SBMV Protocol

Last updated

SBMV Protocol is an advanced encrypted telemetry that uses short-burst, multi-version technology. [1]

Contents

Telemetry

Telemetry technology enables “the remote measurement and reporting of information”. Telemetry is also a “highly automated communications process by which measurements are made and other data collected at remote or inaccessible points and transmitted to receiving equipment for monitoring, display, and recording.” [2] [3]

Methodology

SBMV technology is based on quantum cryptography, "an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods." [4]

SBMV Protocol encrypts data by quickly breaking text, numerical, and/or image data into tens of thousands of small packets that are then copied into hundreds of thousands of slightly altered versions. This technology renders interception useless because it becomes statistically impossible for the intercepting party to have enough time and computing resources to select which version is the true and correct version among millions of versions of the data. [5]

Origins

SBMV Protocol was first created in 1971 for spacecraft, missile, RPV, oil rig, and chemical plant telemetry and telecommand links by mathematicians David Yeeda and Andrei Krolovich, who formed The Aeorads Company for commercial and military aerospace applications of SBMV technology. New Methods, op cit.

Uses

SBMV technology was further developed with Internet Protocol applications at Wright-Patterson Air Force Base (United States Air Force Research Laboratory) in Ohio, where defense contractor Aeorads Company refined the technology for web-based uses in aircraft, spacecraft, and missiles. A non-classified civilian version of SBMV technology was also created for chemical plants and remote oil rigs and alternative energy wind farms (primarily for offshore and very remote facilities). [6] [7]

Related Research Articles

Encryption Process of converting plaintext to ciphertext

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.

Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks.

Public-key cryptography Cryptographic system with public and private keys

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys. Each pair consists of a public key and a private key. The generation of such key pairs depends on cryptographic algorithms which are based on mathematical problems termed one-way functions. Effective security requires keeping the private key private; the public key can be openly distributed without compromising security.

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).

Telemetry Data and measurements transferred from a remote location to receiving equipment for monitoring

Telemetry is the in situ collection of measurements or other data at remote points and their automatic transmission to receiving equipment (telecommunication) for monitoring. The word is derived from the Greek roots tele, "remote", and metron, "measure". Systems that need external instructions and data to operate require the counterpart of telemetry, telecommand.

Quantum key distribution (QKD) is a secure communication method which implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. It is often incorrectly called quantum cryptography, as it is the best-known example of a quantum cryptographic task.

A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties, but in all cases, the strength of the encryption relies on the security of the key being maintained. A key’s security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange.

In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties. One example of a MITM attack is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within the reception range of an unencrypted Wi-Fi access point could insert themselves as a man-in-the-middle. As it aims to circumvent mutual authentication, a MITM attack can succeed only when the attacker impersonates each endpoint sufficiently well to satisfy their expectations. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, TLS can authenticate one or both parties using a mutually trusted certificate authority.

A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The benefits of a VPN include increases in functionality, security, and management of the private network. It provides access to resources that are inaccessible on the public network and is typically used for remote workers. Encryption is common, although not an inherent part of a VPN connection.

Articles related to cryptography include:

Quantum networks form an important element of quantum computing and quantum communication systems. Quantum networks facilitate the transmission of information in the form of quantum bits, also called qubits, between physically separated quantum processors. A quantum processor is a small quantum computer being able to perform quantum logic gates on a certain number of qubits. Quantum networks work in a similar way to classical networks. The main difference is that quantum networking, like quantum computing, is better at solving certain problems, such as modeling quantum systems.

Phil Karn is a retired American engineer from Lutherville, Maryland. He earned a bachelor's degree in electrical engineering from Cornell University in 1978 and a master's degree in electrical engineering from Carnegie Mellon University in 1979. From 1979 until 1984, Karn worked at Bell Labs in Naperville, Illinois, and Murray Hill, New Jersey. From 1984 until 1991, he was with Bell Communications Research in Morristown, New Jersey. From 1991 through to his retirement, he worked at Qualcomm in San Diego, where he specialized in wireless data networking protocols, security, and cryptography.

