Skip to main content

ISA99 Committee

All SitesGo Search
ISA99 Committee
  
ISA99 Committee > ISA99-Wiki > GL_asymmetric key algorithm  

GL_asymmetric key algorithm

 
asymmetric key algorithm
 
 
Note:

Asymmetric indicates that the key for encoding the digital data to be transmitted is entirely different from the key for decrypting the data after reception. This is in contrast to symmetric key encryption, where the same key is used to encrypt and decrypt the data. Asymmetric key encryption is logistically more secure because it can avoid the need to share a key between transmitter and receiver, thereby reducing risk of disclosure of the ‘private’ key.

It is important to note that cryptographic methods to protect the confidentiality of data are more critical for IT networks than for control networks. For IACS, confidentiality is most critical for the authenticating and authorization stages during access control into a given IACS. Asymmetric cryptography usually adds significant undesired latency to an IACS network, which is very undesirable for open and closed loop systems that must receive, manipulate, and send control data at a rate commensurate to an asset’s process dynamics. Integrity and availability are usually more important IACS cyber security objectives than confidentiality.
 
Comments:

Target Audiences
No targeting
Last modified at 7/29/2013 2:58 PM  by Jeff Potter