Wireless Sensor Network, 2010, 2, 520-527
doi:10.4236/wsn.2010.27064 Published Online July 2010 (http://www.SciRP.org/journal/wsn)
Copyright © 2010 SciRes. WSN
Developing a Multi-Layer Strategy for Securing Control
Systems of Oil Refineries
Musaria K. Mahmood1, Fawzi M. Al-Naima2
1Department of Electrical Engineering, College of Engineering, Tikrit University, Tikrit, Iraq
2Department of Computer Engineering, College of Engineering, Nahrain University, Baghdad, Iraq
E-mail: Musariaoja@yahoo.com,fawzi.alnaima@ieee.org
Received May 12, 2010; revised May 21, 2010; accepted May 27, 2010
Abstract
The energy industry and in particular the Oil Refineries are extremely important elements in Iraq’s infra-
structure. A terrorist attack on one oil refinery will have a catastrophic impact on oil production and the
whole economy. It can also cause serious damage to the environment and even losses of human lives. The
security of information systems and industrial control systems such as Supervisory Control and Data Acqui-
sition (SCADA) systems and Distributed Control System (DCS) used in the oil industry is a major part of
infrastructure protection strategy. This paper describes an attempt to use several security procedures to de-
sign a secure, robust system for the SCADA and DCS systems currently in use in the North Oil Refinery in
the city of Baiji located in northern Iraq.
Keywords: DCS, SCADA, Security, Encryption, Internet, Public Key, DMZ, Data Security
1. Introduction
The increased use of computer network in control sys-
tems and the use of internet as communication backbone
have brought benefits in communication and for the pro-
cess control in general. The ability to share information,
making decision concerning production stoking and dis-
tribution has been greatly improved [1]. New informa-
tion technologies have recently been introduced for con-
trol system based on open standards like Visual Basic,
Java, Open Database Connectivity (ODBC), Ethernet
communication and finally the use of internet based con-
trol system. Internet or web based control system uses
some internet protocols in the application layer to moni-
tor and control plants at a distance. Older control systems
were based on closed protocols implemented by vendors
of SCADA, DCS, and Programmable Logic Controller
(PLC) systems. However, the new common technology
and the use of internet introduced many challenges in the
area of security, such as cyber threats [2].
The North Oil Refinery in Baiji is a large industrial
complex located on various sites scattered around the
city of Baiji, north of Baghdad. This complex comprises
four basic big refineries: 1) Salah Aldine-1, 2) Salah Al-
dine-2, 3) North, and 4) Chemical Products. All these
refineries are functioning under the same direction and
are technically sported by unified sections. Each ref-
inery unit has many DCS systems controlling several
chemical processes. These processes are independent of
each other and are situated at different geographical lo-
cations. Each DCS acts as standalone control system
with its private communication network and local control
room (LCR).
DCS systems in operation are based on new informa-
tion technology (IT) with open standards such as TCP/IP
protocols using fiber optic Ethernet for data transmission
between field and LCR. The refineries direction begins a
new project to connect all DCS systems to a Central
Control Room (CCR) via intranet. Local server of each
DCS will be connected to system server located at the
CCR. System server will be connected to the Internet as
part of web based control system of the refineries.
Multi-layered security system is suggested for Baiji
Oil Refineries. This strategy of security will be based on
the “ring of defense” around each local network of each
DCS and also around the overall corporate intranet
(which will be similar to SCADA system) [2].
The suggested security system can also be used for
other SCADA systems in general like those used in Ele-
ctrical Power Plants, Water Purification and many other
Oil Industries.
2. Networking DCS’s
The model to be adopted in this work is to consider each
M. K. MAHMOOD ET AL.
Copyright © 2010 SciRes. WSN
521
DCS system as a node or “station” of a global SCADA
system in the perspective of grouping all LCR of all
DCS's of the North Refineries in the CCR. CCR will be
the central control of the overall SCADA system. Each
DCS will keep its local server, local database, and local
LCR, and will be connected to the CCR via appropriate
communication links.
