SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
June 3 Wed., 2015, 11:20-11:30, Technology And Theory For Cybersecurity Of Industrial Control Systems @ Meeting Room 2
Security  Enhancements  of  Networked  
Control  Systems  Using  RSA  Public-‐‑‒
Key  Cryptosystem
Takahiro Fujita
Nara Institute of Science and Technology
Kiminao Kogiso, Kenji Sawada and Seiichi Shin
University of Electro-Communications
The 10th Asian Control Conference
May 31 to June 3, 2015
@ Sutera Harbour Resort, Sabah, Malaysia
Outline
2
Introduction  
Problem  Statement  
RSA-‐‑‒Encrypted  Controller  
Simulation  &  Validation  
Conclusion
Introduction
3
Controller device is important, but exposed to threats of hacking and targeted attacks.
signals: interruption, modeling, stealing recipe, management policy and know-how
parameters: knowledges about system designs and operations
Attacks to networked control system
plantcontroller
ref. (recipe)
control signals
feedback signals
parameters
[1] Sandberg et al., 2015. [2] Sato et al., 2015. [3] Pang et al., 2011
Related works
aiming to conceal the signals
control-theoretical approach: detection[1], positive use of noises[2]
cryptography-based approach: encryption of communication links[3]
no studies trying to encrypt the controller itself…
control
(cipher)
feedback
(cipher)
EncDec
Enc Dec
plantcontroller
ref.
ref.
(cipher)
Enc Dec
Introduction
4
Objective of this work
Realize a cryptography-based control law to conceal both the signals & parameters.
control
(cipher)
feedback
(cipher)
EncDec
Enc Dec
plantcontroller
ref.
ref.
(cipher)
Enc Dec
conventional:
control
(cipher)
feedback
(cipher)
Enc
Dec
plantencrypted
controller
ref.
ref.
(cipher)
Enc
parameters
(cipher)
proposed:
The encrypted controller:
calculates an encrypted control directly from an encrypted feedback signal & an encrypted
reference using encrypted parameters, and
incorporates homomorphism of RSA public-key encryption into the control law.
Problem Statement
5
Encryption of controller
Consider a feedback control law :
K: scalar gain k : discrete time
: scalar plant output
: scalar control inputu
y
f
Controller encryption problem:
Given an encryption scheme , for a control law realize an encrypted law .fE fE
Define an encrypted control law , given an encryption scheme , satisfyingfE
fE (Enc(K), Enc(y)) = Enc(f(K, y))
5
control
(cipher)
feedback
(cipher)
Enc
Dec
plant
parameters
(cipher)
fE (Enc(K), Enc(y))
Enc(y)
Enc(u) u
y
Enc(K)
E
.
u[k] = f(K, y[k]) := Ky[k]
RSA-Encrypted Controller
6[4] Rivest, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystem”, 1978. [5] Rivest, “On Data Banks and Privacy Homomorphisms”, 1978.
RSA public-key encryption
RSA encryption scheme[4,5] (Rivest-Shamir-Adelman cryptosystem)
key generation: public keys , , and private key (prime numbers)
encryption:
decryption:
e n d
m
c
: integer in plaintext space
: integer in ciphertext space
Homomorphism of the RSA encryption[5]
Enc(m1 ⇥ m2) = Enc(m1) ⇥ Enc(m2) mod n
Assumed that and , then the following holds.m1 = K m2 = y
fE (Enc(K), Enc(y)) := Enc(K) ⇥ Enc(y) mod n
= Enc(K ⇥ y) = Enc(u)
c = Enc(m) = me
mod n
m = Enc(c) = cd
mod n
RSA-Encrypted Controller
7
a 2 N
b•e : round function
KpM = ba ⇥ Kpe
yM[k] = ba ⇥ y[k]e
uM[k] = KpMyM[k]
Kp
y[k]
u[k] = Kpy[k]
example: , then .Kp = 0.83, a = 1000 KpM = b1000 ⇥ 0.83e = 830
Remarks
Signals & parameters are real; Plaintext is integer.
need a map: multiplying by a natural number and rounding off to an integer, i.e.,
with and sufficient large, rounding (quantization) error can be made small.
Enc(uM[k]) = Enc(KpM)Enc(yM) mod n
a
encrypted
controller
u[k]
y[k]
Enc
Dec
Enc(KpM)
Enc(yM[k])
Enc(uM[k])
a 2
yM[k]
uM[k]
ba•e
plant
n
Simulation: Controller Encryption
8
Enc(KpM) = (ba ⇥ Kpe)e
mod n = 36364958n = 94399927 e = 587 d = 42929459
(key length 27bit)
Things seen in controller
Kp = 0.83
Enc(KpM) = 36364958
encrypted
controller
Enc(KpM)
Enc(yM[k])
Enc(uM[k])
0 10 20 30
0
5
10
x 10
7
Enc(uM[k])
time[s]
−1
0
1
0 10 20 30
0
5
10
x 10
7
Enc(yM[k])
time[s]
−1
0
1
u[k]y[k]
normal:
proposed:
Kp
u[k]
y[k]
controller
a = 1000
Validation: Protection from Stealing
9
Result of system identification (n4sid)
−150
−100
−50
0
50
10
−1
10
0
10
1
10
2
10
3
−270
−180
−90
0
original closed loop system
without encryption
with encryption
frequency[rad/s]
gain[dB]phase[deg]
Conclusion
10
0 10 20 30
0
5
10
x 10
7
Enc(uM[k])
time[s]
−1
0
1
0 10 20 30
0
5
10
x 10
7
Enc(yM[k])
time[s]
−1
0
1
u[k]y[k]
−150
−100
−50
0
50
10
−1
10
0
10
1
10
2
10
3
−270
−180
−90
0
original closed loop system
without encryption
with encryption
frequency[rad/s]
gain[dB]phase[deg]
Introduction
Problem Statement
controller encryption problem
RSA-Encrypted Controller
homomorphism of RSA encryption
remarks in quantization error
Simulation & Validation
enable to conceal signals & parameters inside
the controller device in terms of cryptography.
enable to hide dynamics of the control system.
Future works
conceal control operations perfectly.
extend to linear and polynomial control laws.
Simulation: Computation Cost
11
0 500 1000 1500 2000 2500 3000
0
1
2
3
4
x 10
−4
steps(sampling interval : 10ms)
computationaltime[s]
MATLAB R2014a Intel Core i5 3.2GHz RAM16GB

