use of one or more alternative authentication/integrity algorithms which may be chosen for use by individual missions depending on their specific mission environments. The use of standardized, well-known algorithms and the use of high-quality cryptography helps ensure system security and interoperability. Economies of scale are also achieved when off-the-shelf, standardized, approved algorithms are universally used because they may be purchased rather than having to be implemented for a specific system or mission. 1.2 SCOPE The algorithms discussed in this Informational Report have been recommended for use on all civilian space missions and ground systems with a requirement for information confidentiality and/or authentication. The algorithms may be employed on any or all mission communications links, such as the forward space link (e.g., telecommand) and the return space link (e.g., telemetry, science data), as well as across the ground data network. They could also be used to ensure confidentiality and authenticity/integrity of stored data (i.e., “data at rest”).

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    24 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us