The connection of local servers to the system server
(or web server) of SCADA system located at the CCR is
made via corporate intranet as depicted in Figure 1.
Communication links between LCR sites and CCR can
be accomplished by fiber optics, coaxial cable or wire-
less links regarding several factors related to topology,
geography, and required bandwidth. Reliability, avail-
ability and redundancy are major factors for the design of
network topology. System database and all local data-
bases use the same standard SQL database. The system
database is located near the system server at the interface
zone between corporate intranet and the internet. This
location is chosen at the border of the system to mini-
mize the risk of unauthorized intruder. The topology
definition and the reliability of the communication net-
work are not a part of this work.
3. Security Strategy
The similarity of the new SCADA system and the ordi-
nary IT system leads to the adoption of the same security
approach used in computer communication network. The
principal of networks separation into “rusted network”
and “non-trusted network” fit perfectly for securing
SCADA systems [3]. The ring of defense (multi-layer
security system) will be implemented using various
techniques, which are cited as the principal countermea-
sure for securing SCADA [4]. The goal of such model
will be the repetition of countermeasures to enhance the
global system security as shown in Figure 2.
Figure 1. Networking DCS’s.
Each layer will acts against one or more of possible
security challenges. There exist many cyber threats fac-
ing control systems as cited in Table 1 [5]. Each security
layer will be part of the defense on depth against threats.
The possible attack will be considered from the exter-
nal non trusted network (the Internet) in the direction of
the internal trusted network (the corporate intranet).
The Internet
Non-trusted net.
Medium trust
DCS network
Trusted net.
Refinery
intranet
(1) Enerypted authentication
(2) Data eneryption
(3) Security policles
(4) Demilitarized zone (DMZ)
(5) Proxy server
(6) Applications
(7) DCS DMZ
(8) Data eneryption intern to DCS
Atrack direction
Figure 2. Ring of defense.
Table 1. Correlation of security threats and properties.
Properties Cyber threats Importance
Eavesdropping Low
Message
confidentiality Traffic analysis Low
Message modification High
Message
integrity False message injection High
Message
freshness Message replay High
Denial-of-service Middle
Availability
Malicious codes Middle
Masquerade High
Source
authentication Unauthorized access Middle
M. K. MAHMOOD ET AL.
Copyright © 2010 SciRes. WSN
522
The compatibility of countermeasures like encryption
standards, firewall, antivirus, intrusion detection techni-
ques will be accomplished by the use of standardized
techniques. Each DCS system can be isolated immedi-
ately from the SCADA network and then be controlled
locally if needed. The connection or the disabling of
connection of one DCS can be made locally or from the
CCR by some fixed authorization protocol. The connec-
tion of DCS system to the CCR server and then to the
internet will be subject to several layers of security de-
fense rings as illustrated in Figure 3. Between each DCS
system and the corporate intranet network a demilitarized
zone (DMZ) is used where the local server and database
of DCS reside. The global SCADA system is connected
to the internet via another DMZ. To login from browser
to the SCADA intranet an original process of encrypted
authentication and digital signature is implemented.
3.1. Encrypted Authentication
It is the first security stage for an external client. An origi-
nal authentication process is developed based on asym-
metric key encryption algorithm as shown in Figure 4.
The RSA algorithm is used to encrypt the password two
times for the implementation of authentication and the
secrecy of password [3,6].
Local
darabase
DCS
Inner firewall
DCS
DCS
server Outer firewall
DCS
router
To Internet
router
Outer firewall
SCADA
Inner firewall
SCADA
System server
System
database
Figure 3. Security layers from DCS to internet.
