Time-based one-time password method and system suitable for PLC

A one-time, password technology, applied in the field of information security, can solve problems such as program slowness, achieve the effects of enhancing security, speeding up speed and reliability, and reducing memory usage

Active Publication Date: 2020-10-02
CHONGQING UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since ST does not provide bottom-level optimization, and many commercial PLCs (such as Rockwell) do not provide the sh

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0015] The inventor found that because Intel’s CPU integrates the AES instruction set, the PHOTON and SPONGENT hashing algorithms optimized based on AES are more efficient on the PC, but there is no AES instruction set on the PLC, so the PHOTON and SPONGENT hashing algorithms are lightweight The level of password algorithm runs inefficiently on PLC. In Table 1, the performance of the hash algorithm and the block encryption algorithm are summarized, and the reason why the time-based one-time password is inefficient if based on the hash is obtained by comparing the number of atomic operations: 256 / 32 / 32 The PHOTON hash algorithm mainly does 100,000 assignments, 20,000 additions, and 15,000 XORs. The 256 / 256 / 128 version of the SPONGENT hash algorithm mainly does 420,000 assignments, 3,000 additions, and 6,000 XORs. , And the PRESENT block encryption algorithm that meets 128-bit security mainly does 5,000 assignments, 60 XORs, and the SPECK block encryption algorithm mainly does 3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a time-based one-time password method suitable for a PLC, to-be-verified equipment, verification equipment and an identity verification system. The method comprises the following steps of enabling an attestation party to execute the steps of: A1, acquiring a verification key; A2, establishing a password chain containing a plurality of nodes, storing the password value of the head node, and sending the password value of the tail node to a verification party; a3, generating a first one-time password by using the verification key, the end time of the password chain and thecurrent time, and sending the first one-time password to the verification party; enabling a verification party to execute the following steps: B1, setting a dynamic verification point and recording the latest identity verification time; b2, receiving the first one-time password, recording the receiving time, if time verification is passed and the value of the second one-time password is equal tothe value of the current verification point, determining that verification succeeds, and updating the verification point and the latest identity verification time. According to the method, high-efficiency and high-security verification of the PLC identity is realized, PLC firmware does not need to be changed, and memory occupation is reduced.

Description

technical field [0001] The invention relates to the field of information security, in particular to a time-based one-time password method suitable for PLC, equipment to be authenticated, authentication equipment and an identity authentication system. Background technique [0002] Because traditional cyber physical systems (CPS for short) have no security measures, CPS has suffered some large-scale attacks in recent years. CPS, as the unity of computing process and physical process, is a next-generation intelligent system integrating computing, communication and control. The main target of the attacker's attack. [0003] A firewall can be used in the CPS to ensure secure communication and access control between the Supervisory Control And Data Acquisition (SCADA) and the PLC, but the firewall cannot perform direct identity authentication for a specific PLC, and the existing PLC does not have any identity-related confidential information, so the data acquisition and monitori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/08H04L29/06
CPCH04L9/0618H04L9/0863H04L9/088H04L63/0838
Inventor 杨铮包致婷
Owner CHONGQING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products