2 options
Cryptography and Satellite Navigation.
- Format:
- Book
- Author/Creator:
- Rushanan, Joseph J.
- Language:
- English
- Subjects (All):
- Cryptography.
- Global Positioning System.
- Physical Description:
- 1 online resource (351 pages)
- Edition:
- 1st ed.
- Place of Publication:
- Norwood : Artech House, 2024.
- Summary:
- This book provides an in-depth exploration of cryptography and satellite navigation systems, focusing on the integration and application of cryptographic techniques to enhance the security and reliability of global navigation satellite systems (GNSS). Covering topics such as satellite navigation signals, cryptographic methods, symmetric and public key cryptography, hashing, and cryptographic protocols, the book offers a comprehensive guide to securing satellite navigation systems against threats and ensuring data integrity, availability, and authenticity. It is intended for professionals, researchers, and students in the fields of cybersecurity, satellite technology, and navigation systems, aiming to equip them with the knowledge and tools to address challenges in modern satellite-based navigation and communication systems. Generated by AI.
- Contents:
- Cryptography and Satellite Navigation
- Contents
- Preface
- Acknowledgments
- Part I Satellite Navigation
- 1 Introduction
- 1.1 What Is This Book About?
- 1.2 Who Is This Book For?
- 1.3 What Do We Mean by Assurance?
- 1.3.1 Confidentiality
- 1.3.2 Integrity
- 1.3.3 Availability
- 1.3.4 Authentication and Identity
- 1.3.5 Nonrepudiation
- 1.4 What Do We Mean by PNT Assurance?
- 1.4.1 Assurance, Integrity, and All That
- 1.4.2 Confidentiality
- 1.4.3 Integrity
- 1.4.4 Availability
- 1.4.5 Continuity
- 1.4.6 Authentication and Identity
- 1.4.7 Nonrepudiation
- 1.5 What Is Cryptography, and How Can It Help?
- 1.6 How Is This Book Organized?
- End Notes
- References
- 2 Overview of Satellite Navigation
- 2.1 Navigation Signals from Space
- 2.2 The Segments of Satnav Systems
- 2.2.1 Space Segment
- 2.2.2 User Segment
- 2.2.3 Mission Segment
- 2.2.4 Control Segment
- 2.3 Descriptions of Orbits
- 2.4 Specific Constellations
- 2.5 Satnav Signals
- 2.6 Correlation
- 2.6.1 An Instructive Example
- 2.6.2 Misalignment Compensation
- 2.6.3 The Importance of Correlation
- 2.7 Satnav Signal Data
- 2.8 Takeaways
- Part II Cryptography
- 3 Symmetric Cryptography
- 3.1 Classic Ciphers
- 3.1.1 The Ancient World and Child's Play
- 3.1.2 To the Digital Age
- 3.2 An Overview of Ciphers
- 3.2.1 Block Ciphers
- 3.2.2 Stream Ciphers
- 3.2.3 Much of the Same
- 3.3 Desired Properties
- 3.3.1 Information Theory, or Shannon, Part 1
- 3.3.2 Confidentiality
- 3.3.3 Pseudorandom Generation
- 3.3.4 Avalanche Property
- 3.4 General Principles for Creating Ciphers
- 3.4.1 Shannon, Part 2
- 3.4.2 Substitution-Permutation Construction
- 3.4.3 Feistel Construction
- 3.4.4 Stream Ciphers
- 3.4.5 Performance
- 3.5 AES
- 3.5.1 Choosing the AES Cipher
- 3.5.2 AES Structure.
- 3.5.3 AES Performance
- 3.5.4 AES Takeaway
- 3.6 Lightweight Crypto
- 3.6.1 Add-Rotate-XOR Ciphers
- 3.6.2 ChaCha20
- 3.6.3 Simon and Speck
- 3.7 Cipher Modes
- 3.7.1 Overview
- 3.7.2 Electronic Codebook
- 3.7.3 Counter Mode
- 3.7.4 Cipher Block Chaining
- 3.7.5 Which Mode to Use?
