Can Homomorphic Encryption Reduce the Security Risks in Telemetry Post Processing Environments?
disk level encryption
file level encryption
MetadataShow full item record
AbstractHomomorphic encryption [1, 2] is a branch of cryptography in which data transformation operations can be performed on already encrypted data—promising better protection of data as the data no longer needs to be decrypted in order for specific analysis operations to be performed. Thus, better security is achieved by absolutely minimizing the amount of time sensitive data is potentially exposed. After reviewing homomorphic encryption principles, system level architectures will be presented discussing where homomorphic encryption may best fit in the generally accepted data security taxonomy involving disk, file, and application encryption. Emphasis will be placed on application to telemetry post-processing environments.
SponsorsInternational Foundation for Telemetering
Showing items related by title, author, creator and subject.
Secure IP Multicasting with Encryption Key ManagementDean, Richard; Maharjan, Nadim; Moten, Daryl; Morgan State University (International Foundation for Telemetering, 2011-10)This paper presents the design for secure IP multicasting in an iNet environment using public key cryptography. Morgan State University has been conducting research to improve the telemetry network by improving network performance, implementing IP (Internet Protocol) multicasting and providing a stronger security system for the iNet environment. The present study describes how IP multicasting could be implemented to provide more secure communication in the iNet environment by reducing traffic and optimizing network performance. The multicast of data is closely tied to the key management center for secure applications. This paper develops a means of delivering keys between two or more parties showing a relationship between the multicast network and the Key Management Center (KMC). The KMC is an element of the system which distributes and manages session keys among multicast members. A public key encryption method is used to address the distribution of session keys in the multicast network. The paper will present a system level design of multicast and key management with dual encryption of session keys for the iNet system.
FLIGHT TERMINATION COMMAND AUTHENTICATION USING BLOCK ENCRYPTIONArce, Dennis; Bourne Technologies, Inc. (International Foundation for Telemetering, 2002-10)Next generation flight termination systems (FTSs) will use digital technologies to verify the authenticity of range safety commands by command receiver-decoders located on each vehicle. This paper will discuss the general principles behind simplex message authentication using a block encryption cipher, and presents examples for demonstration.
Best Source Selection on Encrypted DataGuadiana, Juan M.; White Sands Missile Range (International Foundation for Telemetering, 2006-10)The size of the range at White Sands means multiple acquisition sites are needed to properly cover a typical vehicle trajectory. As vehicle complexity increase, the need for robust acquisition grows. Multiple acquisition sites are needed to provide as complete coverage as practical. Space Diversity combining would provide a single composite source for all the displays and recording, but this is not practical due to the large distances between acquisition sites. Instead a composite is made from the various sites by correlation on non-encrypted (or decrypted) data. The previous best source selector, a frame synch histogrammer, could produce encrypted and decrypted composites. Some of our customers have missed the encrypted composites, hence the subject is revisited to encourage development. This paper reviews post decryption correlation and then focuses on correlating on encrypted data. The encryption serves to eliminate the ambiguities that are inherent in decrypted (nonencrypted) signals. So, it may be possible to accomplish this with a small correlator. The expected performance would be similar to that of correlated composites on decrypted or unencrypted data. The typical configuration would be considerably smaller as well since only two decrypters would be needed. One decrypter alone would be insufficient and could not resolve the case where only one site has data and the remaining sites have noise. When there is no correlation the correct site cannot be resolved. Testing these compositing methods is also discussed, as a good test method also provides insight on how the compositor should work.