+ All Categories
Home > Documents > Satellite Encryption

Satellite Encryption

Date post: 05-Mar-2015
Category:
Upload: mj
View: 237 times
Download: 1 times
Share this document with a friend
23
Satellite Encryption Manisha Jaya(11089C055) B.E. 4 th yr ECE,SCSVMV
Transcript
Page 1: Satellite Encryption

Satellite Encryption

Manisha Jaya(11089C055)B.E. 4th yr

ECE,SCSVMV

Page 2: Satellite Encryption

Satellite -an essential part of telecommunication systems worldwide carrying large amount of data and telephone traffic in addition to television signals.

When we communicate via satellites there is a possibility that an interceptor can interfere and read the message being sent. To prevent this and to send the information in a secure manner we use satellite encryption.

Satellite Encryption explains the need for secure satellite communications, including ways of implementing them, and discusses their implications (in business, government, and warfare).

Introduction

Page 3: Satellite Encryption

Heard about IP SPOOFING??

Still thinking why do we need encryption???

Page 4: Satellite Encryption

IP spoofing is a method of attacking a network in order to gain unauthorized access.

BASIS: Internet communication between distant

computers is routinely handled by routers which find the best route by examining the destination address, but generally ignore the origination address.

The origination address is only used by the destination machine when it responds back to the source.

IP SPOOFING

Page 5: Satellite Encryption

1. Selecting a target host ( or victim).2. The trust relationships are reviewed to identify a

host that has a “trust” relationship with the target host.

3. The trusted host is then disabled and the target’s TCP sequence numbers are sampled.

4. The trusted host is then impersonated, the sequence numbers forged (after being calculated) .

5. A connection attempt is made to a service that only requires address-based authentication (no user id or password).

6. If a successful connection is made, the attacker executes a simple command to leave a backdoor.

Details of an Attack- steps:

Page 6: Satellite Encryption

The IP datagrams containing the forged IP addresses will reach the target intact, IP being a connectionless-oriented protocol which requires no handshaking. Each datagram is sent without concern for the other end.

Fault

Page 7: Satellite Encryption

The attacker cannot “see” what the target host sends, but based on the handshaking procedure, an attacker can predict what the target host will send in response.

Knowing both what has been sent and what the response will be eliminates the need to actually “see” the response.

Calculates ISN(initial sequence number).

HOW CAN THE ATTACKER KNOW ABOUT THE CONVERSATION BETWEEN THE TARGET AND THE SERVER???

Page 8: Satellite Encryption

1.The simplest solution is to not rely upon address-based authentication. This makes remote users use other type of remote connection such as telnet, ssh, or skey.

2. Another possible solution is encrypting all network traffic to avoid source and host destinations from being compromised.

3. The final recommended solution, one proposed by Bellovin in 1989-use random initial sequence numbering.

DEFENSE

Page 9: Satellite Encryption

Satellite Communication Basics

Page 10: Satellite Encryption

The process begins at an earth station--an installation designed to transmit and receive high powered, high frequency (GHz range)signals from a satellite.

The area which receives a signal of useful strength from the satellite is known as the satellite's footprint. The transmission system from the earth station to the satellite is called the uplink, and the system from the satellite to the earth station is called the downlink.

Basics

Page 11: Satellite Encryption

C-band-4 to 8 GHz frequency range, for many satellitecommunications  transmissions,Wi-Fi devices , cordless telephones and  weather radar systems. 

Ku-band-10.95-14.5 GHz-for fixed and broadcast services, and for specific applications such as NASA's Tracking Data Relay Satellite

Ka-band-26.5 to 40 GHz-smallest antenna size.

Satellite Frequency Bands

Page 12: Satellite Encryption

Encryption or scrambling- a system that takes the signal and reconfigures it into something that is unusable without a corresponding decoder. Encryption means secret writing. It is used to hide information and access by unauthorized parties especially during communication in military and national affairs.

Necessity- common knowledge of the encryption process between sender and receiver sharing a secret common element –typically the cryptographic key.

SATELLITE ENCRYPTION:

Page 13: Satellite Encryption

Symmetric encryption or Secret key encryption

Asymmetric encryption -different keys for encryption- the public key & private key.

TYPES OF ENCRYPTION:

Page 14: Satellite Encryption

Confidentiality Authentication Integrity check Digital signature Digital date/time stamp

Satellite encryption provides the following features:

Page 15: Satellite Encryption

UPLINK: highly directional microwave radio -frequency of 3billion to 7billionHZ and power-less than 20000 watts.

Planners-To match the desired scientific investigation with exactly the right encrypted commands requires a good amount of information about the satellite and about the target system. Planners perform this task.

Sequence team :Is responsible for creating the actual encrypted commands to be up linked. Relies on highly advanced computer programs to help with such tasks as selecting and time-tagging the proper encrypted commands, placing them in the correct order, checking that no operating constraints are violated and making sure that all of the instructions to the satellite’s available computer memory .

WORKING OF ENCRYPTION

Page 16: Satellite Encryption

SATELLITE

ORIGINAL MISSION DESIGN

ON GOING MISSION PLANNING

SEQUENCE TEAM

MISSION CONTROL “ACE”-checks proper time for transmitting the encrypted command.

DEEP SPACE NETWORK-data sent electronically using Groud Communication Facility

Page 17: Satellite Encryption

DOWNLINK: Two kinds of results come back on the downlink:

1. Telemetry-onboard measurements that have been converted to encrypted radio signals.

2. Encrypted tracking radio science, and military data-highest priority.

Page 18: Satellite Encryption

Low noise amplifier

Radio receiver

Telemetry processor

DSN (Deep Space Network)

TDS (Telemetry Delivery System)Telemetry is typically stored for the entire life of the mission.

Downlink signal

Page 19: Satellite Encryption

An attacker now wants to interfere in a business communication between two persons. To do this, the attacker must change the router tables so that all E-mail messages between the two person’s computers are forwarded to some intermediate satellite system to which the hacker has easy access. The attacker can then read the messages on this intermediate satellite site, change their contents, and forward them to the original destination as if the intermediate site were legitimately on the message’s path.

IMPLEMENTING ENCRYPTION IN ROBOTS:

Page 20: Satellite Encryption

A message sender may want assurance that the message can only be read by the intended recipient and that it came from alleged sender without being altered en route. A robot can be designed to eliminate this problem.

STEPS INVOLVED: Message to be sent is encrypted Robots sends the message to receiver’s robot Robot does the integrity check and does authentication Robot checks the identity and password It scans the receiver using retina scanner It displays the decrypted message

Encryption

Page 21: Satellite Encryption

Flowchart

Page 22: Satellite Encryption

Encrypted satellite communication can be used in international commerce, commanding ballistic missiles, in future wars it is used to find hidden opponents and battlefields under the sea.

APPLICATIONS:

Page 23: Satellite Encryption

QUERIES???


Recommended