Development of security mechanisms for scada systems in the postquantium period

О. В. Воропай, С.С. Погасій, О. Г. Король, С.В. Мілевський
{"title":"Development of security mechanisms for scada systems in the postquantium period","authors":"О. В. Воропай, С.С. Погасій, О. Г. Король, С.В. Мілевський","doi":"10.30748/soi.2022.169.03","DOIUrl":null,"url":null,"abstract":"The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks. This allows to significantly increase the speed of information transmission using modern wireless communication channels based on technology standards IEEE802.16, IEEE802.16e, IEEE802.15.4, IEEE802.11, Bluetooth 5, 6. It is possible to use SCADA automation and scheduling systems with new functions of managing information flows of various technological processes, to create new principles for building hyperphysical social systems (CPSS) – a set of subjects and objects of cybernetic, physical and social worlds that allow to form “smart” communities, on the one hand , and intellectual space on the other. However, the development of modern computer systems, the advent of full-scale quantum computers significantly impairs the security of modern security systems. According to NIST experts, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, which significantly reduces their stability. The goal of the work is to develop mechanisms for providing security services based on post-quantum algorithms - crypto-code constructions. To ensure security in the post-quantum period – the emergence of a full-scale quantum computer, NIST specialists suggest the use of post-quantum algorithms. Structural schemes of crypto-code constructions of McEliece and Niederreiter on algebrogeometric codes are used in the work. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the management system of SCADA systems, not only in critical infrastructure, but also in modern wireless communication channels. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. The developed approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms. The use of post-quantum encryption algorithms provides a significant increase in the cryptographic stability of security mechanisms SCADA-systems.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sistemi obrobki informatsiyi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30748/soi.2022.169.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks. This allows to significantly increase the speed of information transmission using modern wireless communication channels based on technology standards IEEE802.16, IEEE802.16e, IEEE802.15.4, IEEE802.11, Bluetooth 5, 6. It is possible to use SCADA automation and scheduling systems with new functions of managing information flows of various technological processes, to create new principles for building hyperphysical social systems (CPSS) – a set of subjects and objects of cybernetic, physical and social worlds that allow to form “smart” communities, on the one hand , and intellectual space on the other. However, the development of modern computer systems, the advent of full-scale quantum computers significantly impairs the security of modern security systems. According to NIST experts, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, which significantly reduces their stability. The goal of the work is to develop mechanisms for providing security services based on post-quantum algorithms - crypto-code constructions. To ensure security in the post-quantum period – the emergence of a full-scale quantum computer, NIST specialists suggest the use of post-quantum algorithms. Structural schemes of crypto-code constructions of McEliece and Niederreiter on algebrogeometric codes are used in the work. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the management system of SCADA systems, not only in critical infrastructure, but also in modern wireless communication channels. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. The developed approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms. The use of post-quantum encryption algorithms provides a significant increase in the cryptographic stability of security mechanisms SCADA-systems.
后量子化时期scada系统安全机制的发展
基于移动互联网技术与网络空间综合的新系统的形成,极大地扩展了创建基于网格和传感器网络的智能技术的可能性。这使得使用基于技术标准IEEE802.16、IEEE802.16e、IEEE802.15.4、IEEE802.11、蓝牙5、6的现代无线通信信道可以显著提高信息传输速度。SCADA自动化和调度系统具有管理各种技术流程信息流的新功能,可以为构建超物理社会系统(CPSS)创造新的原则——一组控制论、物理和社会世界的主体和客体,一方面可以形成“智能”社区,另一方面可以形成智力空间。然而,随着现代计算机系统的发展,全尺寸量子计算机的出现大大削弱了现代安全系统的安全性。根据NIST专家的说法,全尺寸量子计算机在多项式时间内破坏对称和非对称密码系统,这大大降低了它们的稳定性。这项工作的目标是开发基于后量子算法(加密代码结构)提供安全服务的机制。为了确保后量子时代的安全——全尺寸量子计算机的出现,NIST专家建议使用后量子算法。本文采用了代数几何码的McEliece和Niederreiter的密码构造结构方案。本文提出了一种后量子密码机制,不仅可以保证通信信道的稳定性,还可以保证关键基础设施以及现代无线通信信道中SCADA系统管理系统结构要素的稳定性。后量子加密算法的基础是将密码结构的算法(方案)与无利码上的密码系统(多通道密码)相结合,以及与数字隐写方法相结合的可能性。所开发的方法提供了隐藏管理命令元素的能力,并且使用不同的通道提供了隐藏密码的单个元素的能力。后量子加密算法的使用大大提高了scada系统安全机制的加密稳定性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
15
审稿时长
6 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信