Assessment of cryptographic approaches for a quantum-resistant Galileo OSNMA (2312.11080v2)
Abstract: Quantum computing becomes more of a reality as time passes, bringing several cybersecurity challenges. Modern cryptography is based on the computational complexity of specific mathematical problems, but as new quantum-based computers appear, classical methods might not be enough to secure communications. In this paper, we analyse the state of the Galileo Open Service Navigation Message Authentication (OSNMA) to overcome these new threats. This analysis and its assessment have been performed using OSNMA documentation, reviewing the available Post Quantum Cryptography (PQC) algorithms competing in the National Institute of Standards and Technology (NIST) standardization process, and studying the possibility of its implementation in the Galileo service. The main barrier to adopting the PQC approach is the size of both the signature and the key. The analysis shows that OSNMA is not yet prepared to face the quantum threat, and a significant change would be required. This work concludes by assessing different temporal countermeasures that can be implemented to sustain the system's integrity in the short term.
- “CARAMUEL: The future of Space Quantum Key Distribution in GEO” In 2022 IEEE International Conference on Space Optical Systems and Applications (ICSOS), 2022, pp. 57–65 DOI: 10.1109/ICSOS53063.2022.9749720
- Jean-Philippe Aumasson, Daniel J. Bernstein and Ward Beullens “SPHINCS+. Submission to the NIST post-quantum project, v.3.1”, 2022 URL: https://sphincs.org/data/sphincs+-r3.1-specification.pdf
- European GNSS Supervisory Authority. “European GNSS (Galileo) Open Service Signal-In_Space Interface Control Document Issue 2.0”, 2021 URL: https://www.gsc-europa.eu/sites/default/files/sites/all/files/Galileo_OS_SIS_ICD_v2.0.pdf
- European GNSS Supervisory Authority. “Galileo - Open Service - Service Definition Document”, 2021 URL: https://www.gsc-europa.eu/sites/default/files/sites/all/files/Galileo-OS-SDD_v1.2.pdf
- “CRYSTALS-Kyber. Algorithm Specifications And Supporting Documentation”, 2021
- “CRYSTALS-Dilithium. Algorithm Specifications and Supporting Documentation (Version 3.1)”, 2021
- “Regulated applications for the road transportation infrastructure: The case study of the smart tachograph in the European Union” In International Journal of Critical Infrastructure Protection 21, 2018, pp. 3–21 DOI: 10.1016/j.ijcip.2018.02.001
- Elaine B. Barker and Quynh H. Dang “Recommendation for Key Management Part 3: Application-Specific Key Management Guidance”, 2015, pp. NIST SP 800–57Pt3r1 DOI: 10.6028/NIST.SP.800-57Pt3r1
- “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile” Num Pages: 151, 2008 DOI: 10.17487/RFC5280
- Johannes Buchmann, Erik Dahmen and Michael Schneider “Merkle Tree Traversal Revisited” In Post-Quantum Cryptography, Lecture Notes in Computer Science Berlin, Heidelberg: Springer, 2008, pp. 63–78 DOI: 10.1007/978-3-540-88403-3˙5
- “An efficient key recovery attack on SIDH” Report Number: 975, 2022 URL: https://eprint.iacr.org/2022/975
- Sofía Celi “The post-quantum state: a taxonomy of challenges” In The Cloudflare Blog, 2022 URL: http://blog.cloudflare.com/post-quantum-taxonomy/
- European GNSS Service Centre “Services — European GNSS Service Centre” URL: https://www.gsc-europa.eu/galileo/services
- “Satellite Navigation Signal Authentication in GNSS: A Survey on Technology Evolution, Status, and Perspective for BDS” Number: 5 Publisher: Multidisciplinary Digital Publishing Institute In Remote Sensing 15.5, 2023, pp. 1462 DOI: 10.3390/rs15051462
- European Commision “EU Space Strategy for Security and Defence” URL: https://defence-industry-space.ec.europa.eu/eu-space-strategy-security-and-defence_en
