RECONSTRUCTION OF SATELLITE DECRYPTION AND DATA HANDLING PROCESSES
Download
Author
Gilley, Joseph
Date
2019-06Advisor
Newman, James H.
Second Reader
Minelli, Giovanni
Metadata
Show full item recordAbstract
This study examines how to reconstruct a satellite decryption process from source information. It examines how cryptographic algorithms are implemented in software and what software components are required to access data in a useable format. This examination enabled the reverse engineering and reconstruction of the decoding processes utilized by the three PropCubes: Merryweather, Fauna, and Flora. Transmitted data from these PropCubes was analyzed to verify the validity of the developed decryption and data handling Python scripts. A concept of operations for implementing the reconstructed decryption and data handling processes in real-time is discussed in this research.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
A proposal to conduct Government contracting on the Internet
Dunn, Joseph F. (Monterey, California. Naval Postgraduate School, 1998-06);The primary purpose of this thesis is to examine the legal ramifications of conducting Government Agency contracting on the Internet. The author proposes that the Internet is a suitable medium on which to process and conduct ... -
Correlating GSM and 802.11 Hardware Identifiers
Martin, Jeremy; Rhame, Danny; Beverly, Robert; John McEachen (2013-11);The hardware identifiers of common wireless protocols can be exploited by adversaries for both tracking and physical device association. Rather than examining hardware identifiers in isolation, we observe that many modern ... -
A very compact Rijndael S-box
Canright, David R. (2005-05-17);One key step in the Advanced Encryption Standard (AES), or Rijndael, algorithm is called the "S-box", the only nonlinear step in each round of encryption/decryption. A wide variety of implementations of AES have been ...