Design and implementation of data encryption for networked control systems

Ke Ya Yuan*, Jie Chen, Guo Ping Liu, Jian Sun

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Control systems are widely used in daily life and support various important infrastructure, such as power, hydraulics, petrochemicals, transport, telecom, etc. Once the control system is attacked, the consequence would be unthinkable. The DES (Data Encryption Standard) encryption algorithm is open, and it has the merit of large encryption strength and fast computational speed. This paper describes the DES algorithm, the hardware and software design of the DES hardware encryption system based on the DES encryption algorithm and FPGA (Field Programmable Gate Array). The hardware design includes the design program of the DES hardware encryption system, the design of S-box and the design of circuit architecture. The software design is mainly to write a s-function of the DES hardware interface. An experiment of a networked DC motor speed control based on DES is described, and this networked control system has the function of hardware encryption.

Original languageEnglish
Title of host publicationProceedings 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009
Pages2105-2109
Number of pages5
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009 - San Antonio, TX, United States
Duration: 11 Oct 200914 Oct 2009

Publication series

NameConference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
ISSN (Print)1062-922X

Conference

Conference2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009
Country/TerritoryUnited States
CitySan Antonio, TX
Period11/10/0914/10/09

Fingerprint

Dive into the research topics of 'Design and implementation of data encryption for networked control systems'. Together they form a unique fingerprint.

Cite this