Browser side
Eneoding the password
The browser writes the password and username
Eneiphering the result with the browser private key
and then again with public key of the server
Sending the message
(Authentication + confidentiality)
The server checks the username, finds the
corresponding public key of the browser
Server side
Internet
The server receives the encrypted password
Decryption with server private key and again
Decryption the result with browser public key
Compare the password with that in the serve
r
Sene an acknowledgment to the browser as accept
for communication
Figure 4. Authentication process.
The implementation of public key algorithm was made
with two key groups (e1,d1), and (e2,d2), where e1 is the
public key of the first key group, d1 is the private of
browser (personal private key), e2 is the second public
key, and d2 is the private key of server.
The method of defining these keys, and the encryption
algorithm is as follows:
Choose two large prime numbers (p and q), let:
n = p × q (1)
The function β(n) is the number of numbers less than
(n) with no factors in common with (n).
M. K. MAHMOOD ET AL.
Copyright © 2010 SciRes. WSN
523
Choose an integer number e, (e < n) relatively prime
to β(n). Find second integer (d) such that
{e × d mod β(n) = 1}
Then, the Public Key = (e, n)
The Private Key = (d, n)
The encryption function of RSA for a plain text (M) is
(C) such that:
C = M d
mod n (2)
Then, the recovered plain text (M) is:
M = C e
mod n (3)
If (e) is used instead of (d) for the encryption of equa-
tion (2), then (d) will be used for the decryption in Equa-
tion (3).
The password will be encoded using ASCII code or
other encoding system. Each byte will be encrypted two
times: the first with (d1) and the second with (e2) This
will ensure both secrecy and authentication of the pass-
word. At the server side, the reverse process is executed.
The received cipher password will be first decrypted
using (d2) and then (e1) in order to get the original plain
text password.
The result will be compared to usernames table in the
server. If matching is achieved then the server will open
a communication channel and begin responding to brow-
ser requests.
3.2. Data Encryption
To protect SCADA system already connected to the in-
ternet and its data from unauthorized accesses many al-
gorithms for data protection exist. In this work two en-
cryption algorithms are used to encrypt data.
1) Encryption-1(security layer 2): This encryption al-
gorithm used to encrypt data over the Internet. We pro-
pose to use the Secure And Fast Encryption Routine
(SAFER+), which is one of the known symmetric key
algorithms that accomplishes requirements for real time
data encryption. The SAFER+ was designed by James
Messey for Cylink Corporation in 1998 as the new algo-
rithm of SAFER family (safer-64, safer-128...) [7]. It was
one of the candidates of the Advanced Encryption Stan-
dard (AES) chosen for its good hardware-software tra-
deoff orientation, simplicity, high throughput compared
to other algorithms, and low memory requirement [8],
[9]. Also, this algorithm brought attention recently by the
use in as security measure in Bluetooth and wireless
communication [10,11].
A detailed analysis of maximum bit rate for one DCS
proves that SAFER+ fits well for the encryption of data
over Internet to get the required real data transmission.
SAFER+ is published with three options, 128 bits, 192,
bits and, 256 bits key lengths. All three options are used
to encrypt 16-byte plaintext. The plaintext block then
passes through R rounds of encryption where R is deter-
mined by the key length chosen for encryption in the
following manner:
If key length = 128 bits then R = 8 rounds.
If key length = 192 bits then R = 12 rounds.
If key length = 256 bits then R = 16 rounds.
Our choice was the adoption of SAFER+ with 128 bits
key length as other key lengths were found with certain
key weaknesses [12]. Also, by increasing key length
more computation time is needed related to rounds num-
ber which will affect the assumption of real data trans-
mission in control system.
This algorithm will be implemented as hardware in the
server side and portable software in the client side. If
there is wireless link between two sites interior to the
corporate intranet, SAFER+ must be used with hardware
encryption decryption processes. SAFER+ algorithm is
divided into three blocks: the key scheduling, encryption
process, and decryption process. Programming is accom-
plished using Turbo Pascal.
