[Sls-sea-dls] Key Verification using CRC & OTAR Issue
Daniel.Fischer at esa.int
Daniel.Fischer at esa.int
Wed Apr 20 06:39:44 UTC 2016
Dear all,
In order to adopt the key verification that contains a computation of the
CRC over the Key ID and the key instead of just the key, there is no
change necessary in the PDU. Thus, I would almost make this an
implementation specific thing. Some implementers may prefer to compute the
CRC just over the key, others may want to compute it over the Key ID and
the Key. We could cover this choice with a note. Regarding the latest mail
from Craig, would the concerns not also be valid if only the key is used
for the generation of the CRC?
I am not really in favour in formalising a "meta key" as well. In my
opinion, the way how the key, key ID, and CRC are generated and stored is
not something the blue book should address.
I have another problem that I want to share with you :):
In Cleveland, we have agreed that with OTAR the MAC is only computed over
the set of [Key Id, Encrypted Key] blocks. This is fine. However, I now
have problems with the baseline mode of the key encryption. If I choose
AES-CTR (the recommended one as per algorithm BB) we need to transmit an
IV for every key. I don't think that this is what we want, is it?
Especially not for random data like a key. Any suggestions? The BB allows
other modes if carefully considered. However, modes like CBC also require
an IV. I am a bit reluctant to go for something as dangerous as ECB
although it should not be a problem for keys.
Cheers,
Daniel
Dr. Daniel Fischer
----------------------------
Data Systems Manager
Ground Segment Engineering Support Office (OPS-GE)
Ground Systems Engineering Department
Directorate of Operations
European Space Agency - ESOC
Robert-Bosch-Str. 5
D-64293 Darmstadt - Germany
Tel: +49 (0) 6151 90 2718 - Fax: +49 (0) 6151 90 2718
Web: http://www.esa.int
From: "Biggerstaff, Craig (JSC-CD221)[LOCKHEED MARTIN CORP]"
<craig.biggerstaff at nasa.gov>
To: "Moury Gilles" <Gilles.Moury at cnes.fr>, "Weiss, Howard"
<Howard.Weiss at parsons.com>, "Saba Bruno" <Bruno.Saba at cnes.fr>,
"Daniel.Fischer at esa.int" <Daniel.Fischer at esa.int>,
"sls-sea-dls at mailman.ccsds.org" <sls-sea-dls at mailman.ccsds.org>
Date: 19/04/2016 15:49
Subject: RE: [Sls-sea-dls] Key Verification using CRC
Sent by: sls-sea-dls-bounces at mailman.ccsds.org
Bruno?s proposal is a good technical solution by itself, but I have
concerns about introducing additional requirements into ground crypto
systems for generation and storage of meta-keys.
The CRC may not itself be a critical security parameter in the FIPS 140
sense (I think it is not, but I defer to others? judgment in this), but
generation of the CRC requires access to critical security parameters,
both the Key ID and the actual key itself. So CRC generation would have
to be performed within a validated crypto system, even if it were
permissible to transmit and store the CRC outside the crypto system.
If Bruno?s proposal were adopted as-is, it appears unlikely to me that any
generic, commercially-available crypto systems could satisfy the
requirement. For flight systems, this may not be an issue since flight
implementations tend to be custom by their very nature. On the other
hand, ground systems that otherwise might be able to integrate
commercially-available crypto systems would be forced into procuring
custom implementations requiring e.g. FIPS 140 validation along with its
additional time and expense.
Craig
From: sls-sea-dls-bounces at mailman.ccsds.org [
mailto:sls-sea-dls-bounces at mailman.ccsds.org] On Behalf Of Moury Gilles
Sent: Tuesday, April 19, 2016 3:46 AM
To: Weiss, Howard <Howard.Weiss at parsons.com>; Saba Bruno
<Bruno.Saba at cnes.fr>; Daniel.Fischer at esa.int;
sls-sea-dls at mailman.ccsds.org
Subject: RE: [Sls-sea-dls] Key Verification using CRC
Shall we adopt Bruno?s proposal ? In that case, we probably do not need
the challenge-response transaction.
