These requirements are the following a b the encrypted

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: e requirements are the following: (a) (b) The Encrypted Authentication or Data Encryption mechanism shall not interfere with the standard telecommand verification techniques which operate within the CCSDS TC Transfer layer, and shall permit recovery from the effects of errors or interruptions in the communications process. (c) If implemented above the TC Packetization layer, the Encrypted Authentication word or transformed portion of the data shall be included completely within the Application Data field of the TC Packet. (d) If implemented above the TC Segmentation layer, the Encrypted Authentication word or transformed portion of the data shall be included completely within the Segment Data Field of the TC Segment. (e) Issue 6 The command Encrypted Authentication and/or Data Encryption system shall operate normally within the Packetization, and/or Segmentation, and/or Transfer layers. For those missions which do not implement the TC Packet, Segment, or Transfer Frame data structures, the Encrypted Authentication or Data Encryption system should operate within the corresponding layers of the non-standard system. A standardized mechanism for implementing the system at the sending and receiving ends of the Packetization, Segmentation, and Transfer layers is recommended as being the most secure and manageable. If implemented above the TC Transfer layer, the Encrypted Authentication word or transformed portion of the data shall be included completely within the "Frame Data" field of the TC Transfer Frame (AD or BD frames only); if implemented within the TC Transfer layer, these shall be included completely Page C-3 January 1987 CCSDS REPORT CONCERNING TELECOMMAND: SUMMARY OF CONCEPT AND SERVICE within the "Qualifying Data" field of a TC Transfer Frame (Type BC) which carries a Control Command. (f) The selected Encrypted Authentication or Data Encryption technique shall be transparent to the lowest layers of the TC System; i.e., the TC Coding and TC Physical layers. The Encrypted Authentication or Data Encryption technique shall not require the implementation of any physical security mechanisms within these lowest layers. It should be noted that since bulk-encryption of Telecommand data at the Physical layer does not allow any interoperability except at the bit level, it is not a CCSDS-recommended technique. Issue 6 Page C-4 January 1987 CCSDS REPORT CONCERNING TELECOMMAND: SUMMARY OF CONCEPT AND SERVICE ANNEX D TELECOMMAND SYSTEM PERFORMANCE NOTES Purpose: This Annex provides information on the performance that may be achieved for the various telecommand strategies and options given in the Recommendation for Telecommand. Status: This Annex is currently under development by the CCSDS. Issue 6 Page D-1 January 1987 CCSDS REPORT CONCERNING TELECOMMAND: SUMMARY OF CONCEPT AND SERVICE D-1 INTRODUCTION This Annex discusses the Telecommand (TC) Performance which may be obtained using the data units, techniques, and strategies described in the CCSDS Recommendation for Telecommand, Part 1: Channel Service (Reference [4]) and Recommendation for Telecommand, Part 2: Data Routing Service (Reference [3]). Performance d...
View Full Document

Ask a homework question - tutors are online