=Paper=
{{Paper
|id=Vol-2500/paper_20
|storemode=property
|title=Development of Imitation-resistant Authentication Protocol for Low-orbital Space Satellite
Communication
System
|pdfUrl=https://ceur-ws.org/Vol-2500/paper_20.pdf
|volume=Vol-2500
|authors=Igor Kalmykov,Maria Lapina,Maxim Kalmykov,Igor Provornov,Evgeniy Voloshin
}}
==Development of Imitation-resistant Authentication Protocol for Low-orbital Space Satellite
Communication
System
==
Development of Imitation-resistant Authentication Protocol for Low-orbital Space Satellite Communication System Igor Kalmykov Maria Lapina Maxim Kalmykov NorthCaucasus Federal NorthCaucasus Federal NorthCaucasus Federal University University University Stavropol, 355017 Stavropol, 355017 Stavropol, 355017 kia762@yandex.ru mlapina@ncfu.ru kim762@yandex.ru Igor Provornov Evgeniy Voloshin NorthCaucasus Federal NorthCaucasus Federal University University Stavropol, 355017 Stavropol, 355017 kia545@yandex.ru norra170@gmail.com Abstract In recent years, there has been a tendency to expand the use of low- orbit satellite communication systems (LOSCS). A special role belongs to the systems of remote monitoring, control and management of unat- tended objects of environmentally hazardous technologies. To ensure uninterrupted operation of the satellite communications system, a cer- tain number of spacecrafts are combined into an orbital group. For a low-orbit CAS, the group consists of 48-60 satellites. However, due to the increase in the number of LOSCS, a situation may arise when a ”foe” satellite gets in sight of a satellite communications receiver, which is located at the subscriber terminal of an unattended facility, attempts to impose a previously intercepted control command. This can lead to failure of the control object and provoke an environmen- tal disaster. In order to prevent such a situation, it is necessary to increase the imitation resistance of the LOSCS. It is possible to solve this problem by using the identification of the Identification-Friend-or- Foe system (IFF system) of a spacecraft. Obviously, the effectiveness of such a system is primarily determined by the authentication protocol. Therefore, the goal of the research is to improve the imitability of the LOSCS by a satellite identification system using the developed authen- tication protocol, built on evidence with zero disclosure zeroknowledge proof knowledge (ZKPK). Keywords: satellite identification system, authentication protocols with zero knowledge disclosure, algorithm of checking for session key reuse. Copyright 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). In: S. Hölldobler, A. Malikov (eds.): Proceedings of the YSIP-3 Workshop, Stavropol and Arkhyz, Russian Federation, 17-09-2019–20-09-2019, published at http://ceur-ws.org 1 Introduction Providing the communication services for global projects like the development of the Northern Sea Route, the creation of information and telemetric systems for air and land transport in high latitudes is impossible without the use of low-orbit satellite communication systems (LOSCS). Satellite communication systems such as Iridium and Iridium NEXT are now widely used to solve these tasks [Iri18], [Iri18], [Wha18]. One of the most promising areas of application of the LOSCS is the exploitation of mineral resources in the regions of the Far North. In this case, LOSCS are an important part of automated management, remote monitoring and control systems, which are used to manage the maintenance-free hydrocarbon production and transportation facilities located beyond the Polar Circle. To organize uninterrupted communications, the NSSS group should contain 48 to 60 spacecraft. However, the increase in the number of countries participating in the development of the natural resources of the Arctic, as well as the large spatial extent of communication lines leads to an increase in the number of satellite constellations. Because of this, a situation may arise when a satellite of the intruder may be in the visibility zone of the receiver, which may disrupt the operation of the LOSCS. This can lead to the failure of maintenance-free control facility and provoke an environmental disaster. It is possible to solve this problem by increasing the imitation resistance of the LOSCS. To counteract the imposition of an intercepted command, it is advisable to use a satellite identification system (SIS). For efficient work of the inquiry-response identification system friend-foe, it is necessary, foremost, to use an imitation- resistant authentication protocol, and, secondly, encrypting algorithms should not be used when checking satellite status. This problem can be solved only with the help of request-response type protocols, built on evidence with zero disclosure of zero-knowledge proof knowledge (ZKPK) [Feg03], [Pas18], [Sta99], [Smi02]. Therefore, the development of an imitation-resistant authentication protocol with zero disclosure and the minimum time spent on checking the status of a satellite is a topical task. 1 Material and methods of research 1.1 Destructive effects on the low-orbit satellite communication system An analysis of the following works was carried out to develop the most effective method of countering the destructive effects of the intruder satellite [Mcd17], [Poi12], [Spe02], which allowed to discern three groups of such effects. The basis of the first class of effects on the communication system consists of various methods of electronic signal suppression. The main goal of the electronic signal suppression methods is blocking the transmitted signal from the spacecraft to the control object and back. Usually, active or passive interference is used for this, among which there are: – harmonic continuous interference, which is determined by equation: UGN P (t) = Umm cos(ωp2 t + φp2 (t)), (1) where ωp2 ∈ [ω0 −π∆f2 ; ω0 +π∆f2 ] - angular interference frequency; Umm - amplitude of harmonic continuous interference; φp2 - initial phase of harmonic continuous interference. – quasi-white noise-like interference determined by USHP (t) = Umm cos(ωp1 t + φp1 (t)), (2) where Umm (t) - alteration in enveloping noise-like interference; φp1 (t) - phase change in noise-like interfer- ence; ωp1 - average interference frequency; ω1 ≈ ω0 ; ω0 = 2πL; L - carrier wave frequency; - active amplitude modulated noise interference U (t) = UP [1 + Kα ∆UM OD (t)], (3) where Kα - slope of modulation transmitter characteristic; ∆UM OD (t) - modeling direction coming from the noise generator. The basis of the second group is simulated interference. Such interference is called intelligent interference, as it is able to adapt to the transmitted signal, thereby disrupting the effective operation of the radio communication system. The most widespread are: 2 – targeted simulating disturbance, which is determined by the equation: UP IP (t) = KUm Qι (t − td − ∆τ )sin[2π(L ± ∆f )(t − td − ∆τ ) + φ], (4) where K - coefficient accounting the targeted simulating disturbance; – tracking imitation interference, USIM (t) = KUm Q(t − td − τ (t))sin[2π(L ± ∆f )(t − td − τ (t)) + φ], (5) where τ (t) = r(t)/c - distance from satellite to the station. A special place among the destructive effects on the satellite communication system is occupied by the relay interference. In this case, the intruder satellite intercepts the control command, delays it, and then sends it. Then the receiver located on the control object perceives the received signal as its own and transmits a command to the control system of a maintenance-free object, which can lead to disruption and breakdown. Studies have shown that in the conditions of the Far North, the method of setting relay interference is the most effective method, while the use of active, passive and imitating interference is a difficult task. Therefore, this paper will propose methods for countering relay interference. In order to forbid the intruder satellite imposing an intercepted and delayed command on the subscriber