2) Encryption-2 (security layer 8): This algorithm is
used to encrypt data over the network of one DCS. This
algorithm is not a part of this work but we can use the
American Gas Association (AGA) standard which is
proven to be a good choice for data over DCS network
when dealing with protocols such as MODBUS or DNP3
[13]. In this work we found that securing data over the
DCS network has no significant impact to enhance the
security of overall system because all DCS system are
well physically protected in isolated areas and we take
care about data security when data circulate outside DCS
network by other countermeasures. This encryption pro-
cedure is mentioned here merely for other case studies
with other compromises and challenges related to other
situations.
3.3. SAFER+ Encryption/Decryption
Giving the 16-byte key (128 bits), SAFER+ begin by
calculating a set of 17 keys each with same length 16
bytes. The calculation uses sample arithmetic and logic
functions like bit rotation, bit-by-bit exclusive-or of
bytes, modulo 256 addition of bytes, and selection byte
process.
The 17 sets of keys are used in the encryption rounds.
Two keys are used for each round. Round (i) uses key
K2i-1 and K2i. At the end of 8 rounds key K17 is used for
the output operation which is the output transformation.
The output transformation uses bit-by-bit exclusive-or of
bytes and modulo 256 byte addition as shown in Figure 5.
At the reception the reverse process is used for decrypt-
ing the cipher text. Beginning by the input transforma-
tion, Key K17 is used. The input transformation uses
same functions of the output transformation but with
modulo 256 subtraction of bytes instead of addition of
bytes. Each encryption round (i) begin by the bit-by-bit
Xor of bytes, and modulo 256 addition of bytes for the
M. K. MAHMOOD ET AL.
Copyright © 2010 SciRes. WSN
524
key K2i-1 to the input 16-byte of the round Figure 6. The
16-bytes result are then fed to a layer of nonlinear func-
tion. The value x of byte j is converted to 45x mod 257
for j = 1, 4, 5, 8, 9, 12, 13, and 16 (with the convention
that when x = 128, then 45128 mod 257 = 256 is repre-
sented by a 0). The value x of byte j is converted to
log45(x) for j = 2, 3, 6, 7, 10, 11, 14, and 15 (with con-
vention that when x = 0, then log450 = 128). The output
of the nonlinear layer is then subject to same addition
and Xor operation similar to the first block with key K2i.
At the end of round (i), a block of matrix multiplication
is used. The 16 bytes are multiplied by matrix T in mod
256 arithmetic. T is a 16 × 16 predefined matrix.
The operations in the decryption round are simply
conducted in reverse order to the operations from the
encryption round.
The first operation in the decryption round (i), is to
post multiply the 16-byte round input by matrix T–1,
which is the modulo 256 inverse of T to give the 16-byte
result (S). The first round sub key K16-2i+2, is then “sub-
tracted” from (S) in the manner that the round sub key
bytes 1, 4, 5, 8, 9, 12, 13, and 16 are subtracted modulo
256 from the corresponding bytes of (S), while round sub
key bytes 2, 3, 6, 7, 10, 11, 14, and 15 are added
bit-by-bit modulo 2 to the corresponding bytes of (S).
The 16-byte result is then processed nonlinearly in the
manner that the value x of byte j is converted to log45(x)
for bytes j = 1, 4, 5, 8, 9, 12, 13, and 16 (with the con-
vention that when x = 0, log450 = 128). For j = 2, 3, 6, 7,
10, 11, 14, and 15, the value x is converted to 45x mod
16-Byte input plain text
SAFER+
single round
Round (i)
Output transformation
Mixed xor/byte addition
16-Byte output cipher text
K
2i-1
and K
2i
K
17
Key
Key
sheduling
Figure 5. SAFER+ encryption process.
