Fig. 1 System architecture DDS middleware
Fig. 2 DDS RTPS Message transformation[4]
Fig. 3 AES-GCM mode work[10]
Fig. 4 AES-OCB mode work[13]
Fig. 5 Cryptographic Plugin Model[3]
Fig. 6 CryptoTransForm Structure with AES-OCB
Fig. 7 Average Value Compare Result
Table. 1 Cryptographic SPI TransformationKind
Table. 2 Experiment Target Environment
Table. 3 Experiment Result
References
- DDS Portal. What is DDS[Internet]. Available: https://www.omgwiki.org/dds/what-is-dds-3/.
- S. H. Ham, and D. W. Park, "Study on Policies for National Cybersecurity," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 9, pp. 1666-1673, Sep. 2017. https://doi.org/10.6109/JKIICE.2017.21.9.1666
- T. White, M. N. Johnstone and M. Peacock, "An investigation into some security issues in the DDS messaging protocol," in Proceeding of 15th Australian Information Security Management Conference, Perth, pp. 132-139, 2017.
- OMG Std. DDS Security Version 1.1, OMG, 2018.
- Y. K. Go and C. S. Kim, "Cryptographic Overhead of DDS Security for Naval Combat System Security," in Proceeding of the Korean Information Science Society Conference, Jeju, pp. 1217-1219, 2017.
- N. Ferguson.(2005, May). Authentication weaknesses in GCM. Comments submitted to NIST Modes of Operation Process[online]. pp. 1-19. Available: https://csrc.nist.gov/csrc/media/projects/block-cipher-techniques/documents/bcm/comments/cwc-gcm/ferguson2.pdf.
- OMG Std. Data Distribution Service for Real-time Systems Version 1.2, OMG, 2007.
- OMG Std, The Real-Time Publish-Subscribe WireProtocol: DDS Interoperability Wire Protocol Specification Version 2.1, OMG, 2014.
- S. M. Kim, T. M. Chang, H. S. Kim, and M. S. Kang, "Design of High-Speed AES Cipher Processor Using Pipeline Technique," Journal of Security Engineering, vol. 11, no. 2, pp.145-154, Apr. 2014. https://doi.org/10.14257/jse.2014.04.01
- D. A. McGrew, and J. Viega, "The security and performance of the Galois/Counter Mode (GCM) of operation," in Proceeding of the International Conference on Cryptology in India, Berlin, pp. 343-355, 2004.
- G. Procter and C. Cid, "On weak keys and forgery attacks against polynomial-based MAC schemes," Journal of Cryptology, vol. 28, no. 4, pp. 769-795, Oct. 2015. https://doi.org/10.1007/s00145-014-9178-9
- J. P. Aumasson, Serious Cryptography: A Practical Introduction to Modern Encryption, San Francisco, 2017.
- T. Krovetz and P. Rogaway, "The Software Performance of Authenticated-Encryption Modes," in Proceedings of the International Workshop on Fast Software Encryption, Berlin, pp. 306-327, 2011.
- OCB Mode. OCB: free licenses[internet]. Available: http://web.cs.ucdavis.edu/-rogaway/ocb/license.htm.
- T. Krovetz and P. Rogaway. (2014, May). The OCB authenticated-encryption algorithm, IETF RFC 7253[Online], pp. 1-19. Available: https://tools.ietf.org/html/rfc7253.