Más contenido relacionado

Destacado

Chapter 09
Chapter 09Chapter 09
Chapter 09cclay3
 
Pluggable Authentication Module
Pluggable Authentication ModulePluggable Authentication Module
Pluggable Authentication ModuleSinarShebl
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryptionrajakhurram
 
Cryptography - RSA and ECDSA
Cryptography - RSA and ECDSACryptography - RSA and ECDSA
Cryptography - RSA and ECDSAAPNIC
 
Authentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM ArchitectureAuthentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM ArchitecturePriyank Kapadia
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 

Destacado (9)

Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Pluggable Authentication Module
Pluggable Authentication ModulePluggable Authentication Module
Pluggable Authentication Module
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryption
 
Cryptography - RSA and ECDSA
Cryptography - RSA and ECDSACryptography - RSA and ECDSA
Cryptography - RSA and ECDSA
 
Authentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM ArchitectureAuthentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM Architecture
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 

Similar a Controller encryption using RSA public-key encryption scheme (Asian Control Conference 2015)

Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic CoreMixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic CoreIJERA Editor
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation csandit
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONcscpconf
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmAlexander Decker
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmIJERA Editor
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureAdri Jovin
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
Scan Segmentation Approach to Magnify Detection Sensitivity for Tiny Hardware...
Scan Segmentation Approach to Magnify Detection Sensitivity for Tiny Hardware...Scan Segmentation Approach to Magnify Detection Sensitivity for Tiny Hardware...
Scan Segmentation Approach to Magnify Detection Sensitivity for Tiny Hardware...奈良先端大 情報科学研究科
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
Crack wep-wifi-under100seconds (copied)
Crack wep-wifi-under100seconds (copied)Crack wep-wifi-under100seconds (copied)
Crack wep-wifi-under100seconds (copied)Pedro Mateus
 
Security-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on ClustersSecurity-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on ClustersXiao Qin
 
