SlideShare a Scribd company logo
1 of 35
Download to read offline
Industrial applications of cryptography

                                       David Podhola

                                          Prague College
                                  david.po@praguecollege.cz


                                      30. kvˇtna 2011
                                            e




David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                 e           1 / 35
Abstract




In this topic industrial implementations of cryptography will be introduced.
It is focusing on the electric power industry with particular aspects to
power generation in nuclear powerplants, transmission, distribution and
retail. The implications of storing sensitive personal data as well as dealing
with invoicing and the customer’s money at the end will be described and
discussed.




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           2 / 35
Electricity




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           3 / 35
Electricity

“Phenomenon associated with stationary or moving electric charges.
The word comes from the Greek elektron (“amber”); the Greeks
discovered that amber rubbed with fur attracted light objects such as
feathers. Such effects due to stationary charges, or static electricity, were
the first electrical phenomena to be studied. Not until the early 19th
century were static electricity and electric current shown to be aspects of
the same phenomenon. The discovery of the electron, which carries a
charge designated as negative, showed that the various manifestations of
electricity are the result of the accumulation or motion of numbers of
electrons. The invention of the incandescent lightbulb (1879) and the
construction of the first central power station (1881) by Thomas Alva
Edison led to the rapid introduction of electric power into factories and
homes. See also James Clerk Maxwell.”1

   1
       Encyclopaedia Britannica
 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           4 / 35
Electric power industry




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           5 / 35
Electric power industry

“The electric power industry provides the production and delivery of
electric energy, often known as power, or electricity, in sufficient quantities
to areas that need electricity through a grid connection. The grid
distributes electrical energy to customers. Electric power is generated by
central power stations or by distributed generation.
Many households and businesses need access to electricity, especially in
developed nations, the demand being scarcer in developing nations.
Demand for electricity is derived from the requirement for electricity in
order to operate domestic appliances, office equipment, industrial
machinery and provide sufficient energy for both domestic and commercial
lighting, heating, cooking and industrial processes. Because of this aspect
of the industry, it is viewed as a public utility as infrastructure.”2


   2
       Wikipedia
 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           6 / 35
Current consumption of the Czech Republic
This whole industry is run and controlled by a lot of computers. They have
great numbers on their fingertips, but...




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           7 / 35
Threats
Threats:3
      Intrusion: malicious attackers may intrude client or server by
      searching vulnerabilities, and the stable service of control boards may
      be threatened.
      Impersonation: operators who don’t have the right accounts but can
      enter , may impersonate operators who have the right accounts sand
      the stable service of control boards may be threatened.
      Tapping: malicious attackers may tap packets on the Internet, and
      data sent and received may be threatened.
      Obstruction: malicious attackers may attack client or server very
      often, and smooth operation may be threatened.
      Destruction: operators who have the right accounts may execute
      illegal operations unjustly, and the stable service of control boards
      may be threatened.
   3
     The Security Design of Remote Maintenance System for Nuclear Power Plants,
based on ISO/IEC 15408
 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           8 / 35
What is cryptography?

The practice and study of hiding information.




Now is much more complex than just encryption to apparent nonsense.

 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           9 / 35
Encryption and decryption




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           10 / 35
Public-key cryptography




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           11 / 35
Public-key cryptography




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           12 / 35
Public key infrastructure




             CA = Certificate Authority RA = Registration Authority



 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           13 / 35
My public key

I am not afraid to show you my public key!




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           14 / 35
Signing

If you have just your key, you can sign




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           15 / 35
Encryption

If you have both keys, you can encrypt




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           16 / 35
General attributes of public keys




Increased security and convenience.
      private keys never need to transmitted or revealed to anyone
      digital signatures
      speed
      vulnerable to impersonation (attack on a certification authority)




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           17 / 35
Electric power industry



The legal unbundling laid down in 2005 as part of the second European
energy market package applies in 11 out of 27 EU countries.
      Generation
      Transmission
      Distribution (e.g. consumption measurements)
      Retailing (e.g. end customer invoicing)




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           18 / 35
High level overview