station, it is necessary to prevent data exchange between such a spacecraft and the receiver located at the control object. To do this, it is advisable to determine the satellite status before starting a communication session. Because of the use of the friend or foe identification, a satellite that fails authentication will not be able to communicate with the receiver of the subscriber terminal of the remote control object. Currently, there are many ”friend or foe” identification systems, which are widely used in many countries. The analysis of the basic principles of building data of the friend or foe identification showed that they are unable to authenticate the satellite and cannot be used in the LOSCS. 1.2 Authentication protocols This problem can be solved by developing a new method for constructing the friend-foe identification system, which would allow to authenticate the LOSCS satellite using a strong cryptographic protocol. Currently, cryp- tographic authentication protocols can be divided into three groups. The first group is based on password authentication protocols [Sta99], [Shr96], [Feg10], [Smi02]. Authentication protocols that make up the second group have higher cryptographic security. Such protocols use a request-response method. As these works show, [Sta99], [Feg10], [Smi02] it is proposed to use both symmetric and asymmetric cryptographic systems to increase the strength of such protocols. It should be noted that the following this condition for a group of spacecrafts LOSCS is rather difficult. This is because not only satellites, but the unattended control objects must have the secret keys. Authentication protocols with zero knowledge proof lack this flaw. They make up the third group. These works [Sha03], [Feg10] examine the Fiat-Shamir protocol. In order to ensure the required level of probability of noticing an intruder, the authentication procedure is performed repeatedly, where W = 20-40 rounds. The Schnorr protocol, which is presented in these works, allows to reduce the time spent on authentication, [Sch96], [Fer03]. Although this protocol allows one round authentication, it nevertheless has drawbacks: – three data exchanges are required between applicant P and verifier V for authentication; – periodically changing session keys Sj, j = 1, 2, ... are not used. The developed authentication protocol built on evidence with zero knowledge disclosure and minimum number of identification steps allows to eliminate these drawbacks [Gos15]. This protocol consists of the following steps: At the preliminary stage of the protocol, the irreducible polynomial p(x) and the value of the secret key and the random number S are chosen. The value of the secret key and S are used to calculate the session keys Sj , where j = 1, 2, ..., which satisfy the condition K sek ≤ 2degp(x) − 1. (6) 3 S ≤ 2degp(x) − 1. (7) where degp(x) - is the degree of p(x) polynomial. The operation of the authentication protocol involves the transponder, which resides on board the satellite and the interrogator that resides at the control site. First, the transponder, upon receiving the value Sj K sek of the session key, calculates the true status of the satellite sek Mj (x) = X Sj X K modp(x) (8) sek −1 where Sj (x) = x(Sj −1+K ) modp(x)- value of the j-th session key. If during the calculation of the session key Sj the following condition is true, Sj−1 + K sek = 0mod2degp(x)−1 , (9) then this value is replaced by 2degp(x)−1 − 1. The next step is to conduct the noise interference of the secret key values and Sj. To do this, the values that change during each session are used. As a result, we get the following expressions K̃jsek = (K sek + ∆K sek )mod2degp(x) − 1, (10) S̃j = (Sj + ∆Sj )mod2degp(x) − 1, (11) where K̃jsek , S̃j are noise-modified values. Then the noise-modified satellite image will be determined based on the expression sek M̃j (x) = xS̃j xK̃ modp(x) (12) True and noise-modified satellite images will be used to verify its authenticity. To