Communications in Cryptology IACR CiC

Cryptography is Rocket Science

Analysis of BPSec

Authors

Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri
Benjamin Dowling ORCID
King's College London, United Kingdom
benjamin dot dowling at kcl dot ac dot uk
Britta Hale ORCID
Naval Postgraduate School, United States
britta dot hale at nps dot edu
Xisen Tian ORCID
Naval Postgraduate School, United States
xisen dot tian1 at nps dot edu
Bhagya Wimalasiri ORCID
University of Sheffield, United Kingdom
b dot m dot wimalasiri at sheffield dot ac dot uk

Abstract

Space networking has become an increasing area of development with the advent of commercial satellite networks such as those hosted by Starlink and Kuiper, and increased satellite and space presence by governments around the world. Yet, historically such network designs have not been made public, leading to limited formal cryptographic analysis of the security offered by them. One of the few public protocols used in space networking is the Bundle Protocol, which is secured by Bundle Protocol Security (BPSec), an Internet Engineering Task Force (IETF) standard. We undertake a first analysis of BPSec under its default security context, building a model of the secure channel security goals stated in the IETF standard, and note issues therein with message loss detection. We prove BPSec secure, and also provide a stronger construction, one that supports the Bundle Protocol's functionality goals while also ensuring destination awareness of missing message components.