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           19 / 35
Organizations involved - CEPS
CEPS jsc is a joint-stock company operating Transmission System (TS) of
the Czech Republic by law.
      ensuring electricity transmission
      ensuring balance between electricity generation and consumption at
      any moment
      maintenance, modernization and development of TS equipment




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           20 / 35
Organizations involved - OTE
      A processing and reporting business balance of elektricity according to
      data supplied by electricity market participants.
      An organization of short-term markets and balancing market with
      regulating energy in cooperation with transmission system operator.
      The evaluation and settlement of imbalances between the agreed and
      actual electricity supplies and consumption.
      Publishing monthly and annual reports about Czech elektricity market.
      Collecting metered data from deliveries and supplies for market
      paticipants.
      The evaluation and settlement of regulating energy.
      Administration of registry for trading with greenhouse gas emission
      allowances.




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           21 / 35
OTE CA




David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                 e           22 / 35
Electricity generation




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           23 / 35
Electricity generation


For nuclear powerplants Title 10 of the Code of Federal Regulations (10
CFR) Section 73.21(g)(3) states, in part, “. . . Safeguards Information
shall be transmitted only by protected telecommunication circuits
(including facsimile) approved by the NRC.” The Nuclear Regulatory
Commission (NRC) considers those encryption systems that the National
Institute of Standards and Technology (NIST) has determined conform to
the Security Requirements for Cryptographic Modules in Federal
Information Processing Standard (FIPS) 140-2, as being acceptable. The
Secretary of Commerce has made use of Cryptographic Module Validation
Program products mandatory and binding for Federal agencies when a
Federal agency determines that cryptography is necessary for protecting
sensitive information.



 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           24 / 35
Stuxnet




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           25 / 35
Stuxnet




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           26 / 35
Transmission




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           27 / 35
Distribution




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           28 / 35
Distribution




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           29 / 35
Retailing




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           30 / 35
Communication




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           31 / 35
Communication




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           32 / 35
Communication




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           33 / 35
SmartGrid




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           34 / 35
Thank you!




                                    David Podhola
                     david.po@praguecollege.cz, david@podhola.net
                               http://david.podhola.net




 David Podhola (Prague College)   Industrial applications of cryptography   30. kvˇtna 2011
                                                                                  e           35 / 35

More Related Content

Viewers also liked

Viewers also liked (7)

Spring Trip 2007 Texas Style
Spring Trip 2007 Texas StyleSpring Trip 2007 Texas Style
Spring Trip 2007 Texas Style
 
Secretsofrubyonrails
SecretsofrubyonrailsSecretsofrubyonrails
Secretsofrubyonrails
 
Jak v Producteev zadat úkol
Jak v Producteev zadat úkolJak v Producteev zadat úkol
Jak v Producteev zadat úkol
 
Co to je Producteev
Co to je ProducteevCo to je Producteev
Co to je Producteev
 
Finalmonarch
FinalmonarchFinalmonarch
Finalmonarch
 
Úvod do CRM
Úvod do CRMÚvod do CRM
Úvod do CRM
 
New Features of Kubernetes v1.2.0 beta
New Features of Kubernetes v1.2.0 betaNew Features of Kubernetes v1.2.0 beta
New Features of Kubernetes v1.2.0 beta
 

Similar to Industrial Applications of Cryptography

Transparent electronics
Transparent electronicsTransparent electronics
Transparent electronicsAakash Varma
 
Towards an effective power outage planning ann approach
Towards an effective power outage planning ann approachTowards an effective power outage planning ann approach
Towards an effective power outage planning ann approachAlexander Decker
 
Frontier in OptoMechaTronics
Frontier in OptoMechaTronicsFrontier in OptoMechaTronics
Frontier in OptoMechaTronicsjinlu28
 
Modeling & simulation of grid connected photovoltaic system
Modeling & simulation of grid connected photovoltaic systemModeling & simulation of grid connected photovoltaic system
Modeling & simulation of grid connected photovoltaic systemIAEME Publication
 
Workshop on Synchrophasors and Control Applications for Power Systems
Workshop on  Synchrophasors and Control Applications for Power SystemsWorkshop on  Synchrophasors and Control Applications for Power Systems
Workshop on Synchrophasors and Control Applications for Power SystemsLuigi Vanfretti
 