perform such authentication, the interrogator sends a question, which is a random number. Upon receiving the dj query, the transponder must answer the question rj (1) = (K̃jsek − dj K sek )mod2degp(x) − 1, (13) rj (2) = (S̃j − dj Sj )mod2degp(x) − 1, (14) The transponder sends (Mj (sek), M̃j (sek), rj (1), rj (2)) to the interrogator. To verify the correctness of the received answers, the verifier V uses an expression in which the true Mj (sek), noise-modified M̃j (sek) images of the satellite, two answers rj (1) and rj (2), and the question dj must be included. The following expression is used to check the received answers: Bj (x) = Mj (x)dj X rj (1) X rj (2) modp(x). (15) If the Bj (x) = Mj (x) condidtion is true, then the satellite is assigned the status of ”friend”. Otherwise, satellite status is foe. Analysis of the developed authentication protocol indicated that it can conduct satellite identification at a higher speed, since the authentication process consists of two stages. To assess the effectiveness of the developed authentication protocol, a comparative analysis was conducted with the Fiat-Shamir and Schnorr protocols. The analysis showed that the developed protocol allows the authentication procedure to be performed in two stages, which is 30 times faster than the Fiat-Shamir protocol and 1.5 times faster than the Schnorr protocol. It is obvious that the imitability of this authentication protocol will be determined by the session keys Sj , where j = 1, 2, ... If during the operation of the transponder the value of the session key does not change, it will result in the signals transmitted to the interrogator during the j − thand(j + 1) − th session to overlap, since Cj (x) = Cj+1 (x). In this case, the length of the L-bit response transmitted to the interrogator was reduced by the degree of the selected polynomial p(x). This will lead to an increase in the probability of the answer being guessed by the foe satellite, since 4 1 1 P = L < P ∗ = L−degp(x) (16) 2 2 where p∗ - probability of guessing the answer when the session key is reused. This means that double use of the session key reduces the protocol’s imitation resistance. In [Lap18] an algorithm that allows to check the correctness of the generation of Sj and the additional parameter Tj is presented. To do this, the verifying party sends the satellite a random query number r. After receiving the question r, the spacecraft calculates the answers. a∗j (S) = (aj (S) − r)modq, a∗j (T ) = (aj (T ) − r)modq, (17) 1 1 where aj (T ) = Πm m ι=1 Tj +Kj modq; aj (S) = Πι=1 Sι +Kι modq. The blurred values are then calculated. ∗ ∗ Sj∗ = g aj (S) modq, Tj∗ g aj (T ) modq. (18) The spacecraft finds the product of the true values of Sj and Tj, as well as the blurred parameters. The results are sent to the verifying party V, which checks the obtained values. Sj Tj A= = g 2r modq. (19) Sj∗ Tj∗ If the calculated value, according to (19), satisfies A‘ = (g r )2 modq = A, (20) this suggests that the values of Sj and the corresponding parameter Tj are generated correctly. However, this algorithm does not allow to determine the reuse of Sj . The developed algorithm for the dual session key reuse check allows to eliminate this drawback. The satellite and the operation support center (OSC), which controls the operation of the automated facility monitoring system, are involved in the verification. In the developed protocol, an additional parameter Tj is introduced, with which it would be possible to verify if the session key was reused sek −1 Sj (x) = x(Sj−1 +K ) modp(x). (21) sek +T )−1 Tj (x) = x(Sj−1 +K modp(x). (22) where S0 = S; j = 1, 2, ... If during the calculation of the session key Sj the condition is true, (23) (Sj−1 + K sek + Tj−1 ) = 0mod2degp(x)−1 , (23) degp(x)−1 then this value is replaced by 2 . In the developed algorithm, Tj is used to calculate the test parameter Ej , with which the satellites public key will be obtained when the condition Sj = Sj + 1 is true. In the course of the research, an equation was chosen to determine Y Ej = K pub Tj j modp(x). (24) where Yj - query number, that is set by OSC on j-th session; Yj < 2degp(x)−1 . The developed algorithm for checking the reuse of the session key in the satellite identification system consists of the following steps. 