Paper 2016/060
Automated key setup and recovery from key exposure for power networks
Amir Herzberg and Yehonatan Kfir
Abstract
Power networks are built with inherent redundancy, including in the communication channels. In this work, we show that this redundancy can increase the cyber security resiliency to key exposure. Specifically, we present CrypTop, a novel protocol for the {\em key setup and refresh} problem in power networks. CrypTop uses multipath communication and already-keyed devices, to setup keys in other devices, and to recover from key exposures. We evaluate CrypTop in realistic power network topologies. Our results show a significant to dramatic improvement compared to previous works, in both recovery from key exposure and ability to setup keys automatically. For example, in IEEE 300 network, and for a single corruption, CrypTop can recover security in 100\% of the devices compared to 1\% for previous works.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Cryptography
- Contact author(s)
- yehonatank @ gmail com
- History
- 2019-07-29: last of 4 revisions
- 2016-01-25: received
- See all versions
- Short URL
- https://ia.cr/2016/060
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/060, author = {Amir Herzberg and Yehonatan Kfir}, title = {Automated key setup and recovery from key exposure for power networks}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/060}, year = {2016}, url = {https://eprint.iacr.org/2016/060} }