Evaluating Post-Quantum Key Exchange Mechanisms for UAV Communication Security

The seamless integration of Unmanned Aerial Systems (UAS) into public airspace necessitates a robust UAV Traffic Management (UTM) system. Information security in communications plays a pivotal role in ensuring the operational safety of the UTM. Maintaining the integrity and authentication of unicast...

Full description

Saved in:
Bibliographic Details
Published inIEEE/AIAA Digital Avionics Systems Conference pp. 1 - 10
Main Authors Aissaoui, Ridwane, Deneuville, Jean-Christophe, Guerber, Christophe, Pirovano, Alain
Format Conference Proceeding
LanguageEnglish
Published IEEE 29.09.2024
Subjects
Online AccessGet full text
ISSN2155-7209
DOI10.1109/DASC62030.2024.10749304

Cover

More Information
Summary:The seamless integration of Unmanned Aerial Systems (UAS) into public airspace necessitates a robust UAV Traffic Management (UTM) system. Information security in communications plays a pivotal role in ensuring the operational safety of the UTM. Maintaining the integrity and authentication of unicast communications, such as command and video information, is imperative to thwart tampering and impersonation. Encryption emerges as an optimal solution for safeguarding such data. Efficient utilization of symmetrical encryption mandates the imple-mentation of secure key exchange mechanisms. However, intro-ducingAuthenticated Key Exchange (AKE) standards on diminutive Unmanned Aerial Vehicles (UAVs) encounters problems due to hardware limitations. To surmount this challenge, lightweight cryptographic algorithms tailored for resource-constrained hard-ware have been developed. Nonetheless, both lightweight and conventional cryptographic algorithms are susceptible to quantum computing threats. In response, post-quantum cryptographic primitives are undergoing standardization. This study assesses post-quantumKey Encapsulation Mechanism (KEM) candidates, namely CRYSTALS-Kyber, Hamming Quasi-Cyclic (HQC), and BIKE, on hardware resembling small UAVs. The evaluation of these algorithms focuses on computation time, considering real-time tasks during flights. The findings affirm the viability of employing unmodified standards on resource-constrained hardware concurrently with other priority tasks. Furthermore, quantum-vulnerable standards are also investigated to compare their performance against their more secure counterparts. All three post-quantum KEM candidates demonstrate usability in this environment, with CRYSTALS-Kyber being recommended for its superior performance, even surpassing certain prevailing standards.
ISSN:2155-7209
DOI:10.1109/DASC62030.2024.10749304