References

[ACSA11]
Naveed Ahmad, Haitham Cruickshank, Zhili Sun, and Muhammad Asif. Pseudonymised communication in delay tolerant networks. In 2011 Ninth Annual International Conference on Privacy, Security and Trust, pages 1-6. 2011. DOI: 10.1109/PST.2011.5971956
[AKG+07]
N. Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott, and Cheng Luo. Applicability of identity-based cryptography for disruption-tolerant networking. In Proceedings of the 1st International MobiSys Workshop on Mobile Opportunistic Networking, pages 52–56. 2007. Association for Computing Machinery. DOI: 10.1145/1247694.1247705
[BBC17]
Fatima Zohra Benhamida, Abdelmadjid Bouabdellah, and Yacine Challal. Using delay tolerant network for the Internet of Things: Opportunities and challenges. In 2017 8th International Conference on Information and Communication Systems (ICICS), pages 252-257. 2017. DOI: 10.1109/IACS.2017.7921980
[BFB22]
Scott Burleigh, Kevin Fall, and Edward J. Birrane. Bundle Protocol Version 7. RFC 9171. January 2022.
[BFR08]
Scott C. Burleigh, Stephen Farrell, and Manikantan Ramadas. Licklider Transmission Protocol - Specification. RFC 5326. September 2008.
[BH17]
Colin Boyd and Britta Hale. Secure Channels and Termination: The Last Word on TLS. In Latincrypt. 2017.
[BHMS16]
Colin Boyd, Britta Hale, Stig Frode Mjølsnes, and Douglas Stebila. From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. In Proceedings of the RSA Conference on Topics in Cryptology - CT-RSA 2016 - Volume 9610, pages 55–71. 2016. DOI: 10.1007/978-3-319-29485-8_4
[Bir23]
Edward Birrane. Securing Delay-Tolerant Networks with BPSec. Wiley 2023.
[BKN02]
Mihir Bellare, Tadayoshi Kohno, and Chanathip Namprempre. Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. In Proceedings of the 9th ACM conference on Computer and Communications Security (CCS), pages 1–11. 2002. DOI: 10.1145/586110.586112
[BM22]
Edward J. Birrane and Kenneth McKeever. Bundle Protocol Security (BPSec). RFC 9172. January 2022.
[BMM+15]
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, and Björn Tackmann. Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. In Proceedings of the 9th International Conference on Provable Security - Volume 9451, pages 85–104. 2015. Springer-Verlag. DOI: 10.1007/978-3-319-26059-4_5
[BWH22]
Edward J. Birrane, Alex White, and Sarah Heiner. Default Security Contexts for Bundle Protocol Security (BPSec). RFC 9173. January 2022.
[Dwo04]
Morris Dworkin. Request for Review of Key Wrap Algorithms. https://eprint.iacr.org/2004/340. Cryptology ePrint Archive, Paper 2004/340. 2004.
[FGJ24]
Marc Fischlin, Felix Günther, and Christian Janson. Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3. J. Cryptol., 37(2), January 2024. DOI: 10.1007/s00145-023-09489-9
[FGMP15]
Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, and Kenneth G Paterson. Data Is a Stream: Security of Stream-Based Channels. In Advances in Cryptology–CRYPTO 2015, Proceedings, Part II 35, pages 545–564. 2015. Springer. DOI: 10.1007/978-3-662-48000-7_27
[FK11]
S. Frankel and S. Krishnan. IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap. RFC 6071. February 2011.
[fSDS20a]
Consultative Committee for Space Data Systems. CCSDS File Delivery Protocol (CFDP). Technical report number CSDS 727.0-B-5, Consultative Committee for Space Data Systems. 2020.
[fSDS20b]
Consultative Committee for Space Data Systems. Space Packet Protocol. Technical report number CSDS 133.0-B-2, Consultative Committee for Space Data Systems. 2020.
[fSDS23]
Consultative Committee for Space Data Systems. Overview of Space Communications Protocols. Technical report number CCSDS 130.0-G-4, Consultative Committee for Space Data Systems. April 2023.
[GM17]
Felix Günther and Sogol Mazaheri. A Formal Treatment of Multi-key Channels. In Advances in Cryptology–CRYPTO 2017 Proceedings, Part III 37, pages 587–618. 2017. Springer. DOI: 10.1007/978-3-319-63697-9_20
[HS02]
Russ Housley and Jim Schaad. Advanced Encryption Standard (AES) Key Wrap Algorithm. RFC 3394. October 2002.
[KZH07]
Aniket Kate, Gregory M. Zaverucha, and Urs Hengartner. Anonymity and security in delay tolerant networks. In 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, pages 504-513. 2007. DOI: 10.1109/SECCOM.2007.4550373
[LML14]
Xixiang Lv, Yi Mu, and Hui Li. Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs. IEEE Transactions on Information Forensics and Security, 9(1):5-13, 2014. DOI: 10.1109/TIFS.2013.2289993
[Man23a]
[Man23b]
Catherine G. Manning. Frequently Asked Questions. 2023.
[MKK17]
Sofia Anna Menesidou, Vasilios Katos, and Georgios Kambourakis. Cryptographic Key Management in Delay Tolerant Networks: A Survey. Future Internet, 9(3):26, 2017. DOI: 10.3390/fi9030026
[Res18]
Eric Rescorla. The Transport Layer Security (TLS) Protocol Version 1.3. Technical report, Internet Engineering Task Force (IETF). RFC 8446. 2018.
[Rog02]
Phillip Rogaway. Authenticated-encryption with associated-data. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 98–107. 2002. Association for Computing Machinery. DOI: 10.1145/586110.586125
[RS06]
Phillip Rogaway and Thomas Shrimpton. A Provable-Security Treatment of the Key-Wrap Problem. In Annual international conference on the theory and applications of cryptographic techniques, pages 373–390. 2006. Springer. DOI: 10.1007/11761679_23
[RSKW17]
Signe Rüsch, Dominik Schürmann, Rüdiger Kapitza, and Lars Wolf. Forward Secure Delay-Tolerant Networking. In Proceedings of the 12th Workshop on Challenged Networks, pages 7–12. 2017. Association for Computing Machinery. DOI: 10.1145/3124087.3124094
[SDM04]
Paul Syverson, Roger Dingledine, and Nick Mathewson. Tor: The Second Generation Onion Router. In Usenix Security, pages 303–320. 2004. USENIX Association Berkeley, CA.
[Sip24]
Brian Sipos. DTN Bundle Protocol Security (BPSec) COSE Context. Technical report number draft-ietf-dtn-bpsec-cose-04, Internet Engineering Task Force. Work in Progress. July 2024.
[TBW+07]
Leigh Torgerson, Scott C. Burleigh, Howard Weiss, Adrian J. Hooke, Kevin Fall, Dr. Vinton G. Cerf, Keith Scott, and Robert C. Durst. Delay-Tolerant Networking Architecture. RFC 4838. April 2007.
[ZSS+14]
Jian Zhou, Meina Song, Junde Song, Xian-Wei Zhou, and Liyan Sun. Autonomic Group Key Management in Deep Space DTN. Wirel. Pers. Commun., 77(1):269–287, July 2014. DOI: 10.1007/s11277-013-1505-1

PDFPDF Open access

History
Submitted: 2024-10-07
Accepted: 2024-12-03
Published: 2025-01-13
How to cite

Benjamin Dowling, Britta Hale, Xisen Tian, and Bhagya Wimalasiri, Cryptography is Rocket Science. IACR Communications in Cryptology, vol. 1, no. 4, Jan 13, 2025, doi: 10.62056/a39qudhdj.

License

Copyright is held by the author(s)

This work is licensed under a Creative Commons Attribution (CC BY) license.