Development of security mechanisms for scada systems in the postquantium period

О. В. Воропай, С.С. Погасій, О. Г. Король, С.В. Мілевський
{"title":"Development of security mechanisms for scada systems in the postquantium period","authors":"О. В. Воропай, С.С. Погасій, О. Г. Король, С.В. Мілевський","doi":"10.30748/soi.2022.169.03","DOIUrl":null,"url":null,"abstract":"The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks. This allows to significantly increase the speed of information transmission using modern wireless communication channels based on technology standards IEEE802.16, IEEE802.16e, IEEE802.15.4, IEEE802.11, Bluetooth 5, 6. It is possible to use SCADA automation and scheduling systems with new functions of managing information flows of various technological processes, to create new principles for building hyperphysical social systems (CPSS) – a set of subjects and objects of cybernetic, physical and social worlds that allow to form “smart” communities, on the one hand , and intellectual space on the other. However, the development of modern computer systems, the advent of full-scale quantum computers significantly impairs the security of modern security systems. According to NIST experts, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, which significantly reduces their stability. The goal of the work is to develop mechanisms for providing security services based on post-quantum algorithms - crypto-code constructions. To ensure security in the post-quantum period – the emergence of a full-scale quantum computer, NIST specialists suggest the use of post-quantum algorithms. Structural schemes of crypto-code constructions of McEliece and Niederreiter on algebrogeometric codes are used in the work. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the management system of SCADA systems, not only in critical infrastructure, but also in modern wireless communication channels. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. The developed approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms. The use of post-quantum encryption algorithms provides a significant increase in the cryptographic stability of security mechanisms SCADA-systems.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sistemi obrobki informatsiyi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30748/soi.2022.169.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks. This allows to significantly increase the speed of information transmission using modern wireless communication channels based on technology standards IEEE802.16, IEEE802.16e, IEEE802.15.4, IEEE802.11, Bluetooth 5, 6. It is possible to use SCADA automation and scheduling systems with new functions of managing information flows of various technological processes, to create new principles for building hyperphysical social systems (CPSS) – a set of subjects and objects of cybernetic, physical and social worlds that allow to form “smart” communities, on the one hand , and intellectual space on the other. However, the development of modern computer systems, the advent of full-scale quantum computers significantly impairs the security of modern security systems. According to NIST experts, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, which significantly reduces their stability. The goal of the work is to develop mechanisms for providing security services based on post-quantum algorithms - crypto-code constructions. To ensure security in the post-quantum period – the emergence of a full-scale quantum computer, NIST specialists suggest the use of post-quantum algorithms. Structural schemes of crypto-code constructions of McEliece and Niederreiter on algebrogeometric codes are used in the work. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the management system of SCADA systems, not only in critical infrastructure, but also in modern wireless communication channels. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. The developed approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms. The use of post-quantum encryption algorithms provides a significant increase in the cryptographic stability of security mechanisms SCADA-systems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
后量子化时期scada系统安全机制的发展
基于移动互联网技术与网络空间综合的新系统的形成,极大地扩展了创建基于网格和传感器网络的智能技术的可能性。这使得使用基于技术标准IEEE802.16、IEEE802.16e、IEEE802.15.4、IEEE802.11、蓝牙5、6的现代无线通信信道可以显著提高信息传输速度。SCADA自动化和调度系统具有管理各种技术流程信息流的新功能,可以为构建超物理社会系统(CPSS)创造新的原则——一组控制论、物理和社会世界的主体和客体,一方面可以形成“智能”社区,另一方面可以形成智力空间。然而,随着现代计算机系统的发展,全尺寸量子计算机的出现大大削弱了现代安全系统的安全性。根据NIST专家的说法,全尺寸量子计算机在多项式时间内破坏对称和非对称密码系统,这大大降低了它们的稳定性。这项工作的目标是开发基于后量子算法(加密代码结构)提供安全服务的机制。为了确保后量子时代的安全——全尺寸量子计算机的出现,NIST专家建议使用后量子算法。本文采用了代数几何码的McEliece和Niederreiter的密码构造结构方案。本文提出了一种后量子密码机制,不仅可以保证通信信道的稳定性,还可以保证关键基础设施以及现代无线通信信道中SCADA系统管理系统结构要素的稳定性。后量子加密算法的基础是将密码结构的算法(方案)与无利码上的密码系统(多通道密码)相结合,以及与数字隐写方法相结合的可能性。所开发的方法提供了隐藏管理命令元素的能力,并且使用不同的通道提供了隐藏密码的单个元素的能力。后量子加密算法的使用大大提高了scada系统安全机制的加密稳定性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
15
审稿时长
6 weeks
期刊最新文献
Статистичний аналіз впливу факторів на моральний потенціал учасників бойових дій у системі Wolfram Mathematica Метод підвищення роздільної здатності широкосмугових сигналів по частоті Доплера на фоні адитивного шуму з невідомою щільністю розподілу імовірностей Модифікований рекурентний метод достовірної нечіткої кластеризації з використанням оптимізаційної процедури на основі косяків риб Методи об’єднання (консолідації) потоків повідомлень про повітряну обстановку від різнорідних джерел інформації Оцінка математичного сподівання кількості знищених засобів повітряного нападу угрупованням зенітних ракетних військ з урахуванням складу повітряного удару по об’єкту прикриття
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1