Chapter 8 Embedded Hardware Design and Development (second portion)
Chapter 8 Embedded Hardware Design and Development (second portion)Chapter 8 Embedded Hardware Design and Development (second portion)
Chapter 8 Embedded Hardware Design and Development (second portion)Moe Moe Myint
 
Pacome hpi potsdam_presentation
Pacome hpi potsdam_presentationPacome hpi potsdam_presentation
Pacome hpi potsdam_presentationpacomeambassa
 
A Pocket Dictionary of Tomorrow’s Electronics_Franz_IPC-TLP2021.pdf
A Pocket Dictionary of Tomorrow’s Electronics_Franz_IPC-TLP2021.pdfA Pocket Dictionary of Tomorrow’s Electronics_Franz_IPC-TLP2021.pdf
A Pocket Dictionary of Tomorrow’s Electronics_Franz_IPC-TLP2021.pdfRoger L. Franz
 
Integrated Earthing Systems
Integrated Earthing SystemsIntegrated Earthing Systems
Integrated Earthing SystemsLeonardo ENERGY
 
Trans Block Show
Trans Block ShowTrans Block Show
Trans Block Showmjsmith9
 
Occupational Injuries From Electrical Shock & Arc Flash Events
Occupational Injuries From Electrical Shock & Arc Flash EventsOccupational Injuries From Electrical Shock & Arc Flash Events
Occupational Injuries From Electrical Shock & Arc Flash EventsThorne & Derrick International
 
Make India Safer with JMV LPS Ltd Electrical Equipment & Human Safety
Make India Safer with JMV LPS Ltd  Electrical Equipment & Human SafetyMake India Safer with JMV LPS Ltd  Electrical Equipment & Human Safety
Make India Safer with JMV LPS Ltd Electrical Equipment & Human SafetyMahesh Chandra Manav
 
ITU-T Study Group 5 Introduction
ITU-T Study Group 5 IntroductionITU-T Study Group 5 Introduction
ITU-T Study Group 5 IntroductionITU
 
Digital Phase Locked Loop
Digital Phase Locked LoopDigital Phase Locked Loop
Digital Phase Locked LoopJun Steed Huang
 
OPAL-RT RT14 Conference: Real-time simulator for power system studies
OPAL-RT RT14 Conference: Real-time simulator for power system studiesOPAL-RT RT14 Conference: Real-time simulator for power system studies
OPAL-RT RT14 Conference: Real-time simulator for power system studiesOPAL-RT TECHNOLOGIES
 
Thesis presentation on Visible light communication
Thesis presentation on Visible light communicationThesis presentation on Visible light communication
Thesis presentation on Visible light communicationশুভরাজ পাল
 
Electrical services design ppt pdf
Electrical services design ppt pdfElectrical services design ppt pdf
Electrical services design ppt pdfPrashantMalagi
 
0 110211-cluster-panel-inter-isp
0 110211-cluster-panel-inter-isp0 110211-cluster-panel-inter-isp
0 110211-cluster-panel-inter-ispictseserv
 
StroNGER for Resilience in Rome
StroNGER for Resilience in RomeStroNGER for Resilience in Rome
StroNGER for Resilience in RomeStroNGER2012
 

Similar to Industrial Applications of Cryptography (20)

Transparent electronics
Transparent electronicsTransparent electronics
Transparent electronics
 
Towards an effective power outage planning ann approach
Towards an effective power outage planning ann approachTowards an effective power outage planning ann approach
Towards an effective power outage planning ann approach
 
Frontier in OptoMechaTronics
Frontier in OptoMechaTronicsFrontier in OptoMechaTronics
Frontier in OptoMechaTronics
 
Tony
TonyTony
Tony
 
Modeling & simulation of grid connected photovoltaic system
Modeling & simulation of grid connected photovoltaic systemModeling & simulation of grid connected photovoltaic system
Modeling & simulation of grid connected photovoltaic system
 
Workshop on Synchrophasors and Control Applications for Power Systems
Workshop on  Synchrophasors and Control Applications for Power SystemsWorkshop on  Synchrophasors and Control Applications for Power Systems
Workshop on Synchrophasors and Control Applications for Power Systems
 