1 The transponder calculates the values of the session key Sj and Tj. 2 At the j-th session, the center makes a request for which a random number is used. 3 The trasponder, upon receiving this request, calculates the answer (24) 4 Ej , Yj are transmitted to the center. 5 5 In the next session, the responder calculates the values of the session key Sj+1 and Tj+1 . 6 At the j + 1-st session, the center makes a request for which a random number is used. 7 The trasponder, upon receiving this request, calculates the answer Y Ej+1 = K pub Tj+1 j+1 modp(x). (25) 8 Ej+1 , Yj+1 are transmitted to the center. 9 The center performs a session key reuse check in the spacecraft identification system (Y(j+1) −Y(j) )−1 + (Ej )Y(j+1) W = (26) (Ej+1 )Y(j) 2degp(x) −1 If the public key of the K pub spacecraft is obtained, this indicates that the satellite reused the session key Sj . Consider the situation when the operation of the pseudo-random function generator that calculates session keys Sj was disrupted. In this case, the values of the neighboring session keys Sj and Sj+1 will match sek −1 sek −1 Sj (x) = x(Sj−1 +K ) modp(x) = x(Sj +K ) modp(x) = Sj+1 (x). (27) Suppose we have the following equation Sj = Sj+1 = S. Parameters Tj andTj+1 are used in the algorithm for checking the reuse of the session key sek +T )−1 sek +T )−1 Tj (x) = x(Sj−1 +K modp(x) = x(Sj +K modp(x) = Tj+1 (x). (28) Then on receiving Yj+1 < 2degp(x) − 1 query, the transponder sends to the center Y Ej = K pub Tj j mod2degp(x) − 1. (29) And on receiving Yj+1 < sdegp(x) − 1 query, center gets the response: Y Ej+1 = K pub Tj j+1 mod2degp(x) − 1. (30) Then the center gets the equation, where q = 2degp(x) − 1. (Yj −Yj+1 )−1 + Y !(Yj −Yj+1 )−1 + Yj (K pub Tj j+1 )Yj (Ej+1 ) W = = Y = K pub (31) (Ej )Yj+1 (K pub Tj j )Yj+1 q q The calculated value of the Kpub satellite public key allows to determine the corresponding satellite and restart the session key generator. It is obvious that the use of the developed algorithm to verify the reuse of the session key will improve the imitation resistance of the satellite communication system. Therefore, a modification of the developed protocol was carried out. As a result, it consists of the following steps. 2 Preliminary stage of the protocol For the operation of the satellite identification system built on the basis of the authentication protocol with zero disclosure, an irreducible polynomial p(x) with a large degree degp(x) is chosen. The secret key K sek < degp(x) − 1. (32) To obtain the j-th session key Sj , where j = 1, 2, ..., a random number S that satisfies S < degp(x) − 1. (33) In order to verify the dual use of the session key, a random number T is chosen from the equation 6 T < degp(x) − 1. (34) The selected parameters are stored in the satellite memory.. The working stage of the authentication protocol. Stage 1. The transponder on the satellite board calculates the session key Sj (x) and the parameter Tj (x). Stage 2. The transponder calculates the true status of the satellite sek Mj (x) = xSj xK xTj modp(x). (35) Stage 3. The transponder produces noise-modified parameters using random variables ∆K̃jsek , ∆S̃j , ∆T̃j . K̃jsek = (K sek + ∆K sek )mod2degp(x) − 1, (36) S̃j = (Sj + ∆Sj ))mod2degp(x) − 1, (37) T̃j = (Tj + ∆Tj )mod2degp(x) − 1, (38) Stage 4. The transponder calculates the noise-modified satellite status sek M̃j (x) = xS̃j xK̃ xT̃j modp(x). (39) Authentication process. Stage 1. The transponder chooses a question number dj < 2degp(x)−1 , which it sends to the transponder. Stage 2. The transponder calculates the answers to the query after receiving the number dj : rj (1) = (K̃jsek + dj K sek )mod2degp(x) − 1, (40) rj (2) = (S̃j + dj Sj )mod2degp(x) − 1, (41) rj (3) = (T̃j + dj Tj )mod2degp(x) − 1, (42) Transponder sends (Mj (x), M̃j (x), rj (1), rj (2), rj (3)). to transponder. The transponder verifies the correctness of the response: Bj (x) = Mj (x)dj xrj (1) xrj (2) xrj (3) modp(x). (43) If the equation Bj (x) = M̃j (x) is true, then the satellite gets the friend status. 