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...IJNSA Journal
 
IRJET- Design and Characterization of MAEC IP Core
IRJET- Design and Characterization of MAEC IP CoreIRJET- Design and Characterization of MAEC IP Core
IRJET- Design and Characterization of MAEC IP CoreIRJET Journal
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...CSITiaesprime
 
Robust PID Controller Design for Non-Minimum Phase Systems using Magnitude Op...
Robust PID Controller Design for Non-Minimum Phase Systems using Magnitude Op...Robust PID Controller Design for Non-Minimum Phase Systems using Magnitude Op...
Robust PID Controller Design for Non-Minimum Phase Systems using Magnitude Op...IRJET Journal
 

Similar a Controller encryption using RSA public-key encryption scheme (Asian Control Conference 2015) (20)

Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic CoreMixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic Core
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
 
EEG, MEG and FieldTrip
EEG, MEG and FieldTripEEG, MEG and FieldTrip
EEG, MEG and FieldTrip
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
 
Thesis
ThesisThesis
Thesis
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Scan Segmentation Approach to Magnify Detection Sensitivity for Tiny Hardware...
Scan Segmentation Approach to Magnify Detection Sensitivity for Tiny Hardware...Scan Segmentation Approach to Magnify Detection Sensitivity for Tiny Hardware...
Scan Segmentation Approach to Magnify Detection Sensitivity for Tiny Hardware...
 
WiFi Security Explained
WiFi Security ExplainedWiFi Security Explained
WiFi Security Explained
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
cryptography
cryptographycryptography
cryptography
 
Crack wep-wifi-under100seconds (copied)
Crack wep-wifi-under100seconds (copied)Crack wep-wifi-under100seconds (copied)
Crack wep-wifi-under100seconds (copied)
 
Security-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on ClustersSecurity-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on Clusters
 
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
 
IRJET- Design and Characterization of MAEC IP Core
IRJET- Design and Characterization of MAEC IP CoreIRJET- Design and Characterization of MAEC IP Core
IRJET- Design and Characterization of MAEC IP Core
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...
 
Robust PID Controller Design for Non-Minimum Phase Systems using Magnitude Op...
Robust PID Controller Design for Non-Minimum Phase Systems using Magnitude Op...Robust PID Controller Design for Non-Minimum Phase Systems using Magnitude Op...
Robust PID Controller Design for Non-Minimum Phase Systems using Magnitude Op...
 

Más de Kiminao Kogiso

Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...Kiminao Kogiso
 
Transition Models of Equilibrium Assessment in Bayesian Game
Transition Models of Equilibrium Assessment in Bayesian GameTransition Models of Equilibrium Assessment in Bayesian Game
Transition Models of Equilibrium Assessment in Bayesian GameKiminao Kogiso
 
Player's Belief Estimation for Super Human Sports
Player's Belief Estimation for Super Human SportsPlayer's Belief Estimation for Super Human Sports
Player's Belief Estimation for Super Human SportsKiminao Kogiso
 
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...Kiminao Kogiso
 
Application of ElGamal Encryption Scheme to Control System for Security Enhan...
Application of ElGamal Encryption Scheme to Control System for Security Enhan...Application of ElGamal Encryption Scheme to Control System for Security Enhan...
Application of ElGamal Encryption Scheme to Control System for Security Enhan...Kiminao Kogiso
 
Considerations on model predictive control of McKibben pneumatic artificial m...
Considerations on model predictive control of McKibben pneumatic artificial m...Considerations on model predictive control of McKibben pneumatic artificial m...
Considerations on model predictive control of McKibben pneumatic artificial m...Kiminao Kogiso
 
Estimating Player's Belief in Bayesian Game by Feedback Control
Estimating Player's Belief in Bayesian Game by Feedback ControlEstimating Player's Belief in Bayesian Game by Feedback Control
Estimating Player's Belief in Bayesian Game by Feedback ControlKiminao Kogiso
 
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...Kiminao Kogiso
 
Experimental Validation of McKibben Pneumatic Artificial Muscle Model
Experimental Validation of McKibben Pneumatic Artificial Muscle ModelExperimental Validation of McKibben Pneumatic Artificial Muscle Model
Experimental Validation of McKibben Pneumatic Artificial Muscle ModelKiminao Kogiso
 