Chapter 8 Embedded Hardware Design and Development (second portion)
Chapter 8 Embedded Hardware Design and Development (second portion)Chapter 8 Embedded Hardware Design and Development (second portion)
Chapter 8 Embedded Hardware Design and Development (second portion)
 
Pacome hpi potsdam_presentation
Pacome hpi potsdam_presentationPacome hpi potsdam_presentation
Pacome hpi potsdam_presentation
 
A Pocket Dictionary of Tomorrow’s Electronics_Franz_IPC-TLP2021.pdf
A Pocket Dictionary of Tomorrow’s Electronics_Franz_IPC-TLP2021.pdfA Pocket Dictionary of Tomorrow’s Electronics_Franz_IPC-TLP2021.pdf
A Pocket Dictionary of Tomorrow’s Electronics_Franz_IPC-TLP2021.pdf
 
Integrated Earthing Systems
Integrated Earthing SystemsIntegrated Earthing Systems
Integrated Earthing Systems
 
Trans Block Show
Trans Block ShowTrans Block Show
Trans Block Show
 
Occupational Injuries From Electrical Shock & Arc Flash Events
Occupational Injuries From Electrical Shock & Arc Flash EventsOccupational Injuries From Electrical Shock & Arc Flash Events
Occupational Injuries From Electrical Shock & Arc Flash Events
 
Make India Safer with JMV LPS Ltd Electrical Equipment & Human Safety
Make India Safer with JMV LPS Ltd  Electrical Equipment & Human SafetyMake India Safer with JMV LPS Ltd  Electrical Equipment & Human Safety
Make India Safer with JMV LPS Ltd Electrical Equipment & Human Safety
 
ITU-T Study Group 5 Introduction
ITU-T Study Group 5 IntroductionITU-T Study Group 5 Introduction
ITU-T Study Group 5 Introduction
 
Digital Phase Locked Loop
Digital Phase Locked LoopDigital Phase Locked Loop
Digital Phase Locked Loop
 
OPAL-RT RT14 Conference: Real-time simulator for power system studies
OPAL-RT RT14 Conference: Real-time simulator for power system studiesOPAL-RT RT14 Conference: Real-time simulator for power system studies
OPAL-RT RT14 Conference: Real-time simulator for power system studies
 
Thesis presentation on Visible light communication
Thesis presentation on Visible light communicationThesis presentation on Visible light communication
Thesis presentation on Visible light communication
 
Electrical services design ppt pdf
Electrical services design ppt pdfElectrical services design ppt pdf
Electrical services design ppt pdf
 
0 110211-cluster-panel-inter-isp
0 110211-cluster-panel-inter-isp0 110211-cluster-panel-inter-isp
0 110211-cluster-panel-inter-isp
 
StroNGER for Resilience in Rome
StroNGER for Resilience in RomeStroNGER for Resilience in Rome
StroNGER for Resilience in Rome
 

More from David Podhola

Konfigurace redakčního systému Piranha CMS Oak
Konfigurace redakčního systému Piranha CMS OakKonfigurace redakčního systému Piranha CMS Oak
Konfigurace redakčního systému Piranha CMS OakDavid Podhola
 
Instalace balíčku Piranha Cms Oak
Instalace balíčku Piranha Cms OakInstalace balíčku Piranha Cms Oak
Instalace balíčku Piranha Cms OakDavid Podhola
 
Co je to nálepka úkolu
Co je to nálepka úkoluCo je to nálepka úkolu
Co je to nálepka úkoluDavid Podhola
 
Co to je kontext úkolu
Co to je kontext úkoluCo to je kontext úkolu
Co to je kontext úkoluDavid Podhola
 
Gassumo Outlook Android Task Synchronizer v1.0.0.7 Installation and first syn...
Gassumo Outlook Android Task Synchronizer v1.0.0.7 Installation and first syn...Gassumo Outlook Android Task Synchronizer v1.0.0.7 Installation and first syn...
Gassumo Outlook Android Task Synchronizer v1.0.0.7 Installation and first syn...David Podhola
 
