This dissertation is a study on the comparison of different Encryption Schemes for Securing SCADA Component Communication. SCADA Communication is a core component of a SCADA Monitoring System. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. Today, it is much more common for SCADA communications to travel over LAN or WLAN. The process of communication over a SCADA system involves several different SCADA system components. These include the sensors and control relays, Remote Terminal Units (RTUs), SCADA master units, and the overall communication network. Each of these parts is necessary for effective SCADA communication. A system can effectively monitor alarms and status updates within the network only when all of these system components function properly. For more complete monitoring of SCADA communications, operators must deploy advanced RTUs. The RTU is where most SCADA communication is gathered within the system. Values from inputs and outputs, referred to as SCADA points, are sent from individual sensors to the RTU. The RTU is responsible for forwarding these SCADA communications to the master station, or Human-Machine Interface (HMI). Common misconception regarding SCADA security was SCADA networks were isolated from all other networks and so attackers could not access the system. As the industry grows, the demand for more connectivity also increased. From a small range network, SCADA systems are sometimes connected to other networks like the internet. The open standards also make it very easy for attackers to gain in-depth knowledge about the working of these SCADA networks. The use of COTS hardware and software to develop devices for operating in the SCADA network also contribute to its lack of security. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. This makes these devices must not only be designed for safety but also for security. Because of so many vulnerabilities encryption Schemes are applied to secure the communication between the components. This work compares different Encryption Schemes for Securing SCADA Component Communication.