Can Homomorphic Encryption Reduce the Security Risks in Telemetry Post Processing Environments?
disk level encryption
file level encryption
MetadataShow full item record
AbstractHomomorphic encryption [1, 2] is a branch of cryptography in which data transformation operations can be performed on already encrypted data—promising better protection of data as the data no longer needs to be decrypted in order for specific analysis operations to be performed. Thus, better security is achieved by absolutely minimizing the amount of time sensitive data is potentially exposed. After reviewing homomorphic encryption principles, system level architectures will be presented discussing where homomorphic encryption may best fit in the generally accepted data security taxonomy involving disk, file, and application encryption. Emphasis will be placed on application to telemetry post-processing environments.
SponsorsInternational Foundation for Telemetering
Showing items related by title, author, creator and subject.
ENCRYPTED BIT ERROR RATE TESTINGGuadiana, Juan M.; Macias, Fil; Naval Surface Warfare Center; White Sands Missile Range (International Foundation for Telemetering, 2002-10)End-to-End testing is a tool for verifying that Range Telemetry (TM) System Equipment will deliver satisfactory performance throughout a planned flight test. A thorough test verifies system thresholds while gauging projected mission loading all in the presence of expected interference. At the White Sands Missile Range (WSMR) in New Mexico, system tests are routinely conducted by Range telemetry Engineers and technicians in the interest of ensuring highly reliable telemetry acquisition. Even so, flight or integration tests are occasionally halted, unable to complete these telemetry checks. The Navy Standard Missile Program Office and the White Sands Missile Range, have proactively conducted investigations to identify and eliminate problems. A background discussion is provided on the serious problems with the launcher acquisition, which were resolved along the way laying the ground work for effective system testing. Since there were no provisions to test with the decryption equipment an assumption must be made. Encryption is operationally transparent and reliable. Encryption has wide application, and for that reason the above assumption must be made with confidence. A comprehensive mission day encrypted systems test is proposed. Those involved with encrypted telemetry systems, and those experiencing seemingly unexplainable data degradations and other problems with or without encryption should review this information.
FLEXIBLE SECURE DATA COMMUNICATIONS WITH THE RANGE ENCRYPTION MODULEWatkins, Stan M.; L3 Communications Corp. (International Foundation for Telemetering, 1999-10)This paper discusses the design, application and flexibility of the Range Encryption Module (REM) developed by L3 Communications Conic Division for the Range Application Joint Program Office (RAJPO) located at Eglin Air Force Base in Florida. The REM is a burst encrypter that utilizes the National Security Agency Thornton CTIC/DS- 101 Hybrid (CDH) encryption algorithm. The CDH device operates under the control of a Conic-designed digital ASIC. The CDH, ASIC, Power Management and parallel bus interface circuits reside on a single card within the REM called the Common Encryption Core (CEC). The REM and CEC card within the REM offer flexibility in many operational features, as described below.
FLIGHT TERMINATION COMMAND AUTHENTICATION USING BLOCK ENCRYPTIONArce, Dennis; Bourne Technologies, Inc. (International Foundation for Telemetering, 2002-10)Next generation flight termination systems (FTSs) will use digital technologies to verify the authenticity of range safety commands by command receiver-decoders located on each vehicle. This paper will discuss the general principles behind simplex message authentication using a block encryption cipher, and presents examples for demonstration.