Quantum-Resistant Cryptography for Smart Metering in Smart Grid Systems
Abstract
:1. Introduction
- The key for encrypting the message is longer than or equal to the encrypted message;
- The encryption key is generated randomly (not pseudo-randomly);
- A given key is used to encrypt no more than one message.
2. Overview of Authentication Solutions and Systems
Algorithm 1. Simple authentication, cryptogram shared secret Pass |
Input: ks ← (65,537, n), kd ← (d,n), Pass ← Pass, |
Output: Verify ← “Yes/No” |
|
3. Materials and Methods
3.1. Proposed Cryptographic System for Authentication
Demonstration Example
3.2. Proposed Key Exchange Protocol for RSA with OTP
Algorithm 2. Differential authentication with cryptogram shared secret |
Input: d ← 65,537, ni ← ni, mi ← mi, |
Output: Verify ← “Yes/No” |
|
3.2.1. Demonstration Example
3.2.2. Efficiency of RSA Authentication with OTP
3.3. Discussion of the Obtained Results
4. Conclusions and Future Applications
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Arampatzis, A. Top 10 Vulnerabilities that Make IoT Devices Insecure. 2023. Available online: https://venafi.com/blog/top-10-vulnerabilities-make-iot-devices-insecure/ (accessed on 5 December 2024).
- Kagermann, H.; Lukas, W.D.; Wahlster, W. Industrie 4.0: Mit Dem Internet der Dinge Auf Dem Weg zur 4. Industriellen Revolution, 2011. Available online: https://www.vdi-nachrichten.com/Technik-Gesellschaft/Industrie-40-Mit-Internet-Dinge-Weg-4-industriellen-Revolution (accessed on 5 December 2024).
- Schwab, K. The Fourth Industrial Revolution; Penguin: New York, NY, USA, 2017. [Google Scholar]
- Katz, J.; Lindell, Y. Introduction to Modern Cryptography; CRC Press: Boca Raton, FL, USA, 2014; Available online: https://eclass.uniwa.gr/modules/document/file.php/CSCYB105/Reading%20Material/%5BJonathan_Katz%2C_Yehuda_Lindell%5D_Introduction_to_Mo%282nd%29.pdf (accessed on 12 December 2024).
- Menezes, A.J.; von Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press/Taylor&Francis Group: Boca Raton, FL, USA, 1997; ISBN 978-0-84-938523-0. [Google Scholar]
- Stallings, W.; Borwn, L. Computer Security; Pearson: New York, NY, USA, 2018. [Google Scholar]
- Stallings, W. Kryptografia i Bezpieczeństwo, Matematyka Szyfrów i Techniki Kryptologii; Helion: Gliwice, Poland, 2011. [Google Scholar]
- Shannon, C. Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Enisa. Post-Quantum Cryptography: Current State and Quantum Mitigation, 2021. Available online: https://www.enisa.europa.eu/publications/post-quantum-cryptography-current-state-and-quantum-mitigation (accessed on 15 November 2024).
- Enisa. EU’s First Ever Report on The State of Cybersecurity in the Union, 2024. Available online: https://www.enisa.europa.eu/news/eus-first-ever-report-on-the-state-of-cybersecurity-in-the-union (accessed on 15 November 2024).
- Technical Specifications and Procedures for Assurance Levels. Available online: https://www.legislation.gov.uk/eur/2015/1502/adopted (accessed on 5 December 2024).
- Trevino, A. Jak Słabe Hasła Prowadzą do Ataków z Użyciem Oprogramowania Wymuszającego Okup, 2024. Available online: https://www.keepersecurity.com/blog/pl/2024/02/29/how-weak-passwords-lead-to-ransomware-attacks/ (accessed on 15 November 2024).
- Błędy w Protokołach Kryptograficznych, 2002. Available online: https://ipsec.pl/bdy-w-protokoach-kryptograficznych.html (accessed on 15 December 2024).
- NIST. Digital Identity Guidelines. Authentication and Lifecycle Management. 2017. Available online: https://pages.nist.gov/800-63-3/sp800-63b.html (accessed on 5 November 2024).
- Jones, M.; Bradley, J.; Sakimura, N. JSON Web Token, 2015. Available online: https://datatracker.ietf.org/doc/html/rfc7519 (accessed on 5 December 2024).
- Newman, C.; Menon-Sen, A.; Melnikov, A.; Williams, N. Mechanizm Uwierzytelniania Metodą Salted Challenge Response (SCRAM) SASL i Mechanizmy GSS-API, RFC 5802, 2010. Available online: https://www.rfc-editor.org/info/rfc5802 (accessed on 5 November 2024). [CrossRef]
- Melnikov, A. Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-API Mechanisms, 2024. Available online: https://www.ietf.org/archive/id/draft-melnikov-scram-bis-05.html (accessed on 10 November 2024).
- NIST. Module-Lattice-Based Key-Encapsulation Mechanism Standard, 2024. Available online: https://csrc.nist.gov/pubs/fips/203/final (accessed on 5 November 2024).
