Exploration of Quantum Cryptography Security Applications for Industrial Control Systems

被引:0
|
作者
Li H. [1 ]
Dong Y. [1 ]
Zhang Y. [1 ]
Wang H. [2 ]
机构
[1] Beijing Products Quality Supervision and Inspection Institute, Beijing
[2] Beijing Zhonghai Wenda Information Technology Co. Ltd., Beijing
关键词
Industrial control system; Invisible state transfer; Key distribution; Quantum cryptography; Upper and lower computer;
D O I
10.2478/amns-2024-1711
中图分类号
学科分类号
摘要
The exploration of security applications of quantum cryptography for industrial control systems is a key research effort aimed at enhancing the security of industrial control systems through quantum cryptography. In this paper, we study the security threats faced by industrial control systems, including network attacks, data leakage, and system tampering, and propose to utilize quantum key distribution and quantum invisible state transfer algorithms to ensure the secure transmission of industrial control system data. The simulation test environment of the upper and lower computers of the industrial control system is built. The quantum encryption and decryption algorithms are deployed in the embedded environment and PCs to test the effectiveness of quantum cryptography to enhance the advanced encryption standard key scheme. The experimental results show that the quantum cryptography technology successfully realizes the encryption and decryption of data, and the total time consumed in the whole process is less than 61.8 seconds, which meets the requirements of a real-time industrial control system. Therefore, quantum cryptography is suitable for protecting field-level data in industrial control systems. © 2023 Hengyu Li, Yun Dong, Yusheng Zhang and Haiping Wang, published by Sciendo.
引用
收藏
相关论文
共 50 条
  • [1] Digital Signatures Security Using Cryptography for Industrial Applications
    Sheshasaayee, Ananthi
    Anandapriya, B.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA), 2017, : 379 - 382
  • [2] Security in quantum cryptography
    Portmann, Christopher
    Renner, Renato
    REVIEWS OF MODERN PHYSICS, 2022, 94 (02)
  • [3] Quantum Cryptography for Information-Theoretic Security Quantum Cryptography
    Sanders, Barry
    TECHNOLOGICAL INNOVATIONS IN SENSING AND DETECTION OF CHEMICAL, BIOLOGICAL, RADIOLOGICAL, NUCLEAR THREATS AND ECOLOGICAL TERRORISM, 2012, : 335 - 343
  • [4] Automated security testing for web applications on industrial automation and control systems
    Pfrang, Steffen
    Borcherding, Anne
    Meier, David
    Beyerer, Juergen
    AT-AUTOMATISIERUNGSTECHNIK, 2019, 67 (05) : 383 - 401
  • [5] Security aspects of quantum cryptography with d-dimensional systems
    Macchiavello, C
    Bruss, D
    JOURNAL OF MODERN OPTICS, 2003, 50 (6-7) : 1025 - 1033
  • [6] Management of Security in Quantum Cryptography
    Niemiec, Marcin
    Pach, Andrzej R.
    IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (08) : 36 - 41
  • [7] Entropic security in quantum cryptography
    Desrosiers, Simon Pierre
    QUANTUM INFORMATION PROCESSING, 2009, 8 (04) : 331 - 345
  • [8] Security of counterfactual quantum cryptography
    Yin, Zhen-Qiang
    Li, Hong-Wei
    Chen, Wei
    Han, Zheng-Fu
    Guo, Guang-Can
    PHYSICAL REVIEW A, 2010, 82 (04):
  • [9] Entropic security in quantum cryptography
    Simon Pierre Desrosiers
    Quantum Information Processing, 2009, 8 : 331 - 345
  • [10] Provable Security in Quantum Cryptography
    Renner, Renato
    IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 127 - 130