- Information Technology Laboratory Computer Security Division “Post-Quantum Cryptography Standardization - Post-Quantum Cryptography — CSRC — CSRC” In CSRC — NIST, 2017 URL: https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization
- Information Technology Laboratory Computer Security Division “Round 4 Submissions - Post-Quantum Cryptography — CSRC — CSRC” In CSRC — NIST, 2017 URL: https://csrc.nist.gov/projects/post-quantum-cryptography/round-4-submissions
- Information Technology Laboratory Computer Security Division “Selected Algorithms 2022 - Post-Quantum Cryptography — CSRC — CSRC” In CSRC — NIST, 2017 URL: https://csrc.nist.gov/projects/post-quantum-cryptography/selected-algorithms-2022
- Information Technology Laboratory Computer Security Division “Stateful Hash-Based Signatures — CSRC — CSRC” In CSRC — NIST, 2018 URL: https://csrc.nist.gov/projects/stateful-hash-based-signatures
- Information Technology Laboratory Computer Security Division “Announcing PQC Candidates to be Standardized, Plus Fourth Round Candidates — CSRC” In CSRC — NIST, 2022 URL: https://csrc.nist.gov/News/2022/pqc-candidates-to-be-standardized-and-round-4
- Sabine Dahmen-Lhuissier “Quantum-Safe Cryptography (QSC)” In ETSI URL: https://www.etsi.org/technologies/quantum-safe-cryptography
- “Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication” Conference Name: IEEE Access In IEEE Access 10, 2022, pp. 21941–21954 DOI: 10.1109/ACCESS.2022.3152895
- European GNSS Supervisory Authority. “GALILEO Open Service Navigation Message Authentication (OSNMA) receiver guidelines for the test phase: issue 1.0, November 2021.” LU: Publications Office, 2021 URL: https://data.europa.eu/doi/10.2878/230609
- European GNSS Supervisory Authority. “Galileo Open Service Navigation Message Authentication (OSNMA): Signal in Space Interface Control Document (SIS ICD) : Issue 1.0, December 2022.” LU: Publications Office, 2022 URL: https://data.europa.eu/doi/10.2878/594840
- “Introducing CIRCL: An Advanced Cryptographic Library” Cloudflare, 2019
- “Semi-Assisted Signal Authentication based on Galileo ACAS” arXiv:2204.14026 [cs, eess] arXiv, 2022 DOI: 10.48550/arXiv.2204.14026
- “Galileo high accuracy service: initial definition and performance” In GPS Solutions 26.3, 2022, pp. 65 DOI: 10.1007/s10291-022-01247-x
- “PPP/PPP-RTK Message Authentication” In NAVIGATION: Journal of the Institute of Navigation 70.2, 2023 DOI: 10.33012/navi.579
- “Semi-Assisted Signal Authentication for Galileo: Proof of Concept and Results” Conference Name: IEEE Transactions on Aerospace and Electronic Systems In IEEE Transactions on Aerospace and Electronic Systems, 2023, pp. 1–13 DOI: 10.1109/TAES.2023.3243587
- Ignacio Fernández-Hernández, Tomer Ashur and Vincent Rijmen “Analysis and recommendations for MAC and key lengths in delayed disclosure GNSS authentication protocols” Publisher: Institute of Electrical and Electronics Engineers In IEEE Transactions on Aerospace and Electronic Systems 57.3, 2021, pp. 1827–1839
- Federal Office Information Security (BSI) “Quantum-safe cryptography – fundamentals, current developments and recommendations”, BSI-Bro21/01 URL: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.html
- “Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU”, 2020
- “Bootstrapping Timed Efficient Stream Loss-Tolerant Authentication (TESLA)” Num Pages: 18, 2006 DOI: 10.17487/RFC4442
- “Benefit of GNSS multiconstellation in position and velocity domain” In 2015 IEEE Metrology for Aerospace (MetroAeroSpace), 2015, pp. 9–14 DOI: 10.1109/MetroAeroSpace.2015.7180618
