My Account Log in

2 options

Cryptography and Satellite Navigation.

Ebook Central Academic Complete Available online

View online

Knovel Aerospace Radar Technology Academic Available online

View online
Format:
Book
Author/Creator:
Rushanan, Joseph J.
Contributor:
Gillis, James T.
Language:
English
Subjects (All):
Cryptography.
Global Positioning System.
Physical Description:
1 online resource (351 pages)
Edition:
1st ed.
Place of Publication:
Norwood : Artech House, 2024.
Summary:
This book provides an in-depth exploration of cryptography and satellite navigation systems, focusing on the integration and application of cryptographic techniques to enhance the security and reliability of global navigation satellite systems (GNSS). Covering topics such as satellite navigation signals, cryptographic methods, symmetric and public key cryptography, hashing, and cryptographic protocols, the book offers a comprehensive guide to securing satellite navigation systems against threats and ensuring data integrity, availability, and authenticity. It is intended for professionals, researchers, and students in the fields of cybersecurity, satellite technology, and navigation systems, aiming to equip them with the knowledge and tools to address challenges in modern satellite-based navigation and communication systems. Generated by AI.
Contents:
Cryptography and Satellite Navigation
Contents
Preface
Acknowledgments
Part I Satellite Navigation
1 Introduction
1.1 What Is This Book About?
1.2 Who Is This Book For?
1.3 What Do We Mean by Assurance?
1.3.1 Confidentiality
1.3.2 Integrity
1.3.3 Availability
1.3.4 Authentication and Identity
1.3.5 Nonrepudiation
1.4 What Do We Mean by PNT Assurance?
1.4.1 Assurance, Integrity, and All That
1.4.2 Confidentiality
1.4.3 Integrity
1.4.4 Availability
1.4.5 Continuity
1.4.6 Authentication and Identity
1.4.7 Nonrepudiation
1.5 What Is Cryptography, and How Can It Help?
1.6 How Is This Book Organized?
End Notes
References
2 Overview of Satellite Navigation
2.1 Navigation Signals from Space
2.2 The Segments of Satnav Systems
2.2.1 Space Segment
2.2.2 User Segment
2.2.3 Mission Segment
2.2.4 Control Segment
2.3 Descriptions of Orbits
2.4 Specific Constellations
2.5 Satnav Signals
2.6 Correlation
2.6.1 An Instructive Example
2.6.2 Misalignment Compensation
2.6.3 The Importance of Correlation
2.7 Satnav Signal Data
2.8 Takeaways
Part II Cryptography
3 Symmetric Cryptography
3.1 Classic Ciphers
3.1.1 The Ancient World and Child's Play
3.1.2 To the Digital Age
3.2 An Overview of Ciphers
3.2.1 Block Ciphers
3.2.2 Stream Ciphers
3.2.3 Much of the Same
3.3 Desired Properties
3.3.1 Information Theory, or Shannon, Part 1
3.3.2 Confidentiality
3.3.3 Pseudorandom Generation
3.3.4 Avalanche Property
3.4 General Principles for Creating Ciphers
3.4.1 Shannon, Part 2
3.4.2 Substitution-Permutation Construction
3.4.3 Feistel Construction
3.4.4 Stream Ciphers
3.4.5 Performance
3.5 AES
3.5.1 Choosing the AES Cipher
3.5.2 AES Structure.
3.5.3 AES Performance
3.5.4 AES Takeaway
3.6 Lightweight Crypto
3.6.1 Add-Rotate-XOR Ciphers
3.6.2 ChaCha20
3.6.3 Simon and Speck
3.7 Cipher Modes
3.7.1 Overview
3.7.2 Electronic Codebook
