eprint.iacr.org will be offline for approximately an hour for routine maintenance again at 10pm UTC on Wednesday, April 17.

Paper 2016/060

Automated key setup and recovery from key exposure for power networks

Amir Herzberg and Yehonatan Kfir

Abstract

Power networks are built with inherent redundancy, including in the communication channels. In this work, we show that this redundancy can increase the cyber security resiliency to key exposure. Specifically, we present CrypTop, a novel protocol for the {\em key setup and refresh} problem in power networks. CrypTop uses multipath communication and already-keyed devices, to setup keys in other devices, and to recover from key exposures. We evaluate CrypTop in realistic power network topologies. Our results show a significant to dramatic improvement compared to previous works, in both recovery from key exposure and ability to setup keys automatically. For example, in IEEE 300 network, and for a single corruption, CrypTop can recover security in 100\% of the devices compared to 1\% for previous works.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Cryptography
Contact author(s)
yehonatank @ gmail com
History
2019-07-29: last of 4 revisions
2016-01-25: received
See all versions
Short URL
https://ia.cr/2016/060
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/060,
      author = {Amir Herzberg and Yehonatan Kfir},
      title = {Automated key setup and recovery from key exposure for power networks},
      howpublished = {Cryptology ePrint Archive, Paper 2016/060},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/060}},
      url = {https://eprint.iacr.org/2016/060}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.