Round (i) input 16-bytes
B1 B2 B3 B4 B5 B6 B7 B8
B9 B10 B11 B12 B13 B14 B15 B16
K
2i-1
xor add add xor xor add add xo
r
xor
add
add
xor
xor
add
add
xor
B1 B2 B3 B4 B5 B6 B7 B8
B9 B10 B11 B12 B13 B14 B15 B16
exp log log exp exp log log exp
exp log log exp exp log log exp
B1 B2 B3 B4 B5 B6 B7 B8
B9 B10 B11 B12 B13 B14 B15 B16
xor add add xor xor add add xor
xor
add
add
xor
xor
add
add
xor
B1 B2 B3 B4 B5 B6 B7 B8
B9 B10 B11 B12 B13 B14 B15 B16
Multiplication of 16-byte by T (16*16
Matrix) in mod 256 arithmetie
B1 B2 B3 B4 B5 B6 B7 B8
B9 B10 B11 B12 B13 B14 B15 B16
Round (i) output 16-
b
ytes
B1 B2 B3 B4 B5 B6 B7 B8
B9 B10 B11 B12 B13 B14 B15 B16
K
2i
Figure 6. Encryption round (i).
257 (with the convention that when x = 128, 45128 mod
257 = 256 round sub key K16-2i+1, is then “subtracted”
from the 16-byte result in the manner that the round sub
key bytes 1, 4, 5, 8, 9, 12, 13, and 16 are added bit-by-bit
modulo 2 to the corresponding input bytes. Sub key
bytes 2, 3, 6, 7, 10, 11, 14, and 15 are subtracted modulo
256 from the corresponding input bytes to produce the
16-byte output of the round.
3.4. Demilitarized Zone (DMZ)
DMZ is a good technique for securing communication
network based on the principal of “networks separation
strategy”, between trusted network (like DCS LAN) and
M. K. MAHMOOD ET AL.
Copyright © 2010 SciRes. WSN
525
another network with less level of trust [1,3]. In the
DMZ the server and database reside in safe place, see
Figure 3. Proxy server and application action like anti-
virus are also deployed in the DMZ. In this work a dou-
ble protection is found by the use of two DMZs. The first
is as a security interface between SCADA system and the
external non-trusted Internet (security layer 4), while the
second is between the DCS trusted network and the less
trusted corporate intranet for SCADA (security layer 7).
DMZ is a zone between an inner firewall and an outer
firewall. This firewall, properly configured, can protect
passwords, IP addresses, and files. Firewall acts as a fil-
ter that permits the data to enter from certain ports and
blocks others. At the DMZ output a router is used as
border router to route information to correct destination.
3.5. Security Policies
Security policies must be fixed by the security committee
of the enterprise. Correct procedure of effective policies
can reduce violation of security rules. Training personnel
at the vocation of security can increase the defense in
depth strategy. Developing documentation and well de-
fining the access authorization will be a very active point.
The choice of password must be as random as possible
with at least ten characters, including symbols and num-
bers.
In this work all the required information of the group
of DCS in the North Oil Refinery will be available in the
system server in the master DMZ (between corporate
network and the internet).
4. Simulation Results
RSA and SAFER+ encryption algorithms are implemen-
ted in Turbo Pascal language. As example to show how
the encrypted authentication will be calculated. Let the
password be chosen as the random word ‘playmyaudio’.
Encoding this password with simple code from 01 for (a)
to 26 for (z), will give:
M = 16, 12, 1, 25, 13, 25, 1, 21, 4, 9, 15.
C will be composed by the same number of 11 bytes.
Consider for our example the following values for the
keys are taken:
e1 = 13, d1 = 53, e2 = 37, d2 = 17, n = 77
Using equation (2) twice with browser private key d1
and then with server public key e2 the cipher text will be:
(1653 mod 77)37 mod 77 = 60
(1253 mod 77)37 mod 77 = 45
For the same for other bytes, we have:
C = 60, 45, 1, 58, 13, 58, 1, 21, 37, 53, 15.
