Keeping the Smart Grid Secure.  A smart grid delivers electricity from suppliers to consumers using digital technology to monitor (and optionally control)

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks Einar Mykletun, Joao Girao, Dirk Westhoff IEEE ICC 2006, /06.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Applications of Wireless Sensor Networks in Smart Grid Presented by Zhongming Zheng.
Asymmetric-Key Cryptography
Data trapped in billions of devices Devices often in hard-to-reach locations - basements. below ground, pad mounts Interference is increasing and poses.
Elliptic curve arithmetic and applications to cryptography By Uros Abaz Supervised by Dr. Shaun Cooper and Dr. Andre Barczak.
Efficient generation of cryptographically strong elliptic curves Shahar Papini Michael Krel Instructor : Barukh Ziv 1.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
No-Key Cryptography Nathan Marks Based on Massey-Omura US Patent # 4,567,600.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Electronic Payment Systems Lecture 5: ePayment Security II
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Home Electricity Monitor. What is ? TED = The Energy Detective Home Electricity Monitor Installs in the breaker panel Displays real time electricity information.
ENERGY INDUSTRY FUNDAMENTALS: MODULE 5, UNITS A & B: Emerging Technologies.
ASYMMETRIC CIPHERS.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
By Abhijith Chandrashekar and Dushyant Maheshwary.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
Lecture 10: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2009.
Security By Design Scott A. Vanstone V.P. Cryptographic Research Research in Motion Distinguished Professor Emeritus University of Waterloo.
An Efficient Identity-based Cryptosystem for
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Efficiency and Demand Response NARUC Washington, DC February 14, 2006 Steve Specker President & CEO.
Application of Elliptic Curves to Cryptography
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
Smart Metering and the Smart Grid How does it work and what can it do? Will Chaney 1Energy Awareness Week, 3-8 May 2010.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Elliptical Curve Cryptography Manish Kumar Roll No - 43 CS-A, S-7 SOE, CUSAT.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Answers to question 6, 7, 8 Russian Delegation Visit 01. March 2010.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Overview of Cryptography & Its Applications
Elliptic Curve Cryptography
Elliptic Curve Cryptography Celia Li Computer Science and Engineering November 10, 2005.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
SMART GRID A smart grid for intelligent energy use. By: Suhani Gupta.
Lecture 11: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2008.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
1 Network Security Dr. Syed Ismail Shah
Network Security Celia Li Computer Science and Engineering York University.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
INCS 741: Cryptography Overview and Basic Concepts.
Motivation Basis of modern cryptosystems
Cryptography and Network Security Chapter 13
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Asymmetric-Key Cryptography
Asymmetric-Key Cryptography
Practical Aspects of Modern Cryptography
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Keeping the Smart Grid Secure

 A smart grid delivers electricity from suppliers to consumers using digital technology to monitor (and optionally control) appliances at consumers' homes.  Utilize devices that connect a power source (e.g. a wall outlet) to an appliance. These devices would report: ◦ times an appliance was used ◦ reporting the amount of energy consumed

 US Government has awarded smart grid grants providing for the installation of: ◦ more than 2.5 million smart meters. ◦ more than 1 million in-home energy displays ◦ 170,000 smart thermostats  more than 200,000 smart transformers,

 Consumer electronics devices now consume over half the power in a typical US home.  The ability to shut down or hibernate devices when they are not being used could be a major factor in cutting energy use.  This would mean the electric company has information on personal consumer habits.  Theelectric company could begin making educated guesses on what appliances can be adjusted.

 A computer is left on twenty-four hours a day. ◦ Is the computer being used? ◦ Is it simply a screen saver?  The electric company could, at their discretion, decide your computer is not being used and turn it off for you.

 Basic client-server scheme  Monitoring device failure should not have an adverse effect on the rest of the network  Computing power of the residential SGD must minimal  Must allow for potentially long periods of hibernation

 The ZED contains just enough functionality to wirelessly talk to the parent node ◦ extremely low power consumption ◦ ability to accommodate long hibernation times ◦ simplicity ◦ low cost  Wi-Fi and Bluetooth provide a greater bandwidth, ZigBee's lower power consumption/long battery life make up for the slower 250 kbps.

 wireless transmission of power usage relegated to within the house  personal information must be made secure  data encryption, which uses symmetric key 128-bit advanced encryption standard  To make encryption less processor intensive, use Elliptic Curve Cryptography

 An elliptic curve over real numbers may be defined as the set of points (x,y) which satisfy an elliptic curve equation of the form: y 2 = x 3 + ax + b  For example, let constants a= - 4 and b = 0.67, yielding the equation: y 2 = x 3 - 4x

P + P = 2P = R

 At the heart of every encryption/decryption system is a very difficult math problem.  The success of a cryptosystem lies in the extreme low probability that a hacker can solve the problem in a timely manner.  The Discrete Logarithm Problem is such a mathematical problem and is the basis of the Elliptic Curve Cryptosystem.  "discrete" means we are working with integers

 If we are given an elliptic curve group, we are interested in determining the elliptic curve discrete logarithm problem.  Equivalent to finding a scalar multiple of point P.  Given points P and Q in the group, find a number, k, such that Pk = Q.  Here, the value k is called the discrete logarithm of Q to the base P.

 y 2 = x 3 + 9x + 17 over F 23 ◦ Q = (4,5) ◦ P = (16,5)  Determine the discrete logarithm k  Although intractable, this problem is small, so we can determine a solution by listing out the first few multiples of P until we come up with Q.

 P = (16,5)  2P = (20,20)  3P = (14,14)  4P = (19,20)  5P = (13,10)  6P = (7,3)  7P = (8,7)  8P = (12,17)  9P = (4,5)  9P = (4,5) = Q  we can conclude that the discrete logarithm of Q to the base P is k = 9.

 consider the elliptic curve group described by y 2 = x 3 - 5x +4.  We must find the discrete logarithm of the following points: ◦ Q x = -.35, Q y = 2.39 ◦ P x = -1.65, P y = ◦ In other words, Q =(-.35, 2.39) P = (-1.65, -2.79)

 Using point P, we then double this point to give 2P. ◦ P + 2P = 3P  We continue this process until we find (hopefully) the point Q, our final solution.  P + 6P = 7P = (-.35,2.39)  (take my word for it).  Therefore, the logarithm is 7.

Bob Jane Elliptic Curve P Q Jane gets public-key from Bob k is randomly chosen private key Pk = Q

 Jane gets Bob’s public key and generates her own temporary key pair.  Jane uses her private key and Bob’s public key to generate a secret point on the curve.  Jane uses the x-coordinate of this new point as a session id.  To read an encrypted message, Bob needs the session key, which he gets by combining his private key with Jane’s temporary public key.