Papers
Topics
Authors
Recent
AI Research Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 78 tok/s
Gemini 2.5 Pro 42 tok/s Pro
GPT-5 Medium 23 tok/s Pro
GPT-5 High 20 tok/s Pro
GPT-4o 103 tok/s Pro
Kimi K2 188 tok/s Pro
GPT OSS 120B 454 tok/s Pro
Claude Sonnet 4 38 tok/s Pro
2000 character limit reached

Assessment of cryptographic approaches for a quantum-resistant Galileo OSNMA (2312.11080v2)

Published 18 Dec 2023 in cs.CR and eess.SP

Abstract: Quantum computing becomes more of a reality as time passes, bringing several cybersecurity challenges. Modern cryptography is based on the computational complexity of specific mathematical problems, but as new quantum-based computers appear, classical methods might not be enough to secure communications. In this paper, we analyse the state of the Galileo Open Service Navigation Message Authentication (OSNMA) to overcome these new threats. This analysis and its assessment have been performed using OSNMA documentation, reviewing the available Post Quantum Cryptography (PQC) algorithms competing in the National Institute of Standards and Technology (NIST) standardization process, and studying the possibility of its implementation in the Galileo service. The main barrier to adopting the PQC approach is the size of both the signature and the key. The analysis shows that OSNMA is not yet prepared to face the quantum threat, and a significant change would be required. This work concludes by assessing different temporal countermeasures that can be implemented to sustain the system's integrity in the short term.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (75)
  1. “CARAMUEL: The future of Space Quantum Key Distribution in GEO” In 2022 IEEE International Conference on Space Optical Systems and Applications (ICSOS), 2022, pp. 57–65 DOI: 10.1109/ICSOS53063.2022.9749720
  2. Jean-Philippe Aumasson, Daniel J. Bernstein and Ward Beullens “SPHINCS+. Submission to the NIST post-quantum project, v.3.1”, 2022 URL: https://sphincs.org/data/sphincs+-r3.1-specification.pdf
  3. European GNSS Supervisory Authority. “European GNSS (Galileo) Open Service Signal-In_Space Interface Control Document Issue 2.0”, 2021 URL: https://www.gsc-europa.eu/sites/default/files/sites/all/files/Galileo_OS_SIS_ICD_v2.0.pdf
  4. European GNSS Supervisory Authority. “Galileo - Open Service - Service Definition Document”, 2021 URL: https://www.gsc-europa.eu/sites/default/files/sites/all/files/Galileo-OS-SDD_v1.2.pdf
  5. “CRYSTALS-Kyber. Algorithm Specifications And Supporting Documentation”, 2021
  6. “CRYSTALS-Dilithium. Algorithm Specifications and Supporting Documentation (Version 3.1)”, 2021
  7. “Regulated applications for the road transportation infrastructure: The case study of the smart tachograph in the European Union” In International Journal of Critical Infrastructure Protection 21, 2018, pp. 3–21 DOI: 10.1016/j.ijcip.2018.02.001
  8. Elaine B. Barker and Quynh H. Dang “Recommendation for Key Management Part 3: Application-Specific Key Management Guidance”, 2015, pp. NIST SP 800–57Pt3r1 DOI: 10.6028/NIST.SP.800-57Pt3r1
  9. “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile” Num Pages: 151, 2008 DOI: 10.17487/RFC5280
  10. Johannes Buchmann, Erik Dahmen and Michael Schneider “Merkle Tree Traversal Revisited” In Post-Quantum Cryptography, Lecture Notes in Computer Science Berlin, Heidelberg: Springer, 2008, pp. 63–78 DOI: 10.1007/978-3-540-88403-3˙5
  11. “An efficient key recovery attack on SIDH” Report Number: 975, 2022 URL: https://eprint.iacr.org/2022/975
  12. Sofía Celi “The post-quantum state: a taxonomy of challenges” In The Cloudflare Blog, 2022 URL: http://blog.cloudflare.com/post-quantum-taxonomy/
  13. European GNSS Service Centre “Services — European GNSS Service Centre” URL: https://www.gsc-europa.eu/galileo/services
  14. “Satellite Navigation Signal Authentication in GNSS: A Survey on Technology Evolution, Status, and Perspective for BDS” Number: 5 Publisher: Multidisciplinary Digital Publishing Institute In Remote Sensing 15.5, 2023, pp. 1462 DOI: 10.3390/rs15051462