At the server, the received cipher text will be con-
verted back to the original password using Equation (3)
twice:
(6013 mod 77)17 mod 77 = 16
(4513 mod 77)17 mod 77 = 12
So on for other bytes to get the original password:
M = 16, 12, 1, 25, 13, 25, 1, 21, 4, 9, 15.
The use of double RSA encryption procedure will
gives both authentication and secrecy.
SAFER+ algorithm uses matrix to represent the 17-
sub keys (17 × 16 matrix).given the secrete key (K1) as
series of 16 bytes, the 16 other keys, each of 16 bytes
will be generated. The calculation of each round is made
using iterative process and many preprogrammed proce-
dure (for Xor, Exp, log..).
As an example for the encryption/decryption process,
let the 16 byte user selected input key (secrete key) be:
41, 35, 190, 132, 225, 108, 214, 174, 82, 144, 73, 241,
241, 187, 233, 235.
After the execution of key schedule procedure of Fig-
ure 7, for 128 bit key we have the (17 × 16) matrix
which represents the 17 sub keys each of length 16 bytes
(128 bits). Each key is represented by a row, where row
(1) represents K1 (the secrete key), to row (17) which
represents K17, this will give the matrix (K) shown in
Figure 8. The resulting 17 sub keys and the plain text are
used to generate the cipher text as presented in Figure 5.
The plain text block input (16 byte plain text) = 179,
166, 219, 60, 135, 12, 62, 153, 36, 94, 13, 28, 6, 183, 71,
222.
The resulting cipher text will be = 224, 31, 182, 10, 12,
255, 84, 70, 127, 13, 89, 249, 9, 57, 165, 220.
The predefined bias matrix (B) is given as (16 × 16)
matrix as input to generate sub key matrix [7]. This pro-
cedure will be used to encrypt input data by block of 16
bytes at a time. The schedule procedure will be executed
next time when the secrete key is changed to find the
new matrix (K).
5. Conclusions
The use of open standard improves the control operations
by improving the possibility of interconnecting many
systems from different vendors together without restrict-
ions in term of standards. Action for the security of SC-
ADA system must be up to date regarding the continued
advances in information technology. Care must be taken
for the use of latest version of antivirus, and intrusion
detection programs. Symmetric encryption algorithms
can be used to encrypt data over internet for SCADA
system if the required bit rate is accomplished. SAFER+
algorithm can accomplish the real data transmission re-
quirement. Using SAFER+ give us the possibility to en-
crypt data by software or hardware implementations.
M. K. MAHMOOD ET AL.
Copyright © 2010 SciRes. WSN
526
Enter the key K
1
: By1,By2
……
By16
By1 By2 By3 By4 By5 By6 By7 By8 By9 By10 By11 By12 By13 By14
By15 By16
Composition of By17 bit by bit
By17 = sum (By1
By16) bit by bit mod 2
Rotate each byte left by 3bits position
By(1) By(2) By(3) By(4) By(5) By(6) By(7) By(8)become
By(4) By(5) By(6) By(7) By(8) By(1) By(2) By(3) for all 17 bytes
Rotate each byte left by 3 bits position
By1 By2 By3 By4 By5 By6 By7 By8 By9 By10 By11 By12 By13 By14
By15 By16 By(17)
Rotate each byte left by 3 bits position
By1 By2 By3 By4 By5 By6 By7 By8 By9 By10 By11 By12 By13 By14
By15 By16 By(17)
Select key
K
1
= 1,2,3
……
16
Byte: 2,3
17
Byte: 3,4
17,1
Byte: 17,1,2
15
K
1
K
2
K
3
K
17
Mod
256
Mod
256
Mod
256
B2
B3
B17
Figure 7. Sub keys generation process.
