Inicio  /  Applied Sciences  /  Vol: 14 Par: 7 (2024)  /  Artículo
ARTÍCULO
TITULO

Analysis of Cryptographic Algorithms to Improve Cybersecurity in the Industrial Electrical Sector

Francisco Alonso    
Benjamín Samaniego    
Gonzalo Farias and Sebastián Dormido-Canto    

Resumen

This article provides a general overview of the communication protocols used in the IEC61850 standard for the automation of electrical substations. Specifically, it examines the GOOSE and R-GOOSE protocols, which are used for exchanging various types of information. The article then presents real cases of cyber attacks on the industrial sector, highlighting the importance of addressing cybersecurity in the IEC61850 standard. The text presents security drawbacks of the communication protocols mentioned earlier and briefly explains two algorithms defined in the IEC61850 standard to address them. However, the authors suggest that having only a couple of algorithms may not be sufficient to ensure digital security in substations. This article presents a study on the cryptographic algorithms ChaCha20 and Poly1305. The purpose of the study is to experimentally verify their adaptation to the strict time requirements that GOOSE must meet for their operation. These algorithms can operate independently or in combination, creating an Authenticated Encryption with Associated Data (AEAD) algorithm. Both algorithms were thoroughly reviewed and tested using GOOSE and R-GOOSE frames generated by the S-GoSV software. The computational time required was also observed. The frames were analysed using the Wireshark software. It was concluded that the algorithms are suitable for the communication requirements of electrical substations and can be used as an alternative to the cryptographic algorithms proposed under the IEC61850 standard.

 Artículos similares

       
 
Kunbolat Algazy, Kairat Sakan, Nursulu Kapalova, Saule Nyssanbayeva and Dilmukhanbet Dyusenbayev    
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value. Like any new cryptographic structure, the HBC-256 algorit... ver más
Revista: Applied Sciences

 
Luis Parrilla, Antonio García, Encarnación Castillo, Salvador Rodríguez-Bolívar and Juan Antonio López-Villanueva    
Power noise generation for masking power traces is a powerful countermeasure against Simple Power Analysis (SPA), and it has also been used against Differential Power Analysis (DPA) or Correlation Power Analysis (CPA) in the case of cryptographic circuit... ver más

 
Nahida Islam, Md. Sazzadur Rahman, Imtiaz Mahmud, Md. Nur Amin Sifat and You-Ze Cho    
The world is facing an urgent need to provide secure communication and data access control in advanced metering infrastructure (AMI) because conventional cryptographic key management and authentication protocols are at stake. The cryptography schemes ent... ver más
Revista: Applied Sciences

 
Nursulu Kapalova, Kairat Sakan, Kunbolat Algazy and Dilmukhanbet Dyusenbayev    
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides five-round encryption of 128-bit blocks, while the data size at the input and output of the S-box is 8 bits. The main transformation is the F transformat... ver más
Revista: Computation

 
V. Belsky,E. Griboedova,K. Tsaregorodtsev,A. Chichaeva     Pág. 1 - 20
Radio-frequency tags (RFID tags) are widely used throughout the world to identify and authenticate objects. Due to the architectural features and in order to minimize implementation cost RFID tags are often subject to considerable restrictions (memory re... ver más