- 3.8 Steganography
- 3.9 Foreshadowing: Navigation Examples
- 3.10 Takeaways
- 4 Hashing
- 4.1 Hash Functions and Their Goals
- 4.1.1 Pre-Image Resistance
- 4.1.2 Collisions
- 4.1.3 A Birthday Surprise
- 4.1.4 Other Properties
- 4.2 Construction
- 4.2.1 SHA-2 Family
- 4.2.2 SHA3
- 4.3 Message Authentication Codes
- 4.3.1 What Doesn't Work
- 4.3.2 Hash-Based Message Authentication Code
- 4.4 Ciphers and Authentication
- 4.4.1 Cipher Modes
- 4.4.2 Counter Mode with CBC-MAC
- 4.4.3 Galois Counter Mode
- 4.4.4 Authenticated Ciphers
- 4.5 Application: Digital Fingerprints
- 4.5.1 Message Digest
- 4.5.2 Secure Verification
- 4.5.3 Watermarking
- 4.6 Application: Chains, Trees, and Blockchain
- 4.6.1 Hash Chains
- 4.6.2 Merkle Trees
- 4.6.3 Blockchain and Cryptocurrency
- 4.7 Application: Bit Commitment
- 4.8 Application: TESLA
- 4.8.1 Main Idea
- 4.8.2 Data Stream
- 4.8.3 Hash Chain of Keys
- 4.8.4 Message Stream and MACs
- 4.8.5 Authentication via Digital Signatures
- 4.8.6 Properties
- 4.9 Foreshadowing: Navigation
- 4.10 Takeaways
- 5 Public Key Cryptography
- 5.1 Motivation and History
- 5.1.1 Physical Analogs
- 5.1.2 History
- 5.2 Public Key Cryptography Goals
- 5.2.1 Encryption
- 5.2.2 Signatures
- 5.2.3 Key Exchange
- 5.3 Math Foundations
- 5.3.1 Number Theory 101
- 5.3.2 Hard Number Theory Problems
- 5.4 RSA
- 5.4.1 Definition
- 5.4.2 Justification
- 5.4.3 Implications
- 5.4.4 Signatures
- 5.4.5 Practicalities
- 5.4.6 Attacks
- 5.4.7 Strengths.
- 5.4.8 Performance
- 5.5 Digital Signature Algorithm
- 5.5.1 Definition
- 5.5.2 Justification
- 5.5.3 Implications and Attacks
- 5.5.4 Elliptic Curve Methods
- 5.5.5 Strengths
- 5.5.6 Performance
- 5.6 Diffie-Hellman Key Exchange Protocol
- 5.6.1 Protocol
- 5.6.2 Implications and Attacks
- 5.6.3 Elliptic Curve Methods
- 5.6.4 Strengths
- 5.7 Applications: More on Signatures
- 5.7.1 Time Stamps
- 5.7.2 Blinding and Blind Signatures
- 5.7.3 Double Signatures
- 5.8 Applications: PKI
- 5.8.1 PKI Structure
- 5.8.2 PKI Operations
- 5.8.3 Certificates
- 5.8.4 Important Points
- 5.9 Applications: Secure Email
- 5.9.1 Goals
- 5.9.2 General Framework
- 5.9.3 Nuances
- 5.10 Foreshadowing: Navigation
- 5.11 Takeaways
- 6 Cryptographic Protocols
- 6.1 Protocol Principles
- 6.1.1 The Need for Trust
- 6.1.2 Ensuring Trust
- 6.1.3 There's Always Risk
- 6.1.4 Trust in the Protocol
- 6.2 Identity Methods
- 6.2.1 General Traits
- 6.2.2 Cryptographic Identification
- 6.2.3 Zero-Knowledge Proofs
- 6.3 Managing Keys
- 6.3.1 Key Management Ingredients
- 6.3.2 Public Key Methods
- 6.3.3 Symmetric Methods
- 6.3.4 Comparisons
- 6.4 The Network Stack
- 6.4.1 The Network Stack
- 6.4.2 Layer 1: The Physical Layer
- 6.4.3 Layer 2: The Link Layer
- 6.4.4 Layer 3: The Network Layer
- 6.4.5 Layer 4: The Transport Layer
- 6.4.6 Upper Layers: Applications
- 6.4.7 Observations
- 6.5 Other Protocols
- 6.5.1 Other Communication Protocols
- 6.5.2 Internet of Things
- 6.5.3 Zero Trust
- 6.6 Takeaways
- Part III Securing Satellite Navigation
- 7 Cryptography and the Satnav Enterprise
- 7.1 Space and Security
- 7.2 Protocols and Satnav
- 7.2.1 Trust
- 7.2.2 Identity
- 7.2.3 Key Management
- 7.3 Satnav Infrastructure
- 7.3.1 Space Segment
- 7.3.2 Control Segment.
- 7.3.3 Mission Segment
- 7.3.4 User Segment
- 7.3.5 Threats
- 7.3.6 What about Satnav Signals?