4135 190 132225 108214 1748214473241241187233135
951402132016109 133 15673 12966
K
8855119 1135
155 204 342252864236497422114 922242142135
147 13417654199141
8721938 16298 167109138 186230
12329 2559250122240 2186512492575943149127
96
204 15931221892452432445221976177210163209
56190201321224815710916881214 221
102105 5381
152646250 110124 13722274 1351213418149 185
207 6125122417966
183 96253 603778211152229
682159456944935230120133111 1959768203173
78
156 1901811302226159385953238123180138107
221238152 211241232248255101167 37 36
134 238 244 243
55 11116566105237214179862331421453115 165201
3465 73 224185205
107140123117 55 254417982236
212162 9117411755625116323813249505418074
51
1592151817420225315191101 8916798148104
127111 186111621323523018423
19925218675 227149
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Figure 8. Sub key matrix (K).
M. K. MAHMOOD ET AL.
Copyright © 2010 SciRes. WSN
527
The use of computer network protection can be very
useful in SCADA like DMZ, and network segmentation
from the trust point of view. Layered strategy is a good
method to secure SCADA, DCS and control systems in
general. The use of different layered actions against cy-
ber threats makes the defense in depth active. Authenti-
cation is one of most used and active countermeasure for
security in control systems. The use of RSA public key
algorithm for encrypt password will ensure security and
authenticity.
6. References
[1] R. L. Krutz, “Securing SCADA Systems,” Wesley Pub-
lishing, Inc., Indianapolis, 2006.
[2] J. Pollet, “Developing a Solid SCADA Security Strat-
egy,” Proceedings of the Second ISA/IEEE Sensors for
Industry Conference, Houston, November 2002, pp. 148-
156.
[3] M. Bishop, “Introduction to Computer Security,” Addi-
son-Wesley, Boston, 2005.
[4] J. Nordlander, “What is Special about SCADA System
Cyber Security,” Master Dissertation, Royal Institute of
Technology, Sweden, 2009.
[5] H. Lim, S. Hong, M. S. Choi, S. J. Lee, T. W. Kim, S. W.
Lee and B. N. Ha, “Security Protocols Against Cyber At-
tacks in the Distribution Automation System,” IEEE
Transactions on Power Delivery, Vol. 25, No. 1, 2010, pp.
448-455.
[6] T. Davis, “RSA Encryption,” October 2003. http://www.
geometer.org/mathcircles
[7] J. Messy, H. Kh and K. Kuregian, “Nomination of SA-
FER+ as a Candidate Algorithm for the AES,” 1998.
http://csrc.nist.gov/archive/aes/round1
[8] A. Schubert and W. Anheier, “Efficient VLSI Implemen-
tation of Modern Symmetric Block Ciphers,” 6th IEEE
International Conference on Electronics, Circuit and Sys-
tems, Pafos, Vol. 2, September 1999, pp. 757-760.
[9] S. Mukherjee, D. Ganguly and S. Naskar, “A New Gen-
eration Cryptographic Technique,” International Journal
of Computer Theory and Engineering, Vol. 1, No. 3, Au-
gust 2009, pp. 284-287.
[10] I. S. Ashour, “Online Data and Voice Encryption System
Based on FPGA,” 24th National Radio Science Confer-
ence, Cairo, National Republican Senatorial Committee,
2007, pp. 1-7.
[11] D. Sharmila and R. Neelaveni, “Performance Analysis of
SAFER+ and Triple DES Security Algorithms for Blue-
tooth Security System,” International Journal of Com-
puter Science and Network Security, Vol. 9, No. 2, 2009,
pp. 74-87.
[12] J. Kelsey, B. Schneier and D. Wagner, “Key Schedule
Weaknesses in SAFER+,” Second Advanced Encryption
Standard Candidate Conference, Rome, 1999, pp. 155-
167.
[13] A. West, “Securing DNP3 and Modbus with AGA12-2J,”
IEEE Power and Energy Society General Meeting: Con-
version and Delivery of Electrical Energy in the 21st
Century, Pittsburgh, 20-24 July 2008, pp. 1-4.