SprinxCRM for Google Apps
SprinxCRM for Google AppsSprinxCRM for Google Apps
SprinxCRM for Google AppsDavid Podhola
 
SprinxCRM UniversalSync installation, configuration, first synchronization
SprinxCRM UniversalSync installation, configuration, first synchronizationSprinxCRM UniversalSync installation, configuration, first synchronization
SprinxCRM UniversalSync installation, configuration, first synchronizationDavid Podhola
 

More from David Podhola (8)

Konfigurace redakčního systému Piranha CMS Oak
Konfigurace redakčního systému Piranha CMS OakKonfigurace redakčního systému Piranha CMS Oak
Konfigurace redakčního systému Piranha CMS Oak
 
Instalace balíčku Piranha Cms Oak
Instalace balíčku Piranha Cms OakInstalace balíčku Piranha Cms Oak
Instalace balíčku Piranha Cms Oak
 
Co je to nálepka úkolu
Co je to nálepka úkoluCo je to nálepka úkolu
Co je to nálepka úkolu
 
Co to je kontext úkolu
Co to je kontext úkoluCo to je kontext úkolu
Co to je kontext úkolu
 
Co je úkol
Co je úkolCo je úkol
Co je úkol
 
Gassumo Outlook Android Task Synchronizer v1.0.0.7 Installation and first syn...
Gassumo Outlook Android Task Synchronizer v1.0.0.7 Installation and first syn...Gassumo Outlook Android Task Synchronizer v1.0.0.7 Installation and first syn...
Gassumo Outlook Android Task Synchronizer v1.0.0.7 Installation and first syn...
 
SprinxCRM for Google Apps
SprinxCRM for Google AppsSprinxCRM for Google Apps
SprinxCRM for Google Apps
 
SprinxCRM UniversalSync installation, configuration, first synchronization
SprinxCRM UniversalSync installation, configuration, first synchronizationSprinxCRM UniversalSync installation, configuration, first synchronization
SprinxCRM UniversalSync installation, configuration, first synchronization
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Industrial Applications of Cryptography

