Industrial Applications of Cryptography
-
Upload
david-podhola -
Category
Technology
-
view
904 -
download
0
description
Transcript of Industrial Applications of Cryptography
![Page 1: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/1.jpg)
Industrial applications of cryptography
David Podhola
Prague College
30. kvetna 2011
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 1 / 35
![Page 2: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/2.jpg)
Abstract
In this topic industrial implementations of cryptography will be introduced.It is focusing on the electric power industry with particular aspects topower generation in nuclear powerplants, transmission, distribution andretail. The implications of storing sensitive personal data as well as dealingwith invoicing and the customer’s money at the end will be described anddiscussed.
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 2 / 35
![Page 3: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/3.jpg)
Electricity
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 3 / 35
![Page 4: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/4.jpg)
Electricity
“Phenomenon associated with stationary or moving electric charges.The word comes from the Greek elektron (“amber”); the Greeksdiscovered that amber rubbed with fur attracted light objects such asfeathers. Such effects due to stationary charges, or static electricity, werethe first electrical phenomena to be studied. Not until the early 19thcentury were static electricity and electric current shown to be aspects ofthe same phenomenon. The discovery of the electron, which carries acharge designated as negative, showed that the various manifestations ofelectricity are the result of the accumulation or motion of numbers ofelectrons. The invention of the incandescent lightbulb (1879) and theconstruction of the first central power station (1881) by Thomas AlvaEdison led to the rapid introduction of electric power into factories andhomes. See also James Clerk Maxwell.”1
1Encyclopaedia BritannicaDavid Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 4 / 35
![Page 5: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/5.jpg)
Electric power industry
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 5 / 35
![Page 6: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/6.jpg)
Electric power industry
“The electric power industry provides the production and delivery ofelectric energy, often known as power, or electricity, in sufficient quantitiesto areas that need electricity through a grid connection. The griddistributes electrical energy to customers. Electric power is generated bycentral power stations or by distributed generation.Many households and businesses need access to electricity, especially indeveloped nations, the demand being scarcer in developing nations.Demand for electricity is derived from the requirement for electricity inorder to operate domestic appliances, office equipment, industrialmachinery and provide sufficient energy for both domestic and commerciallighting, heating, cooking and industrial processes. Because of this aspectof the industry, it is viewed as a public utility as infrastructure.”2
2WikipediaDavid Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 6 / 35
![Page 7: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/7.jpg)
Current consumption of the Czech Republic
This whole industry is run and controlled by a lot of computers. They havegreat numbers on their fingertips, but...
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 7 / 35
![Page 8: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/8.jpg)
Threats
Threats:3
Intrusion: malicious attackers may intrude client or server bysearching vulnerabilities, and the stable service of control boards maybe threatened.
Impersonation: operators who don’t have the right accounts but canenter , may impersonate operators who have the right accounts sandthe stable service of control boards may be threatened.
Tapping: malicious attackers may tap packets on the Internet, anddata sent and received may be threatened.
Obstruction: malicious attackers may attack client or server veryoften, and smooth operation may be threatened.
Destruction: operators who have the right accounts may executeillegal operations unjustly, and the stable service of control boardsmay be threatened.
3The Security Design of Remote Maintenance System for Nuclear Power Plants,based on ISO/IEC 15408
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 8 / 35
![Page 9: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/9.jpg)
What is cryptography?
The practice and study of hiding information.
Now is much more complex than just encryption to apparent nonsense.
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 9 / 35
![Page 10: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/10.jpg)
Encryption and decryption
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 10 / 35
![Page 11: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/11.jpg)
Public-key cryptography
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 11 / 35
![Page 12: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/12.jpg)
Public-key cryptography
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 12 / 35
![Page 13: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/13.jpg)
Public key infrastructure
CA = Certificate Authority RA = Registration Authority
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 13 / 35
![Page 14: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/14.jpg)
My public key
I am not afraid to show you my public key!
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 14 / 35
![Page 15: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/15.jpg)
Signing
If you have just your key, you can sign
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 15 / 35
![Page 16: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/16.jpg)
Encryption
If you have both keys, you can encrypt
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 16 / 35
![Page 17: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/17.jpg)
General attributes of public keys
Increased security and convenience.
private keys never need to transmitted or revealed to anyone
digital signatures
speed
vulnerable to impersonation (attack on a certification authority)
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 17 / 35
![Page 18: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/18.jpg)
Electric power industry
The legal unbundling laid down in 2005 as part of the second Europeanenergy market package applies in 11 out of 27 EU countries.
Generation
Transmission
Distribution (e.g. consumption measurements)
Retailing (e.g. end customer invoicing)
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 18 / 35
![Page 19: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/19.jpg)
High level overview
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 19 / 35
![Page 20: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/20.jpg)
Organizations involved - CEPS
CEPS jsc is a joint-stock company operating Transmission System (TS) ofthe Czech Republic by law.
ensuring electricity transmission
ensuring balance between electricity generation and consumption atany moment
maintenance, modernization and development of TS equipment
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 20 / 35
![Page 21: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/21.jpg)
Organizations involved - OTE
A processing and reporting business balance of elektricity according todata supplied by electricity market participants.An organization of short-term markets and balancing market withregulating energy in cooperation with transmission system operator.The evaluation and settlement of imbalances between the agreed andactual electricity supplies and consumption.Publishing monthly and annual reports about Czech elektricity market.Collecting metered data from deliveries and supplies for marketpaticipants.The evaluation and settlement of regulating energy.Administration of registry for trading with greenhouse gas emissionallowances.
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 21 / 35
![Page 22: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/22.jpg)
OTE CA
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 22 / 35
![Page 23: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/23.jpg)
Electricity generation
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 23 / 35
![Page 24: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/24.jpg)
Electricity generation
For nuclear powerplants Title 10 of the Code of Federal Regulations (10CFR) Section 73.21(g)(3) states, in part, “. . . Safeguards Informationshall be transmitted only by protected telecommunication circuits(including facsimile) approved by the NRC.” The Nuclear RegulatoryCommission (NRC) considers those encryption systems that the NationalInstitute of Standards and Technology (NIST) has determined conform tothe Security Requirements for Cryptographic Modules in FederalInformation Processing Standard (FIPS) 140-2, as being acceptable. TheSecretary of Commerce has made use of Cryptographic Module ValidationProgram products mandatory and binding for Federal agencies when aFederal agency determines that cryptography is necessary for protectingsensitive information.
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 24 / 35
![Page 25: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/25.jpg)
Stuxnet
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 25 / 35
![Page 26: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/26.jpg)
Stuxnet
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 26 / 35
![Page 27: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/27.jpg)
Transmission
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 27 / 35
![Page 28: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/28.jpg)
Distribution
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 28 / 35
![Page 29: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/29.jpg)
Distribution
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 29 / 35
![Page 30: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/30.jpg)
Retailing
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 30 / 35
![Page 31: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/31.jpg)
Communication
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 31 / 35
![Page 32: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/32.jpg)
Communication
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 32 / 35
![Page 33: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/33.jpg)
Communication
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 33 / 35
![Page 34: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/34.jpg)
SmartGrid
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 34 / 35
![Page 35: Industrial Applications of Cryptography](https://reader033.fdocuments.us/reader033/viewer/2022052411/55622426d8b42ab6588b4d70/html5/thumbnails/35.jpg)
Thank you!
David [email protected], [email protected]
http://david.podhola.net
David Podhola (Prague College) Industrial applications of cryptography 30. kvetna 2011 35 / 35