Research Article

Cybersecurity Vulnerability Analysis of the PLC PRIME Standard

Figure 6

Security Profile 1 encryption algorithm [12].