Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 CCSDS Security Working Group January 25 Telecon.

Similar presentations


Presentation on theme: "1 CCSDS Security Working Group January 25 Telecon."— Presentation transcript:

1 1 CCSDS Security Working Group January 25 Telecon

2 2 AGENDA Welcome Document Status – Security Green Book wording revisions – Security Architecture – Key Management – Mission Planners Guide – Encryption – Authentication » Proposals for HMAC replacement? Plans for March meeting in Washington

3 3 Security Green Book Revisions

4 4 Revisions per telecon Rationale: Add words about cipher-based MAC

5 5 Security Green Book Revisions (cont) Red = Susanna Spinsante changes

6 6 Revisions per telecon Rationale: this section discusses “bulk encryption” so why muddy the waters talking about authentication which has nothing to do with the subject.

7 7 Green Book ESA Comments

8 8 Security Architecture Everyone needs to read the document and provide comments to Nick Shave as soon as possible. Also, please provide agency mission profiles.

9 9 Key Management Implemented changes based on the discussion in Heppenheim. Waiting for comments as per action before issuing the next draft.

10 10 Mission Planners Guide 1 st draft shown in Heppenheim, Oct. 2007 2 nd draft will be e-mailed to sea-sec list by middle of Feb. 2008 – Will replace 1 st draft security plan template with a new one according to ISO 27002 controls – Will add more material specific to space environment & CCSDS protocols

11 11 Encryption Changes made to the Magenta book per the Heppenheim meeting Changes made to the ‘trade survey’ green book No comments received to date – Are we ready to send these to the secretariat to be published?

12 12 Authentication Changes made per Heppenheim meeting Awaiting any HMAC replacement proposals. Changes made to Green Book (‘trade survey’) – Awaiting comments – none received to date – Are we ready to send this to the secretariat to be published?

13 13 March Meetings Plans: – Security implementation experiences with SLE? » Problems with its use » How its used – Discuss prop authentication & encryption algorhtim application specific parameters – Review of CCSDS books for security sections » Martin Pilgrim will provide books that need to be reviewed – As time permits- CC usage – Threat review (review issued document) – How do we integrate all the indivdiual docs into something that someone can really use (knit it all together). – Agency security implementations/use


Download ppt "1 CCSDS Security Working Group January 25 Telecon."

Similar presentations


Ads by Google