Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Time-based one-time password method and system suitable for PLC

A one-time, password technology, applied in the field of information security, can solve problems such as program slowness, achieve the effects of enhancing security, speeding up speed and reliability, and reducing memory usage

Active Publication Date: 2020-10-02
CHONGQING UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since ST does not provide bottom-level optimization, and many commercial PLCs (such as Rockwell) do not provide the shift function required for the implementation of cryptographic algorithms, programs based on ST are slower than other languages.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The inventor found that because Intel's CPU integrates the AES instruction set, the PHOTON and SPONGENT hash algorithms based on AES optimization have higher efficiency on the PC, but there is no AES instruction set on the PLC, so the light-weight hash algorithms such as PHOTON and SPONGENT Level cipher algorithm is less efficient to run on PLC. In Table 1, the performance of the hash algorithm and the block encryption algorithm is summarized, and the reason why the time-based one-time password will be inefficient if it is based on the hash is explained. By comparing the number of atomic operations: 256 / 32 / 32 version The PHOTON hash algorithm mainly performs 100,000 assignments, 20,000 additions, and 15,000 XORs. The 256 / 256 / 128 version of the SPONGENT hash algorithm mainly performs 420,000 assignments, 3,000 additions, and 6,000 XORs. , while the PRESENT block encryption algorithm that satisfies 128-bit security mainly performs 5,000 assignments and 60 XORs, and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a time-based one-time password method suitable for a PLC, to-be-verified equipment, verification equipment and an identity verification system. The method comprises the following steps of enabling an attestation party to execute the steps of: A1, acquiring a verification key; A2, establishing a password chain containing a plurality of nodes, storing the password value of the head node, and sending the password value of the tail node to a verification party; a3, generating a first one-time password by using the verification key, the end time of the password chain and thecurrent time, and sending the first one-time password to the verification party; enabling a verification party to execute the following steps: B1, setting a dynamic verification point and recording the latest identity verification time; b2, receiving the first one-time password, recording the receiving time, if time verification is passed and the value of the second one-time password is equal tothe value of the current verification point, determining that verification succeeds, and updating the verification point and the latest identity verification time. According to the method, high-efficiency and high-security verification of the PLC identity is realized, PLC firmware does not need to be changed, and memory occupation is reduced.

Description

technical field [0001] The invention relates to the field of information security, in particular to a time-based one-time password method suitable for PLC, equipment to be authenticated, authentication equipment and an identity authentication system. Background technique [0002] Because traditional cyber physical systems (CPS for short) have no security measures, CPS has suffered some large-scale attacks in recent years. CPS, as the unity of computing process and physical process, is a next-generation intelligent system integrating computing, communication and control. The main target of the attacker's attack. [0003] A firewall can be used in the CPS to ensure secure communication and access control between the Supervisory Control And Data Acquisition (SCADA) and the PLC, but the firewall cannot perform direct identity authentication for a specific PLC, and the existing PLC does not have any identity-related confidential information, so the data acquisition and monitori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08H04L29/06
CPCH04L9/0618H04L9/0863H04L9/088H04L63/0838
Inventor 杨铮包致婷
Owner CHONGQING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products