3 Results and Discussion Consider the work of the developed authentication protocol. Let an irreducible polynomial be given:p(x) = x5 + x2 + 1. Then the parameters are chosen: K sek = 14, S = 14, T = 18. Let us assume j = 1. Step 1. The transponder calculates the session key S1 (x) and T1 (x), where S0 = S; j = 1. + 1 + + sek −1 1 + S1 (x) = x(S1−1 +K ) = x S0 +K sek = x 14+14 = x10 x5 +x2 +1 = x4 + 1 = 10001. P (x) x5 +x2 +1 x5 +x2 +1 + + + + sek +T )−1 −1 −1 T1 (x) = x(S0 +K = x(14+14+18) = x(15) = x29 x5 +x2 +1 = x3 + 1 = 01001. P (x) x5 +x2 +1 x5 +x2 +1 Step 2. The transponder calculates the true satellite status according to (8). sek M̃j (x) = xS̃j xK̃ modp(x) = x17 x14 x9 modx5 + x2 + 1 = x4 + x3 + x = 11010 7 Step 3. The transponder calculates the encrypted secret parameters. K̃1sek , S̃1 , T̃1 . If {∆K̃1sek = 4, ∆S̃1 = 10, ∆T̃1 = 2} < 25 − 1. Then, K̃1sek = (K sek + ∆K1sek )mod25 − 1 = 18, S̃1 = (S1 + ∆S1 ))mod25 − 1 = 27, T̃1 = (T1 + ∆T1 )mod25 − 1 = 11. Step 4. The transponder calculates the encrypted status of the satellite sek + M̃j (x) = xS̃j xK̃j xT̃j = x27 + x18 + x11 modx5 + x2 + 1 = x25 = x4 + x3 + 1 = 11001 p(x) 4 Authentication process Step 1. The interrogator chose a d1 = 11 number and sent it to the transponder. Step 2. The respondent, upon receiving d1 = 11, calculates the answers to the question (13) - (15) + = r1 (1) = K̃1sek + d1 K sek = 19, r1 (2) = S̃1 + d1 S1 26, 31 31 + + r1 (3) = T̃1 + d1 T1 = |11 − 11 · 9|31 = 5 31 Transponder responds to interrogator: (M1 (x), M̃1 (x), r1 (1), r1 (2), r1 (3)) = (11010, 11001, 10011, 11010, 00101). Satellite status is checked. Transponder calculates the following: + B1 (x) = M1 (x)d1 xr1 (1) xr1 (2) xr1 (3) = (x4 + x3 + x)11 x19 x26 x5 x5 +x2 +1 = x4 + x3 + 1. p(x) Since the B1 (x) = M̃1 (x) condition is met, then the satellite is assigned the status of ”friend”. To evaluate the imitation resistance of the developed authentication protocol, the Matlab R2017b application software package was used. As a criterion for assessing the level of imitation resistance, the probability of a satellites omission by the identification system was chosen. The probability of missing is determined according to the equation: N (ι) PP C = PP O (ι), (44) Nmax where PP O (ι) = 1/2Lι - probability of selecting the answer; N (ι), - the number of identification steps in the ι − th protocol; N (max) = 60 - the maximum number of steps in the protocol; Lι - the number of bits in the answer to the question. Figure 1 shows the dependence of the probability of a satellites omission by the identification system on the bit depth of the answer to the question posed. 8 Figure 1 - Dependence of the probability of satellite omission from bit depth of the answer to the question: 1- Fiat-Shamir protocol is used; 2- the developed protocol is used. Analysis of the graph shows that with a bit depth of L = 72 bits, the probability of a satellite passing by an identification system based on the Fiat-Shamir protocol will be PP S (1) = 2.1 · 10−22 . Whereas, when using the developed protocol, defined by expressions (6) - (15), the probability of a satellite passing by the identification system will be PP S (2) = 6.7 · 10−24 . Thus, the use of the developed protocol makes it possible to increase the imitation resistance of a satellite communication system by 3.19 · 102 in comparison with the Fiat-Shamir protocol. Consider an example of applying a session key reuse check algorithm. We use the data given in the previous sek + + example. Then the public key will be equal to K pub = xK = x14 x5 +x2 +1 = x4 + x3 + x2 + 1 = 11101. p(x) During the first communication