Post Quantum Secure Command and Control of Mobile Agents : Inserting quantum-resistant encryption schemes in the Secure Robot Operating System

by   Richa Varma, et al.

The secure command and control (C C) of mobile agents arises in various settings including unmanned aerial vehicles, single pilot operations in commercial settings, and mobile robots to name a few. As more and more of these applications get integrated into aerospace and defense use cases, the security of the communication channel between the ground station and the mobile agent is of increasing importance. The development of quantum computing devices poses a unique threat to secure communications due to the vulnerability of asymmetric ciphers to Shor's algorithm. Given the active development of new quantum resistant encryption techniques, we report the first integration of post-quantum secure encryption schemes with the robot operating system (ROS) and C C of mobile agents, in general. We integrate these schemes in the application and network layers, and study the performance of these methods by comparing them to present day security schemes such as the widely used RSA algorithm.


Powerful Primitives in the Bounded Quantum Storage Model

The bounded quantum storage model aims to achieve security against compu...

Post-Quantum Era in V2X Security: Convergence of Orchestration and Parallel Computation

Along with the potential emergence of quantum computing, safety and secu...

On non-adaptive quantum chosen-ciphertext attacks and Learning with Errors

Large-scale quantum computing is a significant threat to classical publi...

Comparative study of Joint Image Encryption and Compression Schemes: A Review

With the development of imaging methods in wireless communications, enha...

The impact of quantum computing on real-world security: A 5G case study

This paper provides a detailed analysis of the impact of quantum computi...

FIPS Compliant Quantum Secure Communication using Quantum Permutation Pad

Quantum computing has entered fast development track since Shor's algori...

Composing Bridges

The present work builds on previous investigations of the authors (and t...

Please sign up or login with your details

Forgot password? Click here to reset