WP5-16-AIT
Revision as of 09:22, 19 July 2022 by Ait (talk | contribs) (Created page with "=Cryptographic algorithms adapted for drones= {|class="wikitable" | Identifier || WP5-16-AIT |- | Contributor || AIT |- | License || Functional |- | Expected TRL|| 4 |- | Description || This component represents a collection of cryptographic primitives and protocols whose characteristics are tailored to the use within drone environments (resource consumption, latency). In particular, the cryptographic protocols while providing means to satisfy low latency requir...")
Cryptographic algorithms adapted for drones
Identifier | WP5-16-AIT |
Contributor | AIT |
License | Functional |
Expected TRL | 4 |
Description | This component represents a collection of cryptographic primitives and protocols whose characteristics are tailored to the use within drone environments (resource consumption, latency). In particular, the cryptographic protocols while providing means to satisfy low latency requirements will at the same time provide strong security guarantees (like full forward secrecy). Another important focus will be to provide long-term security and in particular resilience to quantum computers, i.e., post-quantum security, and privacy protection of the entities involved in a communication. |
Key Enabling Technology | KET: Security — CATEGORY: U-Space Capabilities, KET: Network Centric Communications Systems — CATEGORY: System Functions |
U-Space Capabilities | “U1: Communication, navigation and surveillance” and “U3: U-space Advanced Services”. This component can be integrated and used by drone manufacturers for general remote communication, as well as V2I and V2V communications, since in the communication-layer the component is located below the standardized and commonly used “TLS” communication layer. |
System Functions | “Communication / Network Centric Communications”: The SW-component provides functionality for secure channel establishment to protect the confidentiality and integrity of messages between two communicating entities by means of a key exchange mechanism with strong security and privacy features. Moreover, with respect to entity authentication it enables unilateral or mutual authentication of communication partners within the secure channel establishment and additionally provides a means for privacy-friendly entity authentication. |
CD4 objectives (O), success criteria (SC), and measurable outcomes (MO) | O3 / SC3.1: Reduction of cybersecurity risks of drone-to-x communications, MO3.3: Mechanisms for secure communications |
Improvement | State-of-the-art cryptographic protocols do not provide low latency as well as strong security properties such as full forward secrecy at the same time. Currently, available protocols are no means to support privacy-friendly authentication. Moreover, they lack security in the face of powerful quantum computers. All these aspects are considered within this component, improving significantly over the state-of-the-art. |
Task | T5.3 |
Use Case | UC5 — Agriculture |
Demonstrator | D2 — Wine production |