eprint.iacr.org will be offline for approximately an hour for routine maintenance again at 10pm UTC on Wednesday, April 17.

Paper 2016/060

Automated key setup and recovery from key exposure for power networks

Amir Herzberg and Yehonatan Kfir


Power networks are built with inherent redundancy, including in the communication channels. In this work, we show that this redundancy can increase the cyber security resiliency to key exposure. Specifically, we present CrypTop, a novel protocol for the {\em key setup and refresh} problem in power networks. CrypTop uses multipath communication and already-keyed devices, to setup keys in other devices, and to recover from key exposures. We evaluate CrypTop in realistic power network topologies. Our results show a significant to dramatic improvement compared to previous works, in both recovery from key exposure and ability to setup keys automatically. For example, in IEEE 300 network, and for a single corruption, CrypTop can recover security in 100\% of the devices compared to 1\% for previous works.

Available format(s)
Publication info
Preprint. MINOR revision.
Contact author(s)
yehonatank @ gmail com
2019-07-29: last of 4 revisions
2016-01-25: received
See all versions
Short URL
Creative Commons Attribution


      author = {Amir Herzberg and Yehonatan Kfir},
      title = {Automated key setup and recovery from key exposure for power networks},
      howpublished = {Cryptology ePrint Archive, Paper 2016/060},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/060}},
      url = {https://eprint.iacr.org/2016/060}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.