An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication

  • Abid MurtazaEmail author
  • Syed Jahanzeb Hussain Pirzada
  • Muhammad Noman Hasan
  • Tongge Xu
  • Liu Jianwei
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1132)


Satellite communication is among those applications where data confidentiality is required, but at the same time, computational resources are limited as well as the delay is critical. For these types of applications, symmetric key encryption algorithms are preferred over asymmetric key algorithms, due to lower computational cost and faster speed of operation. Furthermore, due to various critical aspects of information security, using Perfect Forward Secrecy (PFS) in many communication applications is advantageous. There are two ways to achieve PFS; either a mechanism for new key generation is required, or some protocols are used for sharing new session keys before communication. Both of these ways, at minimum, append additional computational load and delay in communication, which are critical in satellite communication. This is probably the most significant barrier that satellites do not use PFS for every communication. This paper presents a novel encryption algorithm where a message key is generated such that later only Exclusive OR (XOR) operation can be used to produce the ciphertext. Hence, the proposed algorithm eliminates the need for two separate algorithms for message key generation and encryption for PFS. Security analysis and experimental results show that proposed encryption algorithm is not only secure but also faster and cheaper than the widely used AES-CTR encryption algorithm. Therefore it is suitable to be used in satellite communication for PFS.


Satellite communication Encryption Forward secrecy Algorithm Exclusive OR One-time pad 


  1. 1.
    CCSDS: The Application of Security to CCSDS Protocols. Informational report (Green Book), CCSDS 350, March 2019Google Scholar
  2. 2.
    CCSDS: CCSDS Cryptographic Algorithms. CCSDS 352.0-B-1, no. November 2012Google Scholar
  3. 3.
    M. Stamp, Information Security : Principles and Practice, 2nd Edition (2011)CrossRefGoogle Scholar
  4. 4.
    WhatsApp Inc.: WhatsApp Encryption Overview (2017)Google Scholar
  5. 5.
    Koko, S.O.F.M., Babiker, M.A.: Comparison of various encryption algorithms and techniques for improving secured data communication. Int. J. Comput. Eng. 17(1), 62–69 (2015)Google Scholar
  6. 6.
    Sharma, S., Bisht, J.S.: Performance analysis of data encryption algorithms. Int. J. Sci. Res. Netw. Secur. Commun. 3(1), 1–5 (2015)Google Scholar
  7. 7.
    Abd Elminaam, D.S., Kader, H.M.A., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 213–219 (2010)Google Scholar
  8. 8.
    Mushtaq, M.F., Jamel, S., Hassan Disina, A., Pindar, Z.A., Shakir, N.S.A., Mat Deris, M.: A survey on the cryptographic encryption algorithms. Int. J. Adv. Comput. Sci. Appl. 8(11), 333–344 (2017)Google Scholar
  9. 9.
    Murtaza, A., Jahanzeb, S., Pirzada, H., Jianwei, L.: A new symmetric key encryption algorithm with higher performance. In: IEEE International Conference on Computing, Mathematics and Engineering Technologies – iCoMET, pp. 1–7 (2019)Google Scholar
  10. 10.
    NIST: Advanced Encryption Standard (AES). Fed. Inf. Process. Stand. Spec. Publ. 197 (2001)Google Scholar
  11. 11.
    Weiss, H.: CCSDS standardization of security algorithms for civil space missions. In: SpaceOps 2012 Conference, pp. 1–11 (2012)Google Scholar
  12. 12.
    Forhad, M.S.A., Riaz, S., Sabir Hossain, M., Das, M.: An improvement of advanced encryption standard. IJCSNS Int. J. Comput. Sci. Netw. Secur. 18(11) (2018)Google Scholar
  13. 13.
    Jahanzeb, S., Murtaza, A., Jianwei, L.: The AES implementation for avoiding single event effects for satellite application. In: IEEE ICEIEC 2019 (2019). In pressGoogle Scholar
  14. 14.
    NIST: Recommendation for Block Cipher Modes of Operation: Methods and Techniques, Spec. Publ. 800-38AGoogle Scholar
  15. 15.
    Prakash, A., Kumar, U.: Authentication protocols and techniques : a survey. Int. J. Comput. Sci. Eng. 6(June), 1014–1020 (2018)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Zhang, C., Wang, X.: A novel self-certified security access authentication protocol in the space network. In: 14th IEEE ICCT, pp. 1014–1020 (2012)Google Scholar
  17. 17.
    Xue, K., Meng, W., Li, S., Wei, D.S.L., Zhou, H., Yu, N.: A secure and efficient access and handover authentication protocol for Internet of Things in space information networks. In: IEEE Internet Things J. (2019, in press)Google Scholar
  18. 18.
    Yantao, Z., Jianfeng, M.: A highly secure identity-based authenticated key-exchange protocol for satellite communication. J. Commun. Netw. 12(6), 592–599 (2010)CrossRefGoogle Scholar
  19. 19.
    Fereidooni, H., Taheri, H., Mahramian, M.: E2E KEEP : end to end key exchange and encryption protocol for accelerated satellite networks. Int. J. Commun. Netw. Syst. Sci. 2012(April), 228–237 (2012)CrossRefGoogle Scholar
  20. 20.
    Murtaza, A., Jianwei, L.: A simple, secure and efficient authentication protocol for real-time earth observation through satellite. In: IEEE Proceedings of 15th International Bhurban Conference on Applied Sciences and Technology, Islamabad, pp. 822–830 (2018)Google Scholar
  21. 21.
    Lee, Y.: Improvement of key exchange protocol to prevent man-in-the-middle attack in the satellite environment. In: 2016 Eighth International Conference on Ubiquitous Future Networks, pp. 408–413 (2016)Google Scholar
  22. 22.
    Murtaza, A., Xu, T., Jahanzeb, S., Pirzada, H., Jianwei, L.: A lightweight authentication and key sharing protocol for satellite communication. Int. J. Comput. Commun. Control (2019, in press)Google Scholar
  23. 23.
    Bader, A.S., Sagheer, A.M.: Modification on AES-GCM to increment ciphertext randomness. Trans. Int. J. Math. Sci. Comput. 4(Nov), 34–40 (2018)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Abid Murtaza
    • 1
    Email author
  • Syed Jahanzeb Hussain Pirzada
    • 2
  • Muhammad Noman Hasan
    • 3
  • Tongge Xu
    • 2
  • Liu Jianwei
    • 2
  1. 1.School of Electronics and Information EngineeringBeihang UniversityBeijingChina
  2. 2.School of Cyber Science and TechnologyBeihang UniversityBeijingChina
  3. 3.School of Automation Science and Electrical EngineeringBeijingChina

Personalised recommendations