3.7.3 Counter Mode
3.7.4 Cipher Block Chaining
3.7.5 Which Mode to Use?
3.8 Steganography
3.9 Foreshadowing: Navigation Examples
3.10 Takeaways
4 Hashing
4.1 Hash Functions and Their Goals
4.1.1 Pre-Image Resistance
4.1.2 Collisions
4.1.3 A Birthday Surprise
4.1.4 Other Properties
4.2 Construction
4.2.1 SHA-2 Family
4.2.2 SHA3
4.3 Message Authentication Codes
4.3.1 What Doesn't Work
4.3.2 Hash-Based Message Authentication Code
4.4 Ciphers and Authentication
4.4.1 Cipher Modes
4.4.2 Counter Mode with CBC-MAC
4.4.3 Galois Counter Mode
4.4.4 Authenticated Ciphers
4.5 Application: Digital Fingerprints
4.5.1 Message Digest
4.5.2 Secure Verification
4.5.3 Watermarking
4.6 Application: Chains, Trees, and Blockchain
4.6.1 Hash Chains
4.6.2 Merkle Trees
4.6.3 Blockchain and Cryptocurrency
4.7 Application: Bit Commitment
4.8 Application: TESLA
4.8.1 Main Idea
4.8.2 Data Stream
4.8.3 Hash Chain of Keys
4.8.4 Message Stream and MACs
4.8.5 Authentication via Digital Signatures
4.8.6 Properties
4.9 Foreshadowing: Navigation
4.10 Takeaways
5 Public Key Cryptography
5.1 Motivation and History
5.1.1 Physical Analogs
5.1.2 History
5.2 Public Key Cryptography Goals
5.2.1 Encryption
5.2.2 Signatures
5.2.3 Key Exchange
5.3 Math Foundations
5.3.1 Number Theory 101
5.3.2 Hard Number Theory Problems
5.4 RSA
5.4.1 Definition
5.4.2 Justification
5.4.3 Implications
5.4.4 Signatures
5.4.5 Practicalities
5.4.6 Attacks
5.4.7 Strengths.
5.4.8 Performance
5.5 Digital Signature Algorithm
5.5.1 Definition
5.5.2 Justification
5.5.3 Implications and Attacks
5.5.4 Elliptic Curve Methods
5.5.5 Strengths
5.5.6 Performance
5.6 Diffie-Hellman Key Exchange Protocol
5.6.1 Protocol
5.6.2 Implications and Attacks
5.6.3 Elliptic Curve Methods
5.6.4 Strengths
5.7 Applications: More on Signatures
5.7.1 Time Stamps
5.7.2 Blinding and Blind Signatures
5.7.3 Double Signatures
5.8 Applications: PKI
5.8.1 PKI Structure
5.8.2 PKI Operations
5.8.3 Certificates
5.8.4 Important Points
5.9 Applications: Secure Email
5.9.1 Goals
5.9.2 General Framework
5.9.3 Nuances
5.10 Foreshadowing: Navigation
5.11 Takeaways
6 Cryptographic Protocols
6.1 Protocol Principles
6.1.1 The Need for Trust
6.1.2 Ensuring Trust
6.1.3 There's Always Risk
6.1.4 Trust in the Protocol
6.2 Identity Methods
6.2.1 General Traits
6.2.2 Cryptographic Identification
6.2.3 Zero-Knowledge Proofs
6.3 Managing Keys
6.3.1 Key Management Ingredients
6.3.2 Public Key Methods
6.3.3 Symmetric Methods
6.3.4 Comparisons
6.4 The Network Stack
6.4.1 The Network Stack
6.4.2 Layer 1: The Physical Layer
6.4.3 Layer 2: The Link Layer
6.4.4 Layer 3: The Network Layer
6.4.5 Layer 4: The Transport Layer
6.4.6 Upper Layers: Applications
6.4.7 Observations
6.5 Other Protocols
6.5.1 Other Communication Protocols
6.5.2 Internet of Things
6.5.3 Zero Trust
6.6 Takeaways
Part III Securing Satellite Navigation
7 Cryptography and the Satnav Enterprise
7.1 Space and Security
7.2 Protocols and Satnav
7.2.1 Trust
7.2.2 Identity
7.2.3 Key Management
7.3 Satnav Infrastructure
7.3.1 Space Segment
7.3.2 Control Segment.
7.3.3 Mission Segment
7.3.4 User Segment
7.3.5 Threats
7.3.6 What about Satnav Signals?
7.4 A Summarizing Sample Enterprise
7.4.1 Common Elements
