ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Explore membership for yourself or for your organization.
Conference Spotlight
2026 ANS Annual Conference
May 31–June 3, 2026
Denver, CO|Sheraton Denver
Latest Magazine Issues
Mar 2026
Jan 2026
Latest Journal Issues
Nuclear Science and Engineering
March 2026
Nuclear Technology
February 2026
Fusion Science and Technology
April 2026
Latest News
DOE secretary and New York congressman call for reopening of Indian Point
Department of Energy Secretary Chris Wright joined U.S. Rep. Mike Lawler (R., N.Y.) at the site of the closed Indian Point nuclear power plant on Friday, March 6, as Lawler called for the reopening of the facility. He emphasized that the shutdown of the plant in 2021 has led to higher electricity costs for the people of New York state and increased strain on the state’s electric grid.
JunYoung Son, Jung Woon Lee, JongGyun Choi (KAERI), Hyunsoo Yoon (KAIST)
Proceedings | Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technolgies (NPIC&HMIT 2019) | Orlando, FL, February 9-14, 2019 | Pages 1659-1666
It is necessary to apply cyber security functions to control system in nuclear power plant complying with Regulatory Guide 5.71. According to the regulations, B.4.9 Cryptographic Module Authentication of Appendix B, technical security controls, Critical Data Asset ( CDA ) s authenticate cryptographic modules has to accord with FIPS 140 2. The specification explains the cyber security functional requirements are e valuated at the Common Criteria ( CC evaluation assurance. Thus, the security function algorithms for encryption and decryption developed in Nuclear Instrumentation and Control ( I&C control system have to consider a cryptographic module validation program ( which is validation scheme in Common Criteria Standard. As regulatory guide 5.71, many cyber security technical functions have to be developed and applied to CDAs. The functions are most going to utilize the encryption and decryption functions. The refore it must be important for satisfying the functions to validation process on the developed encryption and decryption algorithms. There has been no experience to apply and evaluate the cyber security functions to control systems in nuclear power plant I&C. The standards for each cryptographic algorithms p rovide the test vector s and process of validation. In case of Korea CMVP standards and National Institute of Standards and Technology (NIST) CMVP , they include validation objects, target modules, valida tion baselines, process schemes, process terms, validation test cases. This paper proposes modeling schemes to perform the procedure of validating test vectors among CMVP procedures for thecryptographic algorithms to be developed in the nuclear control system such as Programmable Logic Control (PLC) and Distributed Control System (DCS). By utilizing the proposed methodologies, it is possible to further validate the stability of the algorithm implementation function as well as the test vectors of the necessary procedures with standard test methodologies and standard documents which must be satisfied.