株式会社キャンパスクリエイト

Aiming to be a Global Open Innovation Hub
centered on Japanese universities
-Campus Create Co., Ltd―

Encrypted control technology


Encrypted control technology

Organization Name

Kiminao KOGISO The University of Electro-Communications

Technical field

Encrypted control is a next-generation control technology that provides secure implementation of control algorithms, such as PID controls, to be processed in ciphertext. The secure implementation of the encrypted control is realized by integrating confidential computation (public-key homomorphic encryption schemes) into the computation of control algorithms. As a result, control parameters and communications including sensor measurement and control signals can be kept secret in operating the control system. One of the features of the encrypted control technology is that the control parameters are encrypted, which means the original (unencrypted) control parameters do not need to install to a control unit. Another feature is that the encrypted control system does not need to keep the private key inside a controller unit, so key management costs and the risk of key leakage can be reduced. Moreover, we can use a secure protocol together with the encrypted control technology. Furthermore, we developed "a dynamic-key (key-updatable) encryption scheme" which is a new encryption scheme suitable for encrypted control. The developed makes it possible to update the public and private keys in milliseconds (in place of the key generation process) without running a key-generation algorithm. Therefore, we can construct a more secure control system against cyberattacks such as a replay attack.

Contact us

Details

Keypoint

  • Homomorphic Encryption /Confidential Computation.
  • Cyber Security Measures for Automatic Control Systems
  • Cyberattack real-time detection

Benefit

Compared to conventional (unencrypted) control algorithms (technologies), the control system can be secure and robust against eavesdropping of communication information and unauthorized access to control devices.
Automatic detection of cyber-attacks such as injection of illegal signals, falsification of control parameters, and replay attacks can be easily performed in real time.
The communication part of the system is independent from communication protocols, which enables the use of secure communication protocols to build a more cybersecure system.

Market Application

・Automatic control systems (medical, robotics, UAV, pharmaceutical, etc)
・Industrial control system (infrastructures, manufacturing aerospace, medicine, etc)
・Outsourcing of control processing (CaaS: Control-as-a-Service)

Publications

https://drive.google.com/open?id=1bvRR-TiKGXAgiLanXZ_hs-2Lly4fD2oo, https://drive.google.com/open?id=1MtXQnrLD2qnM_ZlfEl5VXMe6J5kXOH8W, https://drive.google.com/open?id=1R3QIxd89BngKMytXQKeDVTkt8mKhIvEN https://ieeexplore.ieee.org/document/7403296

Contact us

Mail form

Please fill in the following items and click the "Send" button.
The person in charge will call you back in contact.
Please see this one on handling personal information.