  15. European Commision “EU Space Strategy for Security and Defence” URL: https://defence-industry-space.ec.europa.eu/eu-space-strategy-security-and-defence_en
  16. Information Technology Laboratory Computer Security Division “Post-Quantum Cryptography Standardization - Post-Quantum Cryptography — CSRC — CSRC” In CSRC — NIST, 2017 URL: https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization
  17. Information Technology Laboratory Computer Security Division “Round 4 Submissions - Post-Quantum Cryptography — CSRC — CSRC” In CSRC — NIST, 2017 URL: https://csrc.nist.gov/projects/post-quantum-cryptography/round-4-submissions
  18. Information Technology Laboratory Computer Security Division “Selected Algorithms 2022 - Post-Quantum Cryptography — CSRC — CSRC” In CSRC — NIST, 2017 URL: https://csrc.nist.gov/projects/post-quantum-cryptography/selected-algorithms-2022
  19. Information Technology Laboratory Computer Security Division “Stateful Hash-Based Signatures — CSRC — CSRC” In CSRC — NIST, 2018 URL: https://csrc.nist.gov/projects/stateful-hash-based-signatures
  20. Information Technology Laboratory Computer Security Division “Announcing PQC Candidates to be Standardized, Plus Fourth Round Candidates — CSRC” In CSRC — NIST, 2022 URL: https://csrc.nist.gov/News/2022/pqc-candidates-to-be-standardized-and-round-4
  21. Sabine Dahmen-Lhuissier “Quantum-Safe Cryptography (QSC)” In ETSI URL: https://www.etsi.org/technologies/quantum-safe-cryptography
  22. “Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication” Conference Name: IEEE Access In IEEE Access 10, 2022, pp. 21941–21954 DOI: 10.1109/ACCESS.2022.3152895
  23. European GNSS Supervisory Authority. “GALILEO Open Service Navigation Message Authentication (OSNMA) receiver guidelines for the test phase: issue 1.0, November 2021.” LU: Publications Office, 2021 URL: https://data.europa.eu/doi/10.2878/230609
  24. European GNSS Supervisory Authority. “Galileo Open Service Navigation Message Authentication (OSNMA): Signal in Space Interface Control Document (SIS ICD) : Issue 1.0, December 2022.” LU: Publications Office, 2022 URL: https://data.europa.eu/doi/10.2878/594840
  25. “Introducing CIRCL: An Advanced Cryptographic Library” Cloudflare, 2019
  26. “Semi-Assisted Signal Authentication based on Galileo ACAS” arXiv:2204.14026 [cs, eess] arXiv, 2022 DOI: 10.48550/arXiv.2204.14026
  27. “Galileo high accuracy service: initial definition and performance” In GPS Solutions 26.3, 2022, pp. 65 DOI: 10.1007/s10291-022-01247-x
  28. “PPP/PPP-RTK Message Authentication” In NAVIGATION: Journal of the Institute of Navigation 70.2, 2023 DOI: 10.33012/navi.579
  29. “Semi-Assisted Signal Authentication for Galileo: Proof of Concept and Results” Conference Name: IEEE Transactions on Aerospace and Electronic Systems In IEEE Transactions on Aerospace and Electronic Systems, 2023, pp. 1–13 DOI: 10.1109/TAES.2023.3243587
  30. Ignacio Fernández-Hernández, Tomer Ashur and Vincent Rijmen “Analysis and recommendations for MAC and key lengths in delayed disclosure GNSS authentication protocols” Publisher: Institute of Electrical and Electronics Engineers In IEEE Transactions on Aerospace and Electronic Systems 57.3, 2021, pp. 1827–1839
  31. Federal Office Information Security (BSI) “Quantum-safe cryptography – fundamentals, current developments and recommendations”, BSI-Bro21/01 URL: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.html
  32. “Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU”, 2020
  33. “Bootstrapping Timed Efficient Stream Loss-Tolerant Authentication (TESLA)” Num Pages: 18, 2006 DOI: 10.17487/RFC4442
  34. “Benefit of GNSS multiconstellation in position and velocity domain” In 2015 IEEE Metrology for Aerospace (MetroAeroSpace), 2015, pp. 9–14 DOI: 10.1109/MetroAeroSpace.2015.7180618
