Development of an algorithm with temporary cryptographic security for encrypting video stream from an unmanned aerial vehicle
DOI:
https://doi.org/10.15587/1729-4061.2025.340917Keywords:
UAV, video data encryption, temporal cryptographic security, lightweight cryptographic algorithms, block ciphers, PRESENTAbstract
This study considers the process that protects a video stream transmitted from the onboard video camera of an unmanned aerial vehicle (UAV) to a ground station in the front and near-front zones. The specificity of the task set is predetermined, on the one hand, by the limited computing resources of onboard equipment, which must encrypt an intensive data stream in real time, and, on the other hand, by the relatively short life span of UAV under combat conditions (especially for FPV kamikaze drones) ranging from 10 minutes to several days.
Most known works in this field consider algorithms focused on application in other settings, with the main efforts aimed at achieving maximal cryptographic security. Unlike the technological advancements highlighted in the available literature, this study has managed to solve the specified problem by taking into account its specific features and utilizing a certain trade-off between the speed and resource intensity of the algorithm, on the one hand, and its security, on the other.
The result was achieved through a detailed comparative analysis and categorization of the closest solutions in terms of characteristics, which is the largest part of the study. Based on its results, the PRESENT algorithm was chosen as the first approximation.
The proposed solution is based on the use of a modification of this algorithm reduced to 16 rounds in counter mode. Analysis of the resulting solution reveals that its cryptographic security requires more than 2 months of computational work when implementing the best attack, i.e., the security of the algorithm is reasonably acceptable.
For practical application of the theoretical results, it is necessary to carefully check the properties of the proposed solution implemented in the equipment under field conditions, as close as possible to combat operations, and, if necessary, to make the necessary adjustments
References
- Cox, J., Wong, K. (2019). Predictive feedback augmentation for manual control of an unmanned aerial vehicle with latency. International Journal of Micro Air Vehicles, 11. https://doi.org/10.1177/1756829319869645
- Kamtam, S. B., Lu, Q., Bouali, F., Haas, O. C. L., Birrell, S. (2024). Network Latency in Teleoperation of Connected and Autonomous Vehicles: A Review of Trends, Challenges, and Mitigation Strategies. Sensors, 24 (12), 3957. https://doi.org/10.3390/s24123957
- ECP5/ECP5-5G. Family Table. ECP5 and ECP5-5G Device Selection Guide. Lattice Semiconductor. Available at: https://www.latticesemi.com/Products/FPGAandCPLD/ECP5
- Series FPGAs Data Sheet: Overview. DS180 (v2.6.1) (2020). Product Specification. AMD XILINX. Available at: https://docs.amd.com/v/u/en-US/ds180_7Series_Overview
- Ashrif, F. F., Sundararajan, E. A., Ahmad, R., Hasan, M. K., Yadegaridehkordi, E. (2024). Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction. Journal of Network and Computer Applications, 221, 103759. https://doi.org/10.1016/j.jnca.2023.103759
- Ismael, H. M., Al-Ta'i, Z. T. M. (2021). Authentication and Encryption Drone Communication by Using HIGHT Lightweight Algorithm. Turkish Journal of Computer and Mathematics Education, 12 (11), 5891–5908. Available at: https://www.researchgate.net/publication/392193717_Authentication_and_Encryption_Drone_Communication_by_Using_HIGHT_Lightweight_Algorithm
- Cecchinato, N., Toma, A., Drioli, C., Oliva, G., Sechi, G., Foresti, G. L. (2022). A Secure Real-time Multimedia Streaming through Robust and Lightweight AES Encryption in UAV Networks for Operational Scenarios in Military Domain. Procedia Computer Science, 205, 50–57. https://doi.org/10.1016/j.procs.2022.09.006
- Rahiyanath, T. Y. (2015). A Novel Architecture for Lightweight Block Cipher, Piccolo. International Journal of Research in Engineering and Technology, 04 (09), 97–103. Available at: https://ijret.org/volumes/2015v04/i09/IJRET20150409017.pdf
- Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B. et al. (2007). PRESENT: An Ultra-Lightweight Block Cipher. Cryptographic Hardware and Embedded Systems - CHES 2007, 450–466. https://doi.org/10.1007/978-3-540-74735-2_31
- Safronov, T. (2024). AES-256: V Ukrspecsystems rozkryly detali shyfruvannia danykh BPLA Shark. Militarnyi. Available at: https://militarnyi.com/uk/news/zahyst-danyh-vid-bpla-shark-posylyly-shyfruvannyam-aes-256/
- Belazi, A., Migallón, H. (2024). Drone-Captured Wildlife Data Encryption: A Hybrid 1D–2D Memory Cellular Automata Scheme with Chaotic Mapping and SHA-256. Mathematics, 12 (22), 3602. https://doi.org/10.3390/math12223602
- Ozmen, M. O., Yavuz, A. A. (2018). Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones. MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM). https://doi.org/10.1109/milcom.2018.8599784
- Eldeeb, H., Shehata, K., Shaker, N., Abdel Hafez, A. (2012). HANK-1, A new Efficient and Secure Block Cipher Algorithm for Limited Resources Devices. The International Conference on Electrical Engineering, 1–12. https://doi.org/10.21608/iceeng.2012.30662
- Bassham, L. E., Rukhin, A. L., Soto, J., Nechvatal, J. R., Smid, M. E., Barker, E. B. et al. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology. https://doi.org/10.6028/nist.sp.800-22r1a
- Ramudu, S., Shanthi, G. (2015). Implementation of an Ultra-Lightweight Block Cipher. International Journal & Magazine of Engineering, Technology, Management and Research, 2 (2), 233–242. Available at: http://www.ijmetmr.com/olfebruary2015/SriRamudu-GShanthi-39.pdf
- Yang, Y., Dong, H., Li, Z., Xiao, S. (2023). LWED: Lightweight white-box encryption communication system for drones over CARX algorithm. Journal of King Saud University - Computer and Information Sciences, 35 (9), 101727. https://doi.org/10.1016/j.jksuci.2023.101727
- Yatao, Y., Ruoqing, Z., Hui, D., Yingjie, M., Xiaowei, Z. (2023). WBZUC: novel white-box ZUC-128 stream cipher. The Journal of China Universities of Posts and Telecommunications, 78 (11), 96–106. https://doi.org/10.19682/j.cnki.1005-8885.2022.0022
- Hei, X., Song, B., Ling, C. (2017). SHIPHER: A new family of light-weight block ciphers based on dynamic operators. 2017 IEEE International Conference on Communications (ICC), 1–7. https://doi.org/10.1109/icc.2017.7996731
- Lai, X., Massey, J. L. (1991). A Proposal for a New Block Encryption Standard. Advances in Cryptology – EUROCRYPT ’90, 389–404. https://doi.org/10.1007/3-540-46877-3_35
- Meleshko, Y., Maidanyk, O., Sobinov, O., Mynailenko, R. (2021). A Method of Encrypting the Traffic of Quadrocopters Through an A nalog Path During Monitoring of Agricultural Ground Objects. National Interagency Scientific and Technical Collection of Works. Design, Production and Exploitation of Agricultural Machines, 51, 216–226. https://doi.org/10.32515/2414-3820.2021.51.216-226
- Myronchuk, K., Vatslavyk, O. (2017). Zabezpechennia peredachi danykh v BPLA. Available at: https://sci.ldubgd.edu.ua/jspui/bitstream/123456789/4474/1/Дрони-МИрончук-Вацлавик.pdf
- Hell, M., Johansson, T. (2010). Security Evaluation of Stream Cipher Enocoro-128v2. CRYPTREC Technical Report. Available at: https://lup.lub.lu.se/search/files/5976181/2433492.pdf
- Block Cipher Modes. Computer Security Resource Center. NIST. Available at: https://csrc.nist.gov/Projects/block-cipher-techniques/bcm
- Blondeau, C., Gérard, B. (2011). Multiple Differential Cryptanalysis: Theory and Practice. Fast Software Encryption, 35–54. https://doi.org/10.1007/978-3-642-21702-9_3
- Z’aba, M. R., Raddum, H., Henricksen, M., Dawson, E. (2008). Bit-Pattern Based Integral Attack. Fast Software Encryption, 363–381. https://doi.org/10.1007/978-3-540-71039-4_23
- Wang, M. (2008). Differential Cryptanalysis of Reduced-Round PRESENT. Progress in Cryptology – AFRICACRYPT 2008, 40–49. https://doi.org/10.1007/978-3-540-68164-9_4
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Liudmyla Kovalchuk, Anatolii Davydenko, Tatiana Klymenko, Arina Nedashkivska, Serhii Hilgurt

This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.