Gilles
Gilles MOURY
CNES Toulouse
De : sls-sea-dls-bounces at mailman.ccsds.org [
mailto:sls-sea-dls-bounces at mailman.ccsds.org] De la part de Weiss, Howard
Envoyé : lundi 18 avril 2016 19:27
À : Saba Bruno; Daniel.Fischer at esa.int; sls-sea-dls at mailman.ccsds.org
Objet : RE: [Sls-sea-dls] Key Verification using CRC
I agree with Bruno.
Howie
Howard Weiss
Technical Director
PARSONS
7110 Samuel Morse Drive
Columbia, MD 21046
443-430-8089 (office)
410-262-1479 (cell)
443-430-8238 (fax)
howard.weiss at parsons.com
www.parsons.com
Please consider the environment before printing this message
From: sls-sea-dls-bounces at mailman.ccsds.org
[sls-sea-dls-bounces at mailman.ccsds.org] on behalf of Saba Bruno
[Bruno.Saba at cnes.fr]
Sent: Monday, April 18, 2016 9:48 AM
To: Daniel.Fischer at esa.int; sls-sea-dls at mailman.ccsds.org
Subject: RE: [Sls-sea-dls] Key Verification using CRC
Dear all,
One solution to avoid the use of a challenge-response system and stay with
the simple CRC for on-board key checking is to compute the CRC on BOTH the
Key-ID and the key itself.
Ideally, what we know as a ?key? would be a ?Meta-Key?, comprising :
- The Key ID, unique identifier of the key for the whole mission
duration,
- The Key itself (secret random data)
- The CRC, computed on the Key ID and the key itself.
This ?Meta-Key? should be considered as an single entity, not splittable,
being stored, transferred and distributed as is (on-board AND at ground
level, from generation to destruction).
Cheers,
Bruno Saba
CNES
DCT/TV/IN
18 Avenue Edouard Belin
31401 TOULOUSE Cedex 9
Tel : + 33 (0) 5 61 28 28 76
Fax : + 33 (0) 5 61 28 19 96
De : sls-sea-dls-bounces at mailman.ccsds.org [
mailto:sls-sea-dls-bounces at mailman.ccsds.org] De la part de
Daniel.Fischer at esa.int
Envoyé : dimanche 17 avril 2016 13:13
À : sls-sea-dls at mailman.ccsds.org
Objet : [Sls-sea-dls] Key Verification using CRC
Dear all,
I was discussing our new approach to key verification using the
onboard-stored CRCs with David,
He came up with a keen observation.
The CRC-based key verification is somewhat weaker than one based on a
challenge-response. The reason is that the CRC ensues you that the key at
a certain slot is still OK in terms of integrity. In contrast to the
challenge-response approach it DOES NOT tell you that the key is the same
as the key with same key ID on ground.
Is this an issue for us? What do you think? The only way we have to check
key synchronisation is to use a key for actual traffic protection and see
if it works.
What do you think?
Cheers
Daniel
Dr. Daniel Fischer
----------------------------
Data Systems Manager
Ground Segment Engineering Support Office (OPS-GE)
Ground Systems Engineering Department
Directorate of Operations
European Space Agency - ESOC
Robert-Bosch-Str. 5
D-64293 Darmstadt - Germany
Tel: +49 (0) 6151 90 2718 - Fax: +49 (0) 6151 90 2718
Web: http://www.esa.int[esa.int]
This message and any attachments are intended for the use of the addressee
or addressees only.
The unauthorised disclosure, use, dissemination or copying (either in
whole or in part) of its
content is not permitted.
If you received this message in error, please notify the sender and delete
it from your system.
Emails can be altered and their integrity cannot be guaranteed by the
sender.
Please consider the environment before printing this email.
_______________________________________________
SLS-SEA-DLS mailing list
SLS-SEA-DLS at mailman.ccsds.org
http://mailman.ccsds.org/cgi-bin/mailman/listinfo/sls-sea-dls
This message and any attachments are intended for the use of the addressee or addressees only.
The unauthorised disclosure, use, dissemination or copying (either in whole or in part) of its
content is not permitted.
If you received this message in error, please notify the sender and delete it from your system.
Emails can be altered and their integrity cannot be guaranteed by the sender.
Please consider the environment before printing this email.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.ccsds.org/pipermail/sls-sea-dls/attachments/20160420/92288a86/attachment.html>
More information about the SLS-SEA-DLS
mailing list