  35. Steven D. Galbraith and Frederik Vercauteren “Computational problems in supersingular elliptic curve isogenies” In Quantum Information Processing 17.10, 2018, pp. 265 DOI: 10.1007/s11128-018-2023-6
  36. “Galileo Services — EU Agency for the Space Programme” URL: https://www.euspa.europa.eu/galileo/services
  37. “How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits” arXiv:1905.09749 [quant-ph] In Quantum 5, 2021, pp. 433 DOI: 10.22331/q-2021-04-15-433
  38. Lov K. Grover “A fast quantum mechanical algorithm for database search” arXiv:quant-ph/9605043 arXiv, 1996 DOI: 10.48550/arXiv.quant-ph/9605043
  39. Jeffrey Hoffstein, Jill Pipher and Joseph H. Silverman “NTRU: A ring-based public key cryptosystem” In Algorithmic Number Theory, Lecture Notes in Computer Science Berlin, Heidelberg: Springer, 1998, pp. 267–288 DOI: 10.1007/BFb0054868
  40. “Cryptanalysis Against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations” In Topics in Cryptology – CT-RSA 2018, Lecture Notes in Computer Science Cham: Springer International Publishing, 2018, pp. 198–218 DOI: 10.1007/978-3-319-76953-0˙11
  41. “XMSS: eXtended Merkle Signature Scheme” Issue: 8391 Num Pages: 74 Series: Request for Comments Published: RFC 8391 RFC Editor, 2018 DOI: 10.17487/RFC8391
  42. Andreas Hülsing “WOTS+ – Shorter Signatures for Hash-Based Signature Schemes” Report Number: 965, 2017 URL: https://eprint.iacr.org/2017/965
  43. GlobalSign Inc “GlobalSign Root Certificates :” In GlobalSign Support, 2022 URL: https://support.globalsign.com/ca-certificates/root-certificates/globalsign-root-certificates
  44. “Transitioning organizations to post-quantum cryptography” Number: 7909 Publisher: Nature Publishing Group In Nature 605.7909, 2022, pp. 237–243 DOI: 10.1038/s41586-022-04623-2
  45. Hugo Krawczyk, Mihir Bellare and Ran Canetti “HMAC: Keyed-Hashing for Message Authentication” Num Pages: 11, 1997 DOI: 10.17487/RFC2104
  46. “TLS Post-Quantum Experiment” In The Cloudflare Blog, 2019 URL: http://blog.cloudflare.com/the-tls-post-quantum-experiment/
  47. Richard B. Langley, Peter J.G. Teunissen and Oliver Montenbruck “Introduction to GNSS” In Springer Handbook of Global Navigation Satellite Systems, Springer Handbooks Cham: Springer International Publishing, 2017, pp. 3–23 DOI: 10.1007/978-3-319-42928-1˙1
  48. Martin Andreoni Lopez, Guilherme N.N. Barbosa and Diogo M.F. Mattos “New Barriers on 6G Networking: An Exploratory Study on the Security, Privacy and Opportunities for Aerial Networks” In 2022 1st International Conference on 6G Networking (6GNet), 2022, pp. 1–6 DOI: 10.1109/6GNet54646.2022.9830402
  49. Vadim Lyubashevsky “Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures” In Advances in Cryptology – ASIACRYPT 2009, Lecture Notes in Computer Science Berlin, Heidelberg: Springer, 2009, pp. 598–616 DOI: 10.1007/978-3-642-10366-7˙35
  50. Vadim Lyubashevsky, Chris Peikert and Oded Regev “On Ideal Lattices and Learning with Errors Over Rings” URL: https://eprint.iacr.org/undefined/undefined
  51. David McGrew, Michael Curcio and Scott Fluhrer “Leighton-Micali Hash-Based Signatures” Issue: 8554 Num Pages: 61 Series: Request for Comments Published: RFC 8554 RFC Editor, 2019 DOI: 10.17487/RFC8554
  52. Michele Mosca “Cybersecurity in an Era with Quantum Computers: Will We Be Ready?” Conference Name: IEEE Security & Privacy In IEEE Security & Privacy 16.5, 2018, pp. 38–41 DOI: 10.1109/MSP.2018.3761723
  53. Andrew Neish, Todd Walter and Per Enge “Parameter Selection for the TESLA Keychain” ISSN: 2331-5954, 2018, pp. 2155–2171 DOI: 10.33012/2018.15852
  54. “The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli” In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS ’17 New York, NY, USA: Association for Computing Machinery, 2017, pp. 1631–1648 DOI: 10.1145/3133956.3133969
  55. Mario Nicola, Beatrice Motella and Micaela Troglia Gamba “GPS Chimera: A Software Receiver Implementation” ISSN: 2331-5954, 2021, pp. 4264–4273 DOI: 10.33012/2021.18127