- Steven D. Galbraith and Frederik Vercauteren “Computational problems in supersingular elliptic curve isogenies” In Quantum Information Processing 17.10, 2018, pp. 265 DOI: 10.1007/s11128-018-2023-6
- “Galileo Services — EU Agency for the Space Programme” URL: https://www.euspa.europa.eu/galileo/services
- “How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits” arXiv:1905.09749 [quant-ph] In Quantum 5, 2021, pp. 433 DOI: 10.22331/q-2021-04-15-433
- Lov K. Grover “A fast quantum mechanical algorithm for database search” arXiv:quant-ph/9605043 arXiv, 1996 DOI: 10.48550/arXiv.quant-ph/9605043
- Jeffrey Hoffstein, Jill Pipher and Joseph H. Silverman “NTRU: A ring-based public key cryptosystem” In Algorithmic Number Theory, Lecture Notes in Computer Science Berlin, Heidelberg: Springer, 1998, pp. 267–288 DOI: 10.1007/BFb0054868
- “Cryptanalysis Against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations” In Topics in Cryptology – CT-RSA 2018, Lecture Notes in Computer Science Cham: Springer International Publishing, 2018, pp. 198–218 DOI: 10.1007/978-3-319-76953-0˙11
- “XMSS: eXtended Merkle Signature Scheme” Issue: 8391 Num Pages: 74 Series: Request for Comments Published: RFC 8391 RFC Editor, 2018 DOI: 10.17487/RFC8391
- Andreas Hülsing “WOTS+ – Shorter Signatures for Hash-Based Signature Schemes” Report Number: 965, 2017 URL: https://eprint.iacr.org/2017/965
- GlobalSign Inc “GlobalSign Root Certificates :” In GlobalSign Support, 2022 URL: https://support.globalsign.com/ca-certificates/root-certificates/globalsign-root-certificates
- “Transitioning organizations to post-quantum cryptography” Number: 7909 Publisher: Nature Publishing Group In Nature 605.7909, 2022, pp. 237–243 DOI: 10.1038/s41586-022-04623-2
- Hugo Krawczyk, Mihir Bellare and Ran Canetti “HMAC: Keyed-Hashing for Message Authentication” Num Pages: 11, 1997 DOI: 10.17487/RFC2104
- “TLS Post-Quantum Experiment” In The Cloudflare Blog, 2019 URL: http://blog.cloudflare.com/the-tls-post-quantum-experiment/
- Richard B. Langley, Peter J.G. Teunissen and Oliver Montenbruck “Introduction to GNSS” In Springer Handbook of Global Navigation Satellite Systems, Springer Handbooks Cham: Springer International Publishing, 2017, pp. 3–23 DOI: 10.1007/978-3-319-42928-1˙1
- Martin Andreoni Lopez, Guilherme N.N. Barbosa and Diogo M.F. Mattos “New Barriers on 6G Networking: An Exploratory Study on the Security, Privacy and Opportunities for Aerial Networks” In 2022 1st International Conference on 6G Networking (6GNet), 2022, pp. 1–6 DOI: 10.1109/6GNet54646.2022.9830402
- Vadim Lyubashevsky “Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures” In Advances in Cryptology – ASIACRYPT 2009, Lecture Notes in Computer Science Berlin, Heidelberg: Springer, 2009, pp. 598–616 DOI: 10.1007/978-3-642-10366-7˙35
- Vadim Lyubashevsky, Chris Peikert and Oded Regev “On Ideal Lattices and Learning with Errors Over Rings” URL: https://eprint.iacr.org/undefined/undefined
- David McGrew, Michael Curcio and Scott Fluhrer “Leighton-Micali Hash-Based Signatures” Issue: 8554 Num Pages: 61 Series: Request for Comments Published: RFC 8554 RFC Editor, 2019 DOI: 10.17487/RFC8554
- Michele Mosca “Cybersecurity in an Era with Quantum Computers: Will We Be Ready?” Conference Name: IEEE Security & Privacy In IEEE Security & Privacy 16.5, 2018, pp. 38–41 DOI: 10.1109/MSP.2018.3761723
- Andrew Neish, Todd Walter and Per Enge “Parameter Selection for the TESLA Keychain” ISSN: 2331-5954, 2018, pp. 2155–2171 DOI: 10.33012/2018.15852
- “The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli” In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS ’17 New York, NY, USA: Association for Computing Machinery, 2017, pp. 1631–1648 DOI: 10.1145/3133956.3133969
