114 research outputs found

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    Get PDF
    We construct a bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide the necessary security within timing constraints; the previous solution that does provide the necessary security is not BITW. At a comparable hardware cost, our BITW solution provides sufficient security, and yet incurs minimal end-to-end communication latency. A microcontroller prototype of our solution is under development

    A quantum key distribution protocol for rapid denial of service detection

    Get PDF
    We introduce a quantum key distribution protocol designed to expose fake users that connect to Alice or Bob for the purpose of monopolising the link and denying service. It inherently resists attempts to exhaust Alice and Bob's initial shared secret, and is 100% efficient, regardless of the number of qubits exchanged above the finite key limit. Additionally, secure key can be generated from two-photon pulses, without having to make any extra modifications. This is made possible by relaxing the security of BB84 to that of the quantum-safe block cipher used for day-to-day encryption, meaning the overall security remains unaffected for useful real-world cryptosystems such as AES-GCM being keyed with quantum devices.Comment: 13 pages, 3 figures. v2: Shifted focus of paper towards DoS and added protocol 4. v1: Accepted to QCrypt 201

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)

    Get PDF
    We construct a bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in legacy Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical infrastructures such as the electric power grid rely. Previous BITW solutions do not provide the necessary security within timing constraints; the previous solution that does is not BITW. At a hardware cost comparable to existing solutions, our BITW solution provides sufficient security, and yet incurs minimal end-to-end communication latency

    Point - to - Point Virtual Private Network Based on IP Filtering and Rijndael Encryption Algorithm

    Get PDF
    The Rijndael algorithm was chosen to take advantage of its features and add recent technology to increase the confidentiality and security for the transfer of sensitive data on some important institutions. Rijndael algorithm (Advance Encryption Standard) is the Encryption of Symmetric Key, each one of the keys has size of 128 bit. Each round consists of several processing steps; one of them is depend on the encryption key. Therefore NEDRO program has been designed depending on Rijndael algorithm and updated by adding the key (Initialization Vector), in addition to taking into consideration the possibilities that could face the process of transmission of data between   two sides. Finally NEDRO program has implemented and tested practically between two points (User making encryption and Host making decryption or Host making encryption and User making decryption at the same time ) Keywords : Cryptography , Rijndael (AES) ,Data Security , Encryption , Decryptio
    corecore