Confidentiality Through Encryption - Siemens SIMATIC ET 200AL System Manual

Distributed i/o system
Hide thumbs Also See for SIMATIC ET 200AL:
Table of Contents

Advertisement

3.6.2

Confidentiality through encryption

Message encryption is an important element of data security. When encrypted messages are
intercepted by third parties during communication, these potential eavesdroppers cannot
access the information they contain.
There is a wide range of mathematical processes (algorithms) for encrypting messages.
All algorithms process a "key" parameter to encrypt and decrypt messages.
● Algorithm + key + message => encrypted message
● Encrypted message + key + algorithm => (decrypted) message
Symmetric encryption
The central aspect of symmetric encryption is that both communication partners use the
same key for message encryption and decryption, as shown in the figure below. Bob uses
the same key for encryption as Alice uses for decryption. In general, we also say that the two
sides share the secret key with which they encrypt or decrypt a message as a secret.
Figure 3-7
The process can be compared to a briefcase to which the sender and recipient have the
same key, which both locks and opens the case.
● Advantage: Symmetric encryption algorithms (such as AES, Advanced Encryption
Algorithm) are fast.
● Disadvantages: How can the key be sent to a recipient without getting into the wrong
hands? This is a key distribution problem. If enough messages are intercepted, the key
can also be worked out and must therefore be changed regularly.
If there are a large number of communication partners, there is also a large number of keys
to distribute.
Communication
Function Manual, 12/2017, A5E03735815-AF
Bob encrypts his message with the symmetric key
Alice decrypts the encrypted message with the symmetric key
Symmetric encryption
Communications services
3.6 Secure Communication
39

Advertisement

Table of Contents
loading

Table of Contents