- Mario Nicola, Beatrice Motella and Micaela Troglia Gamba “GPS Chimera: A Software Receiver Implementation” ISSN: 2331-5954, 2021, pp. 4264–4273 DOI: 10.33012/2021.18127
- “Entanglement-based QKD over LEO satellite-to-ground time-varying atmospheric channel” In Free-Space Laser Communications XXXV 12413 SPIE, 2023, pp. 476–488 DOI: 10.1117/12.2649702
- “Open Quantum Safe” In Open Quantum Safe URL: https://openquantumsafe.org/
- David Ott, Christopher Peikert and other workshop “Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility” arXiv:1909.07353 [cs] arXiv, 2019 DOI: 10.48550/arXiv.1909.07353
- European Parliament “Decision No 1104/2011/EU of the European Parliament and of the Council of 25 October 2011 on the rules for access to the public regulated service provided by the global navigation satellite system established under the Galileo programme” Legislative Body: EP, CONSIL, 2011 URL: https://eur-lex.europa.eu/eli/dec/2011/1104/oj
- “Analysis of Network-level Key Exchange Protocols in the Post-Quantum Era” In 2022 IEEE 15th Workshop on Low Temperature Electronics (WOLTE), 2022, pp. 1–4 DOI: 10.1109/WOLTE55422.2022.9882818
- “Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction” Journal Abbreviation: Internet Requests for Comments Publication Title: Internet Requests for Comments, 2005
- “Security Threat Model Based on Analysis of Foreign National Quantum Programs”, 2021
- Thomas Pornin “Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)” Num Pages: 79, 2013 DOI: 10.17487/RFC6979
- Richard H. Preston “Applying Grover’s Algorithm to Hash Functions: A Software Perspective” In IEEE Transactions on Quantum Engineering 3, 2022, pp. 1–10 DOI: 10.1109/TQE.2022.3233526
- “Request for Comments on Post-Quantum Cryptography Requirements and Evaluation Criteria” In Federal Register, 2016 URL: https://www.federalregister.gov/documents/2016/08/02/2016-18150/request-for-comments-on-post-quantum-cryptography-requirements-and-evaluation-criteria
- Ronald L Rivest and Robert D Silverman “Are ‘Strong’ Primes Needed for RSA?”
- “Shannon Capacity - an overview — ScienceDirect Topics” URL: https://www.sciencedirect.com/topics/engineering/shannon-capacity
- Peter Shor “Algorithms for quantum computation: discrete logarithms and factoring” In Proceedings 35th Annual Symposium on Foundations of Computer Science, 1994, pp. 124–134 DOI: 10.1109/SFCS.1994.365700
- Dimitrios Sikeridis, Panos Kampanakis and Michael Devetsikiotis “Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH” In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, CoNEXT ’20 New York, NY, USA: Association for Computing Machinery, 2020, pp. 149–156 DOI: 10.1145/3386367.3431305
- Douglas Stebila, Scott Fluhrer and Shay Gueron “Hybrid key exchange in TLS 1.3” Num Pages: 22, 2023 URL: https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design
- “Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project” URL: https://eprint.iacr.org/undefined/undefined
- “On the Security of RSA with Primes Sharing Least-Significant Bits” In Applicable Algebra in Engineering, Communication and Computing 15.3, 2004, pp. 179–200 DOI: 10.1007/s00200-004-0164-6
- “A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography — ACM Computing Surveys” URL: https://dl.acm.org/doi/abs/10.1145/3456629
- Bas Westerbaan “Sizing Up Post-Quantum Signatures” In The Cloudflare Blog, 2021 URL: http://blog.cloudflare.com/sizing-up-post-quantum-signatures/
- Y.G. Zurabov, K.K. Ivanov and A.D. Kuropyatnikov “COSPAS-SARSAT satellite system” In 3rd International Conference on Satellite Communications (IEEE Cat. No.98TH8392), 1998, pp. 156–158 vol.1 DOI: 10.1109/ICSC.1998.741402
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Collections
Sign up for free to add this paper to one or more collections.