  56. “Entanglement-based QKD over LEO satellite-to-ground time-varying atmospheric channel” In Free-Space Laser Communications XXXV 12413 SPIE, 2023, pp. 476–488 DOI: 10.1117/12.2649702
  57. “Open Quantum Safe” In Open Quantum Safe URL: https://openquantumsafe.org/
  58. David Ott, Christopher Peikert and other workshop “Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility” arXiv:1909.07353 [cs] arXiv, 2019 DOI: 10.48550/arXiv.1909.07353
  59. European Parliament “Decision No 1104/2011/EU of the European Parliament and of the Council of 25 October 2011 on the rules for access to the public regulated service provided by the global navigation satellite system established under the Galileo programme” Legislative Body: EP, CONSIL, 2011 URL: https://eur-lex.europa.eu/eli/dec/2011/1104/oj
  60. “Analysis of Network-level Key Exchange Protocols in the Post-Quantum Era” In 2022 IEEE 15th Workshop on Low Temperature Electronics (WOLTE), 2022, pp. 1–4 DOI: 10.1109/WOLTE55422.2022.9882818
  61. “Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction” Journal Abbreviation: Internet Requests for Comments Publication Title: Internet Requests for Comments, 2005
  62. “Security Threat Model Based on Analysis of Foreign National Quantum Programs”, 2021
  63. Thomas Pornin “Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)” Num Pages: 79, 2013 DOI: 10.17487/RFC6979
  64. Richard H. Preston “Applying Grover’s Algorithm to Hash Functions: A Software Perspective” In IEEE Transactions on Quantum Engineering 3, 2022, pp. 1–10 DOI: 10.1109/TQE.2022.3233526
  65. “Request for Comments on Post-Quantum Cryptography Requirements and Evaluation Criteria” In Federal Register, 2016 URL: https://www.federalregister.gov/documents/2016/08/02/2016-18150/request-for-comments-on-post-quantum-cryptography-requirements-and-evaluation-criteria
  66. Ronald L Rivest and Robert D Silverman “Are ‘Strong’ Primes Needed for RSA?”
  67. “Shannon Capacity - an overview — ScienceDirect Topics” URL: https://www.sciencedirect.com/topics/engineering/shannon-capacity
  68. Peter Shor “Algorithms for quantum computation: discrete logarithms and factoring” In Proceedings 35th Annual Symposium on Foundations of Computer Science, 1994, pp. 124–134 DOI: 10.1109/SFCS.1994.365700
  69. Dimitrios Sikeridis, Panos Kampanakis and Michael Devetsikiotis “Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH” In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, CoNEXT ’20 New York, NY, USA: Association for Computing Machinery, 2020, pp. 149–156 DOI: 10.1145/3386367.3431305
  70. Douglas Stebila, Scott Fluhrer and Shay Gueron “Hybrid key exchange in TLS 1.3” Num Pages: 22, 2023 URL: https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design
  71. “Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project” URL: https://eprint.iacr.org/undefined/undefined
  72. “On the Security of RSA with Primes Sharing Least-Significant Bits” In Applicable Algebra in Engineering, Communication and Computing 15.3, 2004, pp. 179–200 DOI: 10.1007/s00200-004-0164-6
  73. “A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography — ACM Computing Surveys” URL: https://dl.acm.org/doi/abs/10.1145/3456629
  74. Bas Westerbaan “Sizing Up Post-Quantum Signatures” In The Cloudflare Blog, 2021 URL: http://blog.cloudflare.com/sizing-up-post-quantum-signatures/
  75. Y.G. Zurabov, K.K. Ivanov and A.D. Kuropyatnikov “COSPAS-SARSAT satellite system” In 3rd International Conference on Satellite Communications (IEEE Cat. No.98TH8392), 1998, pp. 156–158 vol.1 DOI: 10.1109/ICSC.1998.741402

Summary

We haven't generated a summary for this paper yet.

Lightbulb On Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets

This paper has been mentioned in 1 post and received 0 likes.

Don't miss out on important new AI/ML research

See which papers are being discussed right now on X, Reddit, and more:

“Emergent Mind helps me see which AI papers have caught fire online.”

Philip

Philip

Creator, AI Explained on YouTube