DOI QR코드

DOI QR Code

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung (Department of NPP Engineering, KEPCO International Nuclear Graduate School) ;
  • Jung, Jae Cheon (Department of NPP Engineering, KEPCO International Nuclear Graduate School)
  • Received : 2018.11.15
  • Accepted : 2019.01.07
  • Published : 2018.12.31

Abstract

In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.

Keywords

HSSTBN_2018_v14n2_73_f0001.png 이미지

[Figure 1] Cyber Security Equipment Configuration of NPP

HSSTBN_2018_v14n2_73_f0002.png 이미지

[Figure 2] Cyber Security Equipment Configuration

HSSTBN_2018_v14n2_73_f0004.png 이미지

[Figure 3] AES-128 Encryption and Decryption

HSSTBN_2018_v14n2_73_f0005.png 이미지

[Figure 4] EFFBD of software based Encryption

HSSTBN_2018_v14n2_73_f0006.png 이미지

[Figure 5] EFFBD of FPGA based Encryption

HSSTBN_2018_v14n2_73_f0007.png 이미지

[Figure 6] Simulation of EFFBD of software based Encryption

HSSTBN_2018_v14n2_73_f0008.png 이미지

[Figure 7] Simulation of EFFBD of FPGA based Encryption

HSSTBN_2018_v14n2_73_f0009.png 이미지

[Figure 8] Simulation of EFFBD of software based Decryption

HSSTBN_2018_v14n2_73_f0010.png 이미지

[Figure 9] Simulation of EFFBD of FPGA based Decryption

HSSTBN_2018_v14n2_73_f0011.png 이미지

[Figure 10] Simulation of EFFBD of software based Decryption

HSSTBN_2018_v14n2_73_f0012.png 이미지

[Figure 11] Simulation of EFFBD of FPGA based Decryption

HSSTBN_2018_v14n2_73_f0013.png 이미지

[Figure 12] Test Bench Simulation

AES types and parameter

HSSTBN_2018_v14n2_73_t0001.png 이미지

System Integration Test Results

HSSTBN_2018_v14n2_73_t0002.png 이미지

References

  1. N. Falliere, "W32.Stuxnet Dossier," symantec, Feb 2011. [Online]. Available: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf.
  2. M. A. Elakrat, "Development of field programmable gate array-based encryption module to mitigate man-inthe-middle attack for nuclear power plant data communication network," Nuclear Engineering and Technology, vol. Volume 50, no. Issue 5, p. 780-787, June 2018. https://doi.org/10.1016/j.net.2018.01.018
  3. D. Brecht, "Tales from the Crypt: Hardware vs Software," Infosecurity, [Online]. Available: https://www.infosecuritymagazine.com/magazine-features/talescrypt-hardware-software/.
  4. International Atomic Energy Agency, "Application of Field Programmable Gate Arrays in Instrumentation and Control Systems of Nuclear Power Plants," IAEA, p 4, 2016.
  5. E. Phneah, "ZDNet," 13 Februrary 2013. [Online]. Available: https://www.zdnet.com/article/hardwarebased-security-more-effectiveagainst-new-threats/.
  6. Protection of Digital Computer and Communication Systems and Networks Available, vol. 10 CFR 73.54, U.S. NRC, 2009.
  7. "Cyber Security Programs for Nuclear Facilities," January 2010. [Online]. Available: http://www.nrc.gov/readingrm/doc-collections/.
  8. FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION, "Standards for Security Categorization of Federal Information and Information Systems: FIPF PUB 199," U.S. DEPARTMENT OF COMMERCE, NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, 2004.
  9. William Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, NY 07458: PERASON, 2011.
  10. Vitech Corporation, "COREsim User Guide," June 2015. [Online]. Available: http://www.vitechcorp.com/support/documentation/core/900/COREsimuserguide.pdf.
  11. M. Nagendra and M. Chandra Sekhar, "Performance Improvement of Advanced Encryption Algorithm using Parallel Computation," International Journal of Software Engineering and Its Applications, vol. 8, no. 2, pp. 287-296, 2014. https://doi.org/10.14257/ijseia.2014.8.1.25
  12. XILINX, "Vivado Design Suite Tutorial: Using Constraints," April 2018. [Online]. Available: https://www.xilinx.com/support/documentation/sw_manuals/xilinx2018_1/ug945-vivado-using-constraints-tutorial.pdf.
  13. Elaine Barker, William Barker and William Burr, "NIST Special Publication 800-57: Recommendation for Key Management - Part 1: General(Revision 3)," July 2012. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-57p1r3.pdf.
  14. National Institute of Standards and Technology, "NIST Speacial Publication 800-38A," December 2001. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/legacy/sp
(34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
Copyright (C) KISTI. All Rights Reserved.