卫星通信认证协议的后量子安全结构

IF 0.9 4区 计算机科学 Q3 ENGINEERING, AEROSPACE
Dharminder Dharminder, Pradeep Kumar Dadsena, Pratik Gupta, Sathya Sankaran
{"title":"卫星通信认证协议的后量子安全结构","authors":"Dharminder Dharminder,&nbsp;Pradeep Kumar Dadsena,&nbsp;Pratik Gupta,&nbsp;Sathya Sankaran","doi":"10.1002/sat.1455","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol.</p>\n </div>","PeriodicalId":50289,"journal":{"name":"International Journal of Satellite Communications and Networking","volume":"41 1","pages":"14-28"},"PeriodicalIF":0.9000,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A post quantum secure construction of an authentication protocol for satellite communication\",\"authors\":\"Dharminder Dharminder,&nbsp;Pradeep Kumar Dadsena,&nbsp;Pratik Gupta,&nbsp;Sathya Sankaran\",\"doi\":\"10.1002/sat.1455\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol.</p>\\n </div>\",\"PeriodicalId\":50289,\"journal\":{\"name\":\"International Journal of Satellite Communications and Networking\",\"volume\":\"41 1\",\"pages\":\"14-28\"},\"PeriodicalIF\":0.9000,\"publicationDate\":\"2022-07-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Satellite Communications and Networking\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/sat.1455\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, AEROSPACE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Satellite Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/sat.1455","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, AEROSPACE","Score":null,"Total":0}
引用次数: 2

摘要

卫星通信系统用于远距离通信和其他通信系统不方便的情况下进行通信。由于所有数据都是通过公共通道交换的,因此数据的安全性是通信各方的基本组成部分。密钥交换和身份验证都是在双方之间建立安全通信的两种加密工具。目前,建立安全网络的认证协议种类繁多,但都依赖于数字理论(离散对数问题/因数分解假设)硬假设。由于肖尔和格罗弗的计算算法,数论假设可以被量子计算机打破。尽管Kumar和Garg提出了一种用于卫星通信的抗量子攻击协议,但它无法抵御智能卡被盗攻击。我们已经分析了Kumar和Garg如何使用He等人以及Chen和Chen中描述的差分功率分析攻击来容易受到被盗智能卡攻击。我们还分析了Kumar和Garg协议的改进版本的信号泄漏攻击,有时也称为改进的信号泄漏攻击。我们试图构建一种安全有效的卫星通信认证协议,该协议可以对抗量子计算。这是更有效的,因为它只需要三个消息交换。本文介绍了所提出的认证与密钥协商协议的安全性证明和性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

A post quantum secure construction of an authentication protocol for satellite communication

A post quantum secure construction of an authentication protocol for satellite communication

Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
4.10
自引率
5.90%
发文量
31
审稿时长
>12 weeks
期刊介绍: The journal covers all aspects of the theory, practice and operation of satellite systems and networks. Papers must address some aspect of satellite systems or their applications. Topics covered include: -Satellite communication and broadcast systems- Satellite navigation and positioning systems- Satellite networks and networking- Hybrid systems- Equipment-earth stations/terminals, payloads, launchers and components- Description of new systems, operations and trials- Planning and operations- Performance analysis- Interoperability- Propagation and interference- Enabling technologies-coding/modulation/signal processing, etc.- Mobile/Broadcast/Navigation/fixed services- Service provision, marketing, economics and business aspects- Standards and regulation- Network protocols
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信