Identification Procedure for McKibben Pneumatic Artificial Muscle Systems
Identification Procedure for McKibben Pneumatic Artificial Muscle SystemsIdentification Procedure for McKibben Pneumatic Artificial Muscle Systems
Identification Procedure for McKibben Pneumatic Artificial Muscle SystemsKiminao Kogiso
 

Más de Kiminao Kogiso (10)

Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
 
Transition Models of Equilibrium Assessment in Bayesian Game
Transition Models of Equilibrium Assessment in Bayesian GameTransition Models of Equilibrium Assessment in Bayesian Game
Transition Models of Equilibrium Assessment in Bayesian Game
 
Player's Belief Estimation for Super Human Sports
Player's Belief Estimation for Super Human SportsPlayer's Belief Estimation for Super Human Sports
Player's Belief Estimation for Super Human Sports
 
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
 
Application of ElGamal Encryption Scheme to Control System for Security Enhan...
Application of ElGamal Encryption Scheme to Control System for Security Enhan...Application of ElGamal Encryption Scheme to Control System for Security Enhan...
Application of ElGamal Encryption Scheme to Control System for Security Enhan...
 
Considerations on model predictive control of McKibben pneumatic artificial m...
Considerations on model predictive control of McKibben pneumatic artificial m...Considerations on model predictive control of McKibben pneumatic artificial m...
Considerations on model predictive control of McKibben pneumatic artificial m...
 
Estimating Player's Belief in Bayesian Game by Feedback Control
Estimating Player's Belief in Bayesian Game by Feedback ControlEstimating Player's Belief in Bayesian Game by Feedback Control
Estimating Player's Belief in Bayesian Game by Feedback Control
 
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
 
Experimental Validation of McKibben Pneumatic Artificial Muscle Model
Experimental Validation of McKibben Pneumatic Artificial Muscle ModelExperimental Validation of McKibben Pneumatic Artificial Muscle Model
Experimental Validation of McKibben Pneumatic Artificial Muscle Model
 
Identification Procedure for McKibben Pneumatic Artificial Muscle Systems
Identification Procedure for McKibben Pneumatic Artificial Muscle SystemsIdentification Procedure for McKibben Pneumatic Artificial Muscle Systems
Identification Procedure for McKibben Pneumatic Artificial Muscle Systems
 

Último

Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 

Último (20)

Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 

Controller encryption using RSA public-key encryption scheme (Asian Control Conference 2015)