  • 1. Industrial applications of cryptography David Podhola Prague College david.po@praguecollege.cz 30. kvˇtna 2011 e David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 1 / 35
  • 2. Abstract In this topic industrial implementations of cryptography will be introduced. It is focusing on the electric power industry with particular aspects to power generation in nuclear powerplants, transmission, distribution and retail. The implications of storing sensitive personal data as well as dealing with invoicing and the customer’s money at the end will be described and discussed. David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 2 / 35
  • 3. Electricity David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 3 / 35
  • 4. Electricity “Phenomenon associated with stationary or moving electric charges. The word comes from the Greek elektron (“amber”); the Greeks discovered that amber rubbed with fur attracted light objects such as feathers. Such effects due to stationary charges, or static electricity, were the first electrical phenomena to be studied. Not until the early 19th century were static electricity and electric current shown to be aspects of the same phenomenon. The discovery of the electron, which carries a charge designated as negative, showed that the various manifestations of electricity are the result of the accumulation or motion of numbers of electrons. The invention of the incandescent lightbulb (1879) and the construction of the first central power station (1881) by Thomas Alva Edison led to the rapid introduction of electric power into factories and homes. See also James Clerk Maxwell.”1 1 Encyclopaedia Britannica David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 4 / 35
  • 5. Electric power industry David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 5 / 35
  • 6. Electric power industry “The electric power industry provides the production and delivery of electric energy, often known as power, or electricity, in sufficient quantities to areas that need electricity through a grid connection. The grid distributes electrical energy to customers. Electric power is generated by central power stations or by distributed generation. Many households and businesses need access to electricity, especially in developed nations, the demand being scarcer in developing nations. Demand for electricity is derived from the requirement for electricity in order to operate domestic appliances, office equipment, industrial machinery and provide sufficient energy for both domestic and commercial lighting, heating, cooking and industrial processes. Because of this aspect of the industry, it is viewed as a public utility as infrastructure.”2 2 Wikipedia David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 6 / 35
  • 7. Current consumption of the Czech Republic This whole industry is run and controlled by a lot of computers. They have great numbers on their fingertips, but... David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 7 / 35
  • 8. Threats Threats:3 Intrusion: malicious attackers may intrude client or server by searching vulnerabilities, and the stable service of control boards may be threatened. Impersonation: operators who don’t have the right accounts but can enter , may impersonate operators who have the right accounts sand the stable service of control boards may be threatened. Tapping: malicious attackers may tap packets on the Internet, and data sent and received may be threatened. Obstruction: malicious attackers may attack client or server very often, and smooth operation may be threatened. Destruction: operators who have the right accounts may execute illegal operations unjustly, and the stable service of control boards may be threatened. 3 The Security Design of Remote Maintenance System for Nuclear Power Plants, based on ISO/IEC 15408 David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 8 / 35
  • 9. What is cryptography? The practice and study of hiding information. Now is much more complex than just encryption to apparent nonsense. David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 9 / 35
  • 10. Encryption and decryption David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 10 / 35
  • 11. Public-key cryptography David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 11 / 35
  • 12. Public-key cryptography David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 12 / 35
  • 13. Public key infrastructure CA = Certificate Authority RA = Registration Authority David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 13 / 35
  • 14. My public key I am not afraid to show you my public key! David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 14 / 35
  • 15. Signing If you have just your key, you can sign David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 15 / 35
  • 16. Encryption If you have both keys, you can encrypt David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 16 / 35
  • 17. General attributes of public keys Increased security and convenience. private keys never need to transmitted or revealed to anyone digital signatures speed vulnerable to impersonation (attack on a certification authority) David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 17 / 35
  • 18. Electric power industry The legal unbundling laid down in 2005 as part of the second European energy market package applies in 11 out of 27 EU countries. Generation Transmission Distribution (e.g. consumption measurements) Retailing (e.g. end customer invoicing) David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 18 / 35
  • 19. High level overview David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 19 / 35
  • 20. Organizations involved - CEPS CEPS jsc is a joint-stock company operating Transmission System (TS) of the Czech Republic by law. ensuring electricity transmission ensuring balance between electricity generation and consumption at any moment maintenance, modernization and development of TS equipment David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 20 / 35
  • 21. Organizations involved - OTE A processing and reporting business balance of elektricity according to data supplied by electricity market participants. An organization of short-term markets and balancing market with regulating energy in cooperation with transmission system operator. The evaluation and settlement of imbalances between the agreed and actual electricity supplies and consumption. Publishing monthly and annual reports about Czech elektricity market. Collecting metered data from deliveries and supplies for market paticipants. The evaluation and settlement of regulating energy. Administration of registry for trading with greenhouse gas emission allowances. David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 21 / 35
  • 22. OTE CA David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 22 / 35
  • 23. Electricity generation David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 23 / 35
  • 24. Electricity generation For nuclear powerplants Title 10 of the Code of Federal Regulations (10 CFR) Section 73.21(g)(3) states, in part, “. . . Safeguards Information shall be transmitted only by protected telecommunication circuits (including facsimile) approved by the NRC.” The Nuclear Regulatory Commission (NRC) considers those encryption systems that the National Institute of Standards and Technology (NIST) has determined conform to the Security Requirements for Cryptographic Modules in Federal Information Processing Standard (FIPS) 140-2, as being acceptable. The Secretary of Commerce has made use of Cryptographic Module Validation Program products mandatory and binding for Federal agencies when a Federal agency determines that cryptography is necessary for protecting sensitive information. David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 24 / 35
  • 25. Stuxnet David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 25 / 35
  • 26. Stuxnet David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 26 / 35
  • 27. Transmission David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 27 / 35
  • 28. Distribution David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 28 / 35
  • 29. Distribution David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 29 / 35
  • 30. Retailing David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 30 / 35
  • 31. Communication David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 31 / 35
  • 32. Communication David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 32 / 35
  • 33. Communication David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 33 / 35
  • 34. SmartGrid David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 34 / 35
  • 35. Thank you! David Podhola david.po@praguecollege.cz, david@podhola.net http://david.podhola.net David Podhola (Prague College) Industrial applications of cryptography 30. kvˇtna 2011 e 35 / 35