session, the following parameters were obtained. S1 (x) = x4 +1 = 10001, T1 (x) = x3 + 1 = 01001. Let the satellite receive a Y1 = 5 question from the OSC. Then, using expressions (18), the test parameter is E1 = k pub T1Y1 modp(x) = (x4 + x3 + x2 + 1)(x3 + 1)5 x5 +x2 +1 = x4 = 10000.. The calculated value of E1 is transmitted to the OSC. During the second communication session, + + + + sek +T )−1 −1 −1 T2 (x) = x(S1 +K = x(17+14+18) = x(18) = x19 x5 +x2 +1 = x2 + x = 00110. P (x) x5 +x2 +1 x5 +x2 +1 In the second session the satellite received an Y2 = 17 question from OSC. Then E2 = k pub T2Y2 modp(x) = (x4 + x3 + x2 + 1)(x2 + x)17 x3 +x+1 = x4 = 01011. The calculated value of E2 is transmitted to the OSC, which checks the answers according to (21) (Y2 −Y1 )−1 + (Y2 −Y1 )−1 + (E1 )Y2 (x4 )17 W = = = x4 + x2 + x. (E1 )Y1 (x3 + x + 1)5 p(x) x5 +x2 +1 Since the calculated value does not match the public key of the satellite, this means that the session keys change in a timely manner. 9 5 Conclusion The article presents an imitation-resistant authentication protocol based on proof with zero knowledge disclosure, which allows to determine the status of a spacecraft with minimal time costs. A comparative analysis showed that with a response depth of L = 72 bits, the probability of a satellite passing by an identification system based on the Fiat-Shamir protocol will be PP S (1) = 2.1 · 10−22 , and using the developed protocol, the probability of a satellite passing by an identification system will be PP S (2) = 6.7 · 10−24 . Thus, the use of the developed protocol makes it possible to increase the simulated resistance of a satellite communication system in comparison with the Fiat-Shamir protocol. 6 Acknowledgments This work was supported by the Russian Foundation for Basic Research, project No. 18-07-01020. References [Feg03] Ferguson N., Schneier B. Practical Cryptography. - New York: John Wiley & Sons, 2003. - 432 p. [Feg10] Ferguson N., Schneier B., Kohno T. Cryptography Engineering. New York: John Wiley & Sons, 2010. - 382 p. [Gos15] Gostev D.V., Kalmykov M.I., Stepanova E.P., Toporkova E.V. Customer authentication protocol based on zero-disclosure evidence for electronic systems // Certificate of state registration of computer programs No. 2015612379, 2014 [Iri18] Iridium Satellite Communication https://www.iridium.com/services/iridium-certus [Lap18] Lapina, M., Kalmykov, I., Kononova, N., Kalmikov, M. Development of the protocol ”electronic cash” with inspection correction rules of the electronic e-cash number for e-commerce systems // CEUR Workshop Proceedings 2254, 2018. - p. 147-153. [Mcd17] McDermott, Roger N. Russia’s Electronic Warfare Capabilities to 2025: Challenging NATO in the Electromagnetic. - Jermalavicius, Tomas, September 2017. - 48 p. [Pas18] Pashintsev V.P., Zhuk H.A. Application of spoof resistant authentication protocol of spacecraft in low earth orbit systems of satellite communication // International Journal Issue 15, May, pp. 958-965, of Mechanical Engineering and Technology (IJMET), 2018, Volume 9, Article ID: IJMET 09 05 106 [Poi12] Poisel R. Antenna Systems & Electronic Warfare Applications. - Artech House, 2012. - 1036 p. [Shr96] Schneier B. Applied cryptography. Second edition. - New York: John Wiley & Sons, 1996. - 784 p. [Sha03] Shafi Goldwasser, Shafi and Yael Kalai, 2003: On the (In) security of theFOCS 2003. - pp. 102-114. Battlefield Combat Identification System: http://www.globalsecurity.org/military/systems/ground/bcis.htm cash” with inspection correction rules of the electronic e-cash number for e-commerce // EUR Workshop Proceedings 2254, 2018. - pp. 147-153. [Smi02] Smith R. Authenticaton: From Passwords to Public Keys. - New York: Addison-Wesley Publishing Company, Inc., 2002. - 352 p. [Sta99] Stallings W.Network and Internetwork Security: principles and practice, Second Edition, Prentice-Hall, Inc., 1999. - 459 pp. [Wha18] What Is Iridium NEXT. http://www.argo.ucsd.edu/sat comm AST13.pdf 10