7.4.2 Mission Segment
7.4.3 Control Segment
7.4.4 Ground Antenna
7.4.5 Monitoring Stations
7.4.6 Space Segment
7.4.7 Ephemeris Service
7.4.8 Key Management
7.4.9 User Equipment
7.5 Satnav Signals
7.5.1 Satnav Signal Layer and Security Goals
7.5.2 Taxonomy of Threats
7.6 A Brief Relevant History
7.6.1 The Need: Pre-2000
7.6.2 2000s
7.7 Takeaways
8 Navigation Message Authentication
8.1 Protecting Navigation Data
8.1.1 Goals
8.1.2 Constraints
8.1.3 Measures
8.2 History
8.2.1 Original Thoughts
8.2.2 Recent Trends
8.3 General Methods for NMA
8.3.1 Using Only Digital Signatures
8.3.2 Using TESLA
8.3.3 Out-of-Band
8.3.4 Summary
8.4 Galileo OSNMA
8.4.1 Overview
8.4.2 Overall Architecture
8.4.3 Cryptographic Methods
8.4.4 Performance
8.4.5 Future Plans
8.5 Chimera
8.5.1 NMA on Chimera
8.5.2 Baseline Chimera
8.5.3 TESLA Chimera
8.5.4 An Experimental Design
8.6 Summary and the Future
9 Spreading Code Protection
9.1 Protecting the Signal Lower Layers
9.1.1 Goals
9.1.2 Constraints
9.1.3 Measures
9.2 History
9.3 General Cryptographic Methods
9.3.1 Cryptography and Spreading Codes
9.3.2 Shared Key Methods
9.3.3 Bit Commitment Methods
9.4 Applying Cryptography to Spreading Codes
9.4.1 Ciphertext as Spreading Codes
9.4.2 Ciphertext as Markers
9.4.3 Ciphertext Modifying Spreading Chips
9.5 Chimera Markers
9.5.1 L1C Spreading Code Structure
9.5.2 Chimera Marker Overview
9.5.3 Cryptographic Processing
9.5.4 Creating the Markers
9.5.5 Performance
9.6 Takeaways
End Notes.
References
10 Hybrid Protection of a Satnav Signal
10.1 The Issue and Options
10.1.1 The Problem
10.1.2 The (Only?) Choices
10.1.3 A Holy Grail
10.2 Protecting Both the Signal and Data
10.2.1 Goals
10.2.2 Constraints
10.2.3 Measures
10.3 History
10.4 General Methods
10.4.1 Hybrid Approaches Using Bit Commitment
10.5 NTS-3
10.5.1 Baseline Chimera Overview
10.5.2 TESLA Chimera Overview
10.5.3 Processing
10.5.4 Performance
10.5.5 Multichannel Chimera
10.6 Galileo Signal Authentication Service
10.7 Takeaways
11 Other Things and Going Forward
11.1 Other Navigation Examples
11.1.1 Snapshot Receivers
11.1.2 Using Location in Cryptography
11.2 But What About ...?
11.2.1 Homomorphic Encryption
11.2.2 Blockchain
11.2.3 Physical Layer Key Exchange
11.2.4 Implementation Security
11.3 Future Trends
11.3.1 Future Satnav
11.3.2 Other Navigation Methods
11.4 Our Final Thoughts
Appendix The Influence of Quantum
A.1 The Components of Quantum Computing
A.1.1 States and Superposition
A.1.2 Matrices: Hermitian, Unitary, and Measurement
A.1.3 Entanglement
A.1.4 No Cloning
A.2 Quantum Computing Algorithms
A.2.1 Deutsch's Algorithm
A.2.2 Grover's Algorithm
A.2.3 Shor's Algorithm and Impacts
A.3 Post-Quantum Cryptography
A.3.1 Symmetric Algorithms
A.3.2 Asymmetric Cryptography
A.3.3 Complexity Theory
A.3.4 Code and Lattice-Based Cryptography
A.3.5 Multivariate Cryptography
A.4 Takeaways: Quantum and Post-Quantum
About the Authors
Index.
Notes:
Description based on publisher supplied metadata and other sources.
Part of the metadata in this record was created by AI, based on the text of the resource.
ISBN:
9781685690328
1685690327
OCLC:
1484256010

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account