  • 1. June 3 Wed., 2015, 11:20-11:30, Technology And Theory For Cybersecurity Of Industrial Control Systems @ Meeting Room 2 Security  Enhancements  of  Networked   Control  Systems  Using  RSA  Public-‐‑‒ Key  Cryptosystem Takahiro Fujita Nara Institute of Science and Technology Kiminao Kogiso, Kenji Sawada and Seiichi Shin University of Electro-Communications The 10th Asian Control Conference May 31 to June 3, 2015 @ Sutera Harbour Resort, Sabah, Malaysia
  • 2. Outline 2 Introduction   Problem  Statement   RSA-‐‑‒Encrypted  Controller   Simulation  &  Validation   Conclusion
  • 3. Introduction 3 Controller device is important, but exposed to threats of hacking and targeted attacks. signals: interruption, modeling, stealing recipe, management policy and know-how parameters: knowledges about system designs and operations Attacks to networked control system plantcontroller ref. (recipe) control signals feedback signals parameters [1] Sandberg et al., 2015. [2] Sato et al., 2015. [3] Pang et al., 2011 Related works aiming to conceal the signals control-theoretical approach: detection[1], positive use of noises[2] cryptography-based approach: encryption of communication links[3] no studies trying to encrypt the controller itself… control (cipher) feedback (cipher) EncDec Enc Dec plantcontroller ref. ref. (cipher) Enc Dec
  • 4. Introduction 4 Objective of this work Realize a cryptography-based control law to conceal both the signals & parameters. control (cipher) feedback (cipher) EncDec Enc Dec plantcontroller ref. ref. (cipher) Enc Dec conventional: control (cipher) feedback (cipher) Enc Dec plantencrypted controller ref. ref. (cipher) Enc parameters (cipher) proposed: The encrypted controller: calculates an encrypted control directly from an encrypted feedback signal & an encrypted reference using encrypted parameters, and incorporates homomorphism of RSA public-key encryption into the control law.
  • 5. Problem Statement 5 Encryption of controller Consider a feedback control law : K: scalar gain k : discrete time : scalar plant output : scalar control inputu y f Controller encryption problem: Given an encryption scheme , for a control law realize an encrypted law .fE fE Define an encrypted control law , given an encryption scheme , satisfyingfE fE (Enc(K), Enc(y)) = Enc(f(K, y)) 5 control (cipher) feedback (cipher) Enc Dec plant parameters (cipher) fE (Enc(K), Enc(y)) Enc(y) Enc(u) u y Enc(K) E . u[k] = f(K, y[k]) := Ky[k]
  • 6. RSA-Encrypted Controller 6[4] Rivest, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystem”, 1978. [5] Rivest, “On Data Banks and Privacy Homomorphisms”, 1978. RSA public-key encryption RSA encryption scheme[4,5] (Rivest-Shamir-Adelman cryptosystem) key generation: public keys , , and private key (prime numbers) encryption: decryption: e n d m c : integer in plaintext space : integer in ciphertext space Homomorphism of the RSA encryption[5] Enc(m1 ⇥ m2) = Enc(m1) ⇥ Enc(m2) mod n Assumed that and , then the following holds.m1 = K m2 = y fE (Enc(K), Enc(y)) := Enc(K) ⇥ Enc(y) mod n = Enc(K ⇥ y) = Enc(u) c = Enc(m) = me mod n m = Enc(c) = cd mod n
  • 7. RSA-Encrypted Controller 7 a 2 N b•e : round function KpM = ba ⇥ Kpe yM[k] = ba ⇥ y[k]e uM[k] = KpMyM[k] Kp y[k] u[k] = Kpy[k] example: , then .Kp = 0.83, a = 1000 KpM = b1000 ⇥ 0.83e = 830 Remarks Signals & parameters are real; Plaintext is integer. need a map: multiplying by a natural number and rounding off to an integer, i.e., with and sufficient large, rounding (quantization) error can be made small. Enc(uM[k]) = Enc(KpM)Enc(yM) mod n a encrypted controller u[k] y[k] Enc Dec Enc(KpM) Enc(yM[k]) Enc(uM[k]) a 2 yM[k] uM[k] ba•e plant n
  • 8. Simulation: Controller Encryption 8 Enc(KpM) = (ba ⇥ Kpe)e mod n = 36364958n = 94399927 e = 587 d = 42929459 (key length 27bit) Things seen in controller Kp = 0.83 Enc(KpM) = 36364958 encrypted controller Enc(KpM) Enc(yM[k]) Enc(uM[k]) 0 10 20 30 0 5 10 x 10 7 Enc(uM[k]) time[s] −1 0 1 0 10 20 30 0 5 10 x 10 7 Enc(yM[k]) time[s] −1 0 1 u[k]y[k] normal: proposed: Kp u[k] y[k] controller a = 1000
  • 9. Validation: Protection from Stealing 9 Result of system identification (n4sid) −150 −100 −50 0 50 10 −1 10 0 10 1 10 2 10 3 −270 −180 −90 0 original closed loop system without encryption with encryption frequency[rad/s] gain[dB]phase[deg]
  • 10. Conclusion 10 0 10 20 30 0 5 10 x 10 7 Enc(uM[k]) time[s] −1 0 1 0 10 20 30 0 5 10 x 10 7 Enc(yM[k]) time[s] −1 0 1 u[k]y[k] −150 −100 −50 0 50 10 −1 10 0 10 1 10 2 10 3 −270 −180 −90 0 original closed loop system without encryption with encryption frequency[rad/s] gain[dB]phase[deg] Introduction Problem Statement controller encryption problem RSA-Encrypted Controller homomorphism of RSA encryption remarks in quantization error Simulation & Validation enable to conceal signals & parameters inside the controller device in terms of cryptography. enable to hide dynamics of the control system. Future works conceal control operations perfectly. extend to linear and polynomial control laws.
  • 11. Simulation: Computation Cost 11 0 500 1000 1500 2000 2500 3000 0 1 2 3 4 x 10 −4 steps(sampling interval : 10ms) computationaltime[s] MATLAB R2014a Intel Core i5 3.2GHz RAM16GB