Cryptography Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages; various aspects of information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, electrical engineering, communication science, and physics. Applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication. For example, it is impossible to copy data encoded in a quantum state. If one attempts to read the encoded data, the quantum state will be changed due to wave function collapse. This could be used to detect eavesdropping in quantum key distribution (QKD).

Three-stage quantum cryptography protocol

The Three-stage quantum cryptography protocol, also known as Kak's three-stage protocol is a method of data encryption that uses random polarization rotations by both Alice and Bob, the two authenticated parties, that was proposed by Subhash Kak. In principle, this method can be used for continuous, unbreakable encryption of data if single photons are used. It is different from methods of QKD for it can be used for direct encryption of data, although it could also be used for exchanging keys.

Ground segment Ground-based elements of a spacecraft system

A ground segment consists of all the ground-based elements of a spacecraft system used by operators and support personnel, as opposed to the space segment and user segment. The ground segment enables management of a spacecraft, and distribution of payload data and telemetry among interested parties on the ground. The primary elements of a ground segment are:

XML Telemetric and Command Exchange XML based data exchange format for spacecraft telemetry and command meta-data

XTCE is an XML based data exchange format for spacecraft telemetry and command meta-data. Using XTCE the format and content of a space systems command and telemetry links can be readily exchanged between spacecraft operators and manufacturers. XTCE was originally standardized by the OMG. In April 2007 the OMG released revision 1.1 of XTCE as an OMG available specification. Version 1.0 of the XTCE specification is a CCSDS green-book specification and version 1.1 has been adopted as a CCSDS blue-book specification.

Quantum Experiments at Space Scale, is a Chinese research project in the field of quantum physics.

DARPA Quantum Network

The DARPA Quantum Network (2002–2007) was the world's first quantum key distribution (QKD) network, operating 10 optical nodes across Boston and Cambridge, Massachusetts. It became fully operational on October 23, 2003 in BBN's laboratories, and in June 2004 was fielded through dark fiber under the streets of Cambridge and Boston, where it ran continuously for over 3 years. The project also created and fielded the world's first superconducting nanowire single-photon detector. It was sponsored by DARPA as part of the QuIST program, and built and operated by BBN Technologies in close collaboration with colleagues at Harvard University and the Boston University Photonics Center.

Y.3800 Computer networking standard

Y.3800 is an ITU-T Recommendation with the long name "Overview on networks supporting quantum key distribution", that gives an overview of networks supporting quantum key distribution (QKD) cryptographic protocols.

References

  1. “New Methods for Advanced Encryption of Spacecraft and Missile Telemetry and Telecommand Links”, Rueppel, R. A., Int’l Telemetry J., 1999 March 1; 165-66.
  2. Telemetry, Encyclopædia Britannica, 2009
  3. Telemetry, Merriam-Webster Dictionary, 2009
  4. Hughes, R. J.; Buttler, W. T. (May 2000), "Free-space quantum cryptography in daylight, Proc. SPIE Vol. 3932, p. 117-126" (PDF), Free-Space Laser Communication Technologies Xii, Free-Space Laser Communication Technologies XII, G. Stephen Mecherle, Ed., 3932: 117, Bibcode:2000SPIE.3932..117H, doi:10.1117/12.384303, S2CID   109330537
  5. Rueppel, R. A.; Bader, H. P. (March 1985), "Methods and Standards for Encryption of Spacecraft Telemetry and Telecommand Links", NASA Sti/Recon Technical Report N, Final Report, Eidgenoessische Technische Hochschule, Zurich (Switzerland). Inst. fuer Fernmeldetechnik, 87: 10112, Bibcode:1985STIN...8710112R
  6. D. Yeeda Presentation at the 4th Annual U.S. Missile Defense Conference of The American Institute of Aeronautics and Astronautics
  7. Yeeda, D.; Krolovich, A. (June 1, 2006), "SBMV and IP Protocols", Int'l Telemetry J.: 14–16