-
UAV Traffic Management : A Survey On Communication Security
Authors:
Ridwane Aissaoui,
Jean-Christophe Deneuville,
Christophe Guerber,
Alain Pirovano
Abstract:
Unmanned Aerial Systems (UAS) have a wide variety of applications, and their development in terms of capabilities is continuously evolving. Many missions performed by an Unmanned Aerial Vehicle (UAV) require flying in public airspace. This requires very high safety standards, similar to those mandatory in commercial civil aviation. A safe UAV Traffic Management (UTM) requires several communication…
▽ More
Unmanned Aerial Systems (UAS) have a wide variety of applications, and their development in terms of capabilities is continuously evolving. Many missions performed by an Unmanned Aerial Vehicle (UAV) require flying in public airspace. This requires very high safety standards, similar to those mandatory in commercial civil aviation. A safe UAV Traffic Management (UTM) requires several communication links between aircraft, their pilots and UTM systems. The integrity of these communication links is critical for the safety of operations. Several security requirements also have to be met on each of these links. Unfortunately, current cryptographic standards used over the internet are most often not suitable to UAS due to their limited resources and dynamic nature. This survey discusses the security required for every communication link in order to enable a safe traffic management. Research works focusing on the security of communication links using cryptographic primitives are then presented and discussed. Authentication protocols developed for UAVs or other constrained systems are compared and evaluated as solutions for UAS security. Symmetrical alternatives to the AES algorithm are also presented. Works to secure current UTM protocols such as ADS-B and RemoteID are discussed. The analysis reveals a need for the development of a complete secure architecture able to provide authentication and integrity to external systems (other aircraft, UTM systems...).
△ Less
Submitted 10 November, 2022;
originally announced November 2022.
-
Cryptanalysis of a code-based full-time signature
Authors:
Nicolas Aragon,
Marco Baldi,
Jean-Christophe Deneuville,
Karan Khathuria,
Edoardo Persichetti,
Paolo Santini
Abstract:
We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW). The private key in the SHMWW scheme contains columns coming in part from an identity matrix and in part from a random matrix. The existence of two types of columns leads to a strong bias in the distribution of set bits in produced signatu…
▽ More
We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW). The private key in the SHMWW scheme contains columns coming in part from an identity matrix and in part from a random matrix. The existence of two types of columns leads to a strong bias in the distribution of set bits in produced signatures. Our attack exploits such a bias to recover the private key from a bunch of collected signatures. We provide a theoretical analysis of the attack along with experimental evaluations, and we show that as few as 10 signatures are enough to be collected for successfully recovering the private key. As for previous attempts of adapting Lyubashevsky's protocol to the case of code-based cryptography, the SHMWW scheme is thus proved unable to provide acceptable security. This confirms that devising secure code-based signature schemes with efficiency comparable to that of other post-quantum solutions (e.g., based on lattices) is still a challenging task.
△ Less
Submitted 6 July, 2021; v1 submitted 16 November, 2020;
originally announced November 2020.
-
Efficient Encryption from Random Quasi-Cyclic Codes
Authors:
Carlos Aguilar,
Olivier Blazy,
Jean-Christophe Deneuville,
Philippe Gaborit,
Gilles Zémor
Abstract:
We propose a framework for constructing efficient code-based encryption schemes from codes that do not hide any structure in their public matrix. The framework is in the spirit of the schemes first proposed by Alekhnovich in 2003 and based on the difficulty of decoding random linear codes from random errors of low weight. We depart somewhat from Aleknovich's approach and propose an encryption sche…
▽ More
We propose a framework for constructing efficient code-based encryption schemes from codes that do not hide any structure in their public matrix. The framework is in the spirit of the schemes first proposed by Alekhnovich in 2003 and based on the difficulty of decoding random linear codes from random errors of low weight. We depart somewhat from Aleknovich's approach and propose an encryption scheme based on the difficulty of decoding random quasi-cyclic codes. We propose two new cryptosystems instantiated within our framework: the Hamming Quasi-Cyclic cryptosystem (HQC), based on the Hamming metric, and the Rank Quasi-Cyclic cryptosystem (RQC), based on the rank metric. We give a security proof, which reduces the IND-CPA security of our systems to a decisional version of the well known problem of decoding random families of quasi-cyclic codes for the Hamming and rank metrics (the respective QCSD and RQCSD problems). We also provide an analysis of the decryption failure probability of our scheme in the Hamming metric case: for the rank metric there is no decryption failure. Our schemes benefit from a very fast decryption algorithm together with small key sizes of only a few thousand bits. The cryptosystems are very efficient for low encryption rates and are very well suited to key exchange and authentication. Asymptotically, for λthe security parameter, the public key sizes are respectively in $O(λ^{2})$ for HQC and in $O(λ^{4/3})$ for RQC. Practical parameter compares well to systems based on ring-LPN or the recent MDPC system.
△ Less
Submitted 16 December, 2016;
originally announced December 2016.