Abstract

Cryptography in the form of digital signatures can be a part of the solution to the threat of spoofing and is going to be implemented on Galileo and other Global Navigation Satellite Systems (GNSS). Digital signatures incorporated into the data stream authenticate the integrity of the data as well as the origin of the message. A multitude of signature algorithms already exist. Most are designed for use over the internet where there are fast data rates, high computing power and the option for call and response. Implementing a digital signature on a system such as a Satellite-Based Augmentation System (SBAS) for use in aviation will require the signature to be short, one-way and secure for the next 30 or more years. With the advent of quantum computing, many state-of-the-art authentication schemes are no longer viable, so an authentication scheme implemented in SBAS will need to be quantum secure. This paper introduces the cryptographic primitives (foundational problems) necessary to understand the vulnerabilities in modern day cryptography due to quantum computing and investigates the use of TESLA (Timed Efficient Stream Loss-Tolerant Authentication) and EC-Schnorr algorithms in broadcast systems. A brief introduction to quantum computing and how it will change the field of cryptography is presented followed by attacks on the aforementioned authentication schemes. State of the art quantum resistant authentication algorithms are introduced and compared with the earlier classical cryptographic methods. Finally, recommendations are put forward for the selection and implementation of authentication schemes for SBAS that withstand the threat of quantum computing.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.