In terms of data confidentiality in industrial networks, the
required lifetime may be of a short duration, if it is required at
all. Authentication, on the other hand, needs to be maintained
for the life of the equipment, which is generally several
years. Due to the limited processing power and bandwidth in
industrial networks, algorithms cannot be implemented that are
able to deliver such long lifetimes. Therefore, the key will need
to be replaced before the minimum amount of time in which
it would be possible to decrypt the algorithm and deduce the
key. To manually facilitate key replacement in large systems
would be impractical, especially if equipment is only able to
implement cryptographic algorithms with lifetimes measured
in days or weeks. The practical implementation of secure
communications within the lowest levels of industrial networks
is currently a topic into which much research is being done,
as many aspects such as effective key management remain an
open problem [55]
In terms of data confidentiality in industrial networks, therequired lifetime may be of a short duration, if it is required atall. Authentication, on the other hand, needs to be maintainedfor the life of the equipment, which is generally severalyears. Due to the limited processing power and bandwidth inindustrial networks, algorithms cannot be implemented that areable to deliver such long lifetimes. Therefore, the key will needto be replaced before the minimum amount of time in whichit would be possible to decrypt the algorithm and deduce thekey. To manually facilitate key replacement in large systemswould be impractical, especially if equipment is only able toimplement cryptographic algorithms with lifetimes measuredin days or weeks. The practical implementation of securecommunications within the lowest levels of industrial networksis currently a topic into which much research is being done,as many aspects such as effective key management remain anopen problem [55]
การแปล กรุณารอสักครู่..