- McCabe, C.; Mohideen, A.I.C.; Singh, R. A Blockchain-Based Authentication Mechanism for Enhanced Security. Sensors 2024, 24, 5830. [Google Scholar] [CrossRef]
- Hammami, H.; Yahia, S.B.; Obaidat, M.S. Scalable and efficient authentication scheme for secure smart grid communication. IET Netw. 2020, 9, 165–169. [Google Scholar] [CrossRef]
- Wu, D.; Zhou, C. Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid. 2011, 2, 375–381. [Google Scholar] [CrossRef]
- Alshowkan, M.; Evans, P.G.; Starke, M.; Earl, D.; Peters, N.A. Authentication of Smart Grid Communications Using Quantum Key Distribution, Scientific Reports. 2022. Available online: https://www.nature.com/articles/s41598-022-16090-w (accessed on 12 December 2024).
- Jabłoński, J.; Wojtowicz, M. Bezwarunkowo bezpieczny system kryptograficzny. Logistyka 2014, 5, 611–616. [Google Scholar]
- Jabłoński, J. System Szyfratora z Kluczem Jednorazowym; Patent 218339; Urząd Patentowy Rzeczypospolitej Polskiej: Warszawa, Poland, 2014. [Google Scholar]
- Raspberry Pi, Raspberry Pi 4, 2024 Specification. Available online: https://www.raspberrypi.com/products/raspberry-pi-4-model-b/ (accessed on 5 November 2024).
17 | 19 | 23 | 29 | 31 | |
---|---|---|---|---|---|
17 | - | 323 | 391 | 493 | 527 |
19 | - | - | 437 | 551 | 589 |
23 | - | - | - | 667 | 713 |
29 | - | - | - | - | 899 |
31 | - | - | - | - | - |
i+1 | ni | d | ci | ? li = mi | si | Φ(ni+1) |
---|---|---|---|---|---|---|
1 | 323 | 67 | 321 | 111 | 43 | 288 |
2 | 391 | 67 | 321 | 298 | 331 | 352 |
3 | 437 | 67 | 321 | 206 | 331 | 396 |
4 | 493 | 67 | 321 | 366 | 107 | 448 |
5 | 527 | 67 | 321 | 230 | 43 | 480 |
6 | 551 | 67 | 321 | 453 | 331 | 504 |
7 | 589 | 67 | 321 | 168 | 403 | 540 |
8 | 667 | 67 | 321 | 482 | 331 | 616 |
9 | 713 | 67 | 321 | 137 | 463 | 660 |
10 | 899 | 67 | 321 | 540 | 163 | 840 |
ni+1—ni | 323 | 391 | 437 | 493 | 527 | 551 | 589 | 667 | 713 | 899 |
---|---|---|---|---|---|---|---|---|---|---|
323 | 0 | 68 | 114 | 170 | 204 | 228 | 266 | 344 | 390 | 576 |
391 | −68 | 0 | 46 | 102 | 136 | 160 | 198 | 276 | 322 | 508 |
437 | −114 | −46 | 0 | 56 | 90 | 114 | 152 | 230 | 276 | 462 |
493 | −170 | −102 | −56 | 0 | 34 | 58 | 96 | 174 | 220 | 406 |
527 | −204 | −136 | −90 | −34 | 0 | 24 | 62 | 140 | 186 | 372 |
551 | −228 | −160 | −114 | −58 | −24 | 0 | 38 | 116 | 162 | 348 |
589 | −266 | −198 | −152 | −96 | −62 | −38 | 0 | 78 | 124 | 310 |
667 | −344 | −276 | −230 | −174 | −140 | −116 | −78 | 0 | 46 | 232 |
713 | −390 | −322 | −276 | −220 | −186 | −162 | −124 | −46 | 0 | 186 |
899 | −576 | −508 | −462 | −406 | −372 | −348 | −310 | −232 | −186 | 0 |
ni+1 [bits] | “gen” [ms] | “auth” [ms] |
---|---|---|
256 | 46 | 26 |
512 | 102 | 26 |
1024 | 511 | 24 |
2048 | 5788 | 26 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jabłoński, J.; Dylewski, R. Quantum-Resistant Cryptography for Smart Metering in Smart Grid Systems. Energies 2025, 18, 1204. https://doi.org/10.3390/en18051204
Jabłoński J, Dylewski R. Quantum-Resistant Cryptography for Smart Metering in Smart Grid Systems. Energies. 2025; 18(5):1204. https://doi.org/10.3390/en18051204
Chicago/Turabian StyleJabłoński, Janusz, and Robert Dylewski. 2025. "Quantum-Resistant Cryptography for Smart Metering in Smart Grid Systems" Energies 18, no. 5: 1204. https://doi.org/10.3390/en18051204
APA StyleJabłoński, J., & Dylewski, R. (2025). Quantum-Resistant Cryptography for Smart Metering in Smart Grid Systems. Energies, 18(5), 1204. https://doi.org/10.3390/en18051204