- 7.4 A Summarizing Sample Enterprise
- 7.4.1 Common Elements
- 7.4.2 Mission Segment
- 7.4.3 Control Segment
- 7.4.4 Ground Antenna
- 7.4.5 Monitoring Stations
- 7.4.6 Space Segment
- 7.4.7 Ephemeris Service
- 7.4.8 Key Management
- 7.4.9 User Equipment
- 7.5 Satnav Signals
- 7.5.1 Satnav Signal Layer and Security Goals
- 7.5.2 Taxonomy of Threats
- 7.6 A Brief Relevant History
- 7.6.1 The Need: Pre-2000
- 7.6.2 2000s
- 7.7 Takeaways
- 8 Navigation Message Authentication
- 8.1 Protecting Navigation Data
- 8.1.1 Goals
- 8.1.2 Constraints
- 8.1.3 Measures
- 8.2 History
- 8.2.1 Original Thoughts
- 8.2.2 Recent Trends
- 8.3 General Methods for NMA
- 8.3.1 Using Only Digital Signatures
- 8.3.2 Using TESLA
- 8.3.3 Out-of-Band
- 8.3.4 Summary
- 8.4 Galileo OSNMA
- 8.4.1 Overview
- 8.4.2 Overall Architecture
- 8.4.3 Cryptographic Methods
- 8.4.4 Performance
- 8.4.5 Future Plans
- 8.5 Chimera
- 8.5.1 NMA on Chimera
- 8.5.2 Baseline Chimera
- 8.5.3 TESLA Chimera
- 8.5.4 An Experimental Design
- 8.6 Summary and the Future
- 9 Spreading Code Protection
- 9.1 Protecting the Signal Lower Layers
- 9.1.1 Goals
- 9.1.2 Constraints
- 9.1.3 Measures
- 9.2 History
- 9.3 General Cryptographic Methods
- 9.3.1 Cryptography and Spreading Codes
- 9.3.2 Shared Key Methods
- 9.3.3 Bit Commitment Methods
- 9.4 Applying Cryptography to Spreading Codes
- 9.4.1 Ciphertext as Spreading Codes
- 9.4.2 Ciphertext as Markers
- 9.4.3 Ciphertext Modifying Spreading Chips
- 9.5 Chimera Markers
- 9.5.1 L1C Spreading Code Structure
- 9.5.2 Chimera Marker Overview
- 9.5.3 Cryptographic Processing
- 9.5.4 Creating the Markers
- 9.5.5 Performance
- 9.6 Takeaways
- End Notes.
- References
- 10 Hybrid Protection of a Satnav Signal
- 10.1 The Issue and Options
- 10.1.1 The Problem
- 10.1.2 The (Only?) Choices
- 10.1.3 A Holy Grail
- 10.2 Protecting Both the Signal and Data
- 10.2.1 Goals
- 10.2.2 Constraints
- 10.2.3 Measures
- 10.3 History
- 10.4 General Methods
- 10.4.1 Hybrid Approaches Using Bit Commitment
- 10.5 NTS-3
- 10.5.1 Baseline Chimera Overview
- 10.5.2 TESLA Chimera Overview
- 10.5.3 Processing
- 10.5.4 Performance
- 10.5.5 Multichannel Chimera
- 10.6 Galileo Signal Authentication Service
- 10.7 Takeaways
- 11 Other Things and Going Forward
- 11.1 Other Navigation Examples
- 11.1.1 Snapshot Receivers
- 11.1.2 Using Location in Cryptography
- 11.2 But What About ...?
- 11.2.1 Homomorphic Encryption
- 11.2.2 Blockchain
- 11.2.3 Physical Layer Key Exchange
- 11.2.4 Implementation Security
- 11.3 Future Trends
- 11.3.1 Future Satnav
- 11.3.2 Other Navigation Methods
- 11.4 Our Final Thoughts
- Appendix The Influence of Quantum
- A.1 The Components of Quantum Computing
- A.1.1 States and Superposition
- A.1.2 Matrices: Hermitian, Unitary, and Measurement
- A.1.3 Entanglement
- A.1.4 No Cloning
- A.2 Quantum Computing Algorithms
- A.2.1 Deutsch's Algorithm
- A.2.2 Grover's Algorithm
- A.2.3 Shor's Algorithm and Impacts
- A.3 Post-Quantum Cryptography
- A.3.1 Symmetric Algorithms
- A.3.2 Asymmetric Cryptography
- A.3.3 Complexity Theory
- A.3.4 Code and Lattice-Based Cryptography
- A.3.5 Multivariate Cryptography
- A.4 Takeaways: Quantum and Post-Quantum
- About the Authors
- Index.
- Notes:
- Description based on publisher supplied metadata and other sources.
- Part of the metadata in this record was created by AI, based on the text of the resource.
- ISBN:
- 9781685690328
- 1685690327
- OCLC:
- 1484256010
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.