Skip to main content

Mathematical Apparatus for Safety Evaluation of Cryptography and Safety Codes Used in Safety – Related Communication System

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 239))

Abstract

The paper deals with the problems of safety evaluation of a combined system, which consists of the cryptography and the safety codes applied in the safety communication layer within a safety-related system. In most cases the cryptography codes are combined with the safety codes which increase the performance of the cryptography system. In these applications it is very important to realise the optimisation of the selection of safety and cryptography codes parameters so that the probability of errors in the output of the cryptography decoder caused by electromagnetic interferences (EMI) will be under guaranteed safety integrity level (SIL). The main part of the paper presents the numerical results of an average probability of block cryptography codes used in praxis (block ciphers 2-DES, 3-DES, AES) with a combination of several code words lengths of safety block channel Hamming codes depending on the bit error rate (BER) of the noise communication channel.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kalašová, A., Krchová, Z.: Analysis of Road Traffic Accident Rate in the Slovak Republic and Possibilities of Its Reduction through Telematic Applications, pp. 463–468. Springer, Heidelberg (2010) ISSN 1865-0929, ISBN-10: 3-642-16471, ISBN-13: 978-3-642-16471-2

    Google Scholar 

  2. Pavlík, M., Zolotová, I., Hošák, R., Landryová, L.: Benefits of Virtualization in HMI/SCADA Systems. In: Proceedings of the 14th International Conference on System Theory and Control, October 17-19, pp. 379–384. Sinaia, Rumunsko (2010)

    Google Scholar 

  3. Sklavos, N., Zhang, X.: Wireless Security and Cryptography Specifications and Implementations. CRC Press, Taylor & Francis Group (2010) ISBN 0-8493-8771-X

    Google Scholar 

  4. Levický, D.: Cryptography in Information and Network Security. In: Slovak, Elfa Košice (2010) ISBN 978-80-8086-163-6

    Google Scholar 

  5. Rástočný, K., Ilavský, J.: Quantification of the Safety Level of a Safety-critical Control System. In: IEEE International Conference on Applied Electronics, p. 285. IEEE Catalog Number CPF 1069A-PRT, Pilsen (2010) ISSN 1803-7232. ISBN 978-80-7043-865-7

    Google Scholar 

  6. Rástočný, K., Ilavský, J.: Effects of a Periodic Maintenance on the Safety Integrity Level of a Control System. In: 8th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems FORMS/FORMAT 2010, Braunschweig. Part 2, pp. 77–85. Springer, Heidelberg (2010) ISBN 978-3-42-14260-4,e-ISBN 978-3-642-14261-1

    Google Scholar 

  7. FIPS 140-2: Security requirement for cryptographic modules. Federal Information Processing Standard Publication (1994)

    Google Scholar 

  8. Zahradník, J., Rástočný, K.: Applications of interlocking systems. EDIS, ŽU. In: Slovak, Žilina (2006) ISBN 80-8070-546-1

    Google Scholar 

  9. EN 50 159: Railway applications: Communication, signalling, and processing systems – Safety-related communication in transmission systems. CENELEC (2010)

    Google Scholar 

  10. Mathur, C.N., Narayan, K., Subbalakshmi, K.P.: High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. Department of Electrical and Computer Engineering Stevens Institute of Technology, Hoboken, NJ 07030, USA

    Google Scholar 

  11. ISO/IEC 10116:2006, Information technology – Security techniques – Modes of operation for an n-bit block cipher

    Google Scholar 

  12. Karná, L., Klapka, Š., Harlenderová, M.: Quantitative Assessment of Safety Codes. In: Proceeding of International Conference FORM/FORMAT 2008, Budapest, Hungary, pp. 249–255 (2008)

    Google Scholar 

  13. Torrieri, D.J.: Principle of secure communications. Artech House, Boston London (1993) ISBN 0-89006-555-1

    Google Scholar 

  14. Mikulski, J.: Using Telematics In Transport. In: Mikulski, J. (ed.) TST 2010. CCIS, vol. 104, pp. 175–182. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  15. Młyńczak, J.: Using Databases in Switch Point Mechanism Diagnostics. In: Mikulski, J. (ed.) TST 2010. CCIS, vol. 104, pp. 152–159. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Franeková, M. (2011). Mathematical Apparatus for Safety Evaluation of Cryptography and Safety Codes Used in Safety – Related Communication System. In: Mikulski, J. (eds) Modern Transport Telematics. TST 2011. Communications in Computer and Information Science, vol 239. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24660-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24660-9_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24659-3

  • Online ISBN: 978-3-642-24660-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics