The Search and Improvement of DES Algorithm for Data Transmission Security in SCADA

Author(s):  
Xudong Xu ◽  
Na Tian
2021 ◽  
Vol 252 ◽  
pp. 01027
Author(s):  
Yanrong Jing ◽  
Wenqian Zhang ◽  
Lin Ge ◽  
Nanfang Li ◽  
Xiyuan Shang ◽  
...  

In order to ensure the effect of network data transmission in scientific research institutions and avoid network information from being attacked and damaged, a secure sharing method of network data transmission based on multi-layer encryption technology is proposed. Combined with multi-layer encryption technology, the network data transmission security protocol is constructed to ensure the security and integrity of the initial file. The network information transmission security evaluation system is further constructed. The network transmission path security of scientific research institutions is tracked, evaluated and tested in real time. The network data transmission security sharing platform is constructed to ensure the safe sharing of massive and complex data Experiments have proved that the security and sharing processing effect of the network data transmission security sharing method based on multi-layer encryption technology are significantly improved compared with the traditional methods, and fully meet the research requirements.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Shuai Zhang ◽  
Liqun Huang ◽  
Mingxu Zhu

In order to effectively solve the problem of data transmission security and peak-to-average ratio (PAPR) in an orthogonal frequency division multiplexing passive optical network (OFDM-PON) transmission system, in this paper, a joint encryption scheme of discrete cosine transform (DCT) and selective mapping (SLM) based on chaotic mapping is proposed. In this scheme, the chaotic sequence of a 3D Lorenz chaotic system is used as the row and column index of the DCT matrix and the phase factor of SLM to resist selective plaintext attack, and the system encryption is realized while reducing PAPR. The theoretical analysis and numerical simulation show that the common OFDM-PON, the proposed algorithm, can obtain a PAPR suppression gain of ∼4.8 dB and improve the receiver sensitivity by ∼4 dB BER @ 10 − 3 . In addition, it shows that, with the increase of row/column index mismatch of the DCT matrix, the bit error rate of the system increases gradually. An encrypted data transmission of 8 GB/s 16-QAM optical OFDM signals is successfully simulated over a 20 km standard single-mode fiber, which proves the excellent confidentiality of the proposed secure transmission.


2021 ◽  
Vol 14 (1) ◽  
pp. 376-386
Author(s):  
Eko Riyadi ◽  
◽  
Tri Priyambodo ◽  
Agfianto Putra ◽  
◽  
...  

Most of the communication protocols in the Industrial Control System (ICS) are vulnerable to cyber-attacks. Initially, the network protocol was designed for reliable performance, and thus did not incorporate data transmission security features. Therefore, ICS requires adequate data transmission security. This paper suggests improving the security of data transmission through a dynamic symmetric four-key-generators system, wherein the system anticipates cyberattacks by generating four keys before encryption. It involves four generators: a random initial key generator, a keystream generator, a key scheduling algorithm generator, and a pseudo-random number algorithm generator. In the receiver section, the system generates three keys before decryption to ensure data confidentiality and to avoid cyberattacks. The test results show that the proposed system keyspace is ≈22048 bits, meaning that the key is more secure from brute force attacks. As a result, the cipher data have a correlation value of 0.00007. The entropy value is 7.99, indicating that the cipher data is more secure. Also, speed tests show that the processing time still qualifies as realtime.


Sign in / Sign up

Export Citation Format

Share Document