doi: 10.17586/2226-1494-2016-16-5-850-855


I. A. Avdonin, M. B. Budko, V. A. Grozov

Read the full article  ';
Article in Russian

For citation: Avdonin I.A., Budko M.B., Grozov V.A. Vernam cipher based method of protection for data transferred between unmanned aircraft and ground control station. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2016, vol. 16, no. 5, pp. 850–855. doi: 10.17586/2226-1494-2016-16-5-850-855


The paper deals with questions of protection against unauthorized access to the data transmitted between unmanned aircraft vehicle (UAV) and ground control station (GCS). This is due to the fact that standard instruments of network security sometimes provide security of not enough proper level or do not satisfy the restrictions connected with the features of UAV: limited computing resources of the UAV on-board computer and real-time operation. We have offered to use Vernam cipher (one-time pad) as an additional measure for data protection. Vernam algorithm combines such advantages as theoretically proved absolute cryptographic security, ease of implementation, high speed of encryption and low processor load. It is especially important for large volumes of data encryption (e.g. video information). Within the bounds of experimental researches the technique is used based on cryptographic gamma of block cipher GOST 28147-89 in the Cipher Feedback Mode for a one-time pad generation. Application of Vernam cipher means the deletion of used one-time pad pages. The replacement of used one-time pad pages by cipher text is proposed for assurance of the above-named requirement and for simultaneous computer memory saving. It gives additionally the opportunity not only to save key sequences but also to accumulate encrypted data in the on-board computer memory. Realization of the offered method allows increasing the data protection level without engaging large computing power and memory capacity.

Keywords: Vernam cipher, one-time pad, GOST 28147-89 cipher, cipher feedback mode, unmanned aircraft vehicle (UAV), ground control station, protection against unauthorized access

Acknowledgements. This study was performed under a grant by the Russian Science Foundation (Project 16-11-00049).


1. Moiseev V.S. Osnovy Teorii Effektivnogo Primeneniya Bespilotnykh Letatel'nykh Apparatov [Bases of Efficient Use Theory of Unmanned Aircraft]. Kazan', Tsenter Shkola Publ., 2015, 444 p.
2. Fetisov V.S., Neugodnikova L.M., Adamovskii V.V., Krasnoperov R.A. Bespilotnaya Aviatsiya: Terminologiya, Klassifikatsiya, Sovremennoe Sostoyanie [Unmanned Aircraft: Terminology, Classification, Current Status]. Ufa, Foton Publ., 2014, 217 p.
3. Blagodyrev V.A., Khachumov V.M. Protection of computing systems of space vehicles control. Aerospace Instrument-Making, 2012, no. 8, pp. 11–25.
4. Mansfield K., Eveleigh T., Holzer T.H., Sarkani S. Unmanned aerial vehicle smart device ground control station cyber security threat model. Proc. 13th IEEE Int. Conf. on Technologies for Homeland Security, HST. Waltham, USA, 2013, pp. 722–728. doi: 10.1109/THS.2013.6699093
5. Hartmann K., Steup C. The vulnerability of UAVs to cyber attacks – an approach to the risk assessmen. Proc. 5th Int. Conf. on Cyber Conflict. Tallinn, Estonia, 2013, pp. 1–23.
6. Boev N.M. Analysis of UAV radio control and telemetry systems. Vestnik of SibGAU, 2012, no. 2, pp. 86–91.
7. Saarelainen T., Jormakka J. Tools for future battlefield warriors. Proc. 5th Int. Conf. on Digital Telecommunications, ICDT. Athens, Greece, 2010, pp. 224–233. doi: 10.1109/ICDT.2010.15
8. Meshcheryakov R.V., Rososhek S.K., Son'kin M.A., Shelupanov A.A. Cryptographic protocol in limited resourse systems. Computational Technologies, 2007, vol. 12, no. S1, pp. 51–61. (In Russian)
9. Avdoshin S.M., Savelieva A.A. Cryptanalysis: current state and future trends. Information Technology, 2007, no. S3, pp. 1–24.
10. Shannon C.E. Communication theory of secrecy systems. The Bell System Technical Journal, 1949, vol. 28, no. 4, pp. 656–715. doi: 10.1002/j.1538-7305.1949.tb00928.x
11. Schneier B. Applied Cryptography. 2nd ed. Wiley, 1995.
12. Ryabko B.Ya. The Vernam cipher is robust to small deviations from randomness. Problems of Information Transmission, 2015, vol. 51, no. 1, pp. 82–86. doi: 10.1134/S0032946015010093
13. Matt C., Maurer U. The one-time pad revisited. Proc. IEEE Int. Symposium on Information Theory, ISIT. Istanbul, Turkey, 2013, pp. 2706–2710. doi: 10.1109/ISIT.2013.6620718
14. Shukla R., Prakash H.O., Brushan R.P., Venkataraman S., Varadan G. Unconditionally secure and authenticated one time pad cryptosystem. Proc. Int. Conf. on Machine Intelligence and Research Advancement, ICMIRA. Katra, India, 2013, pp. 174–178. doi: 10.1109/ICMIRA.2013.40
15. Du R., Sun Z., Wang B., Long D. Quantum secret sharing of secure direct communication using one-time pad. International Journal of Theoretical Physics, 2012, vol. 51, no. 9, pp. 2727–2736. doi: 10.1007/s10773-012-1147-1
16. Guo Y., Xie J., Li J., Lee M.H. An arbitrated quantum signature scheme based on chaotic quantum encryption algorithm. Journal of Modern Physics, 2013, vol. 4, pp.  83–88. doi: 10.4236/jmp.2013.45B014
17. Zubov A.Yu. Sovershennye Shifry [Perfect Ciphers]. Moscow, Gelios ARV Publ., 2003, 160 p.
18. Blum L., Blum M., Shub M. A simple unpredictable pseudo-random number generator. SIAM Journal of Computing, 1986, vol. 15, no. 2, pp. 364–383. doi: 10.1137/0215025
19. Gutterman Z., Pinkas B., Reinman T. Analysis of the Linux random number generator. Proc. IEEE Symposium on Security and Privacy. Oakland, USA, 2006, pp. 371–385. doi: 10.1109/SP.2006.5
20. Luby M., Rackoff C. How to construct pseudorandom permutations and pseudorandom functions. SIAM Journal of Computing, 1988, vol. 17, no. 2, pp. 373–386. doi: 10.1137/0217022

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.