期刊文献+

电网智能单元加密算法效率评估 被引量:4

Efficiency Evaluation of Cryptographic Algorithms in Smart Grid
在线阅读 下载PDF
导出
摘要 随着智能电网发展和电力终端设备智能化和网络化的提升,基于TCP/IP协议的数据通信面临着传统的网络安全隐患;智能电网单元是电网控制的关键组成部分,负责电网业务数据的采集处理、控制指令的收发和执行等工作,涉及大量数据传输,如何保证数据的机密性,是电网系统正常运作的关键因素之一;针对智能单元的传输规约和传输数据的特点,通过模拟智能单元计算环境,在保密性需求的基础上,结合智能单元计算资源的实际情况,综合分析电力行业和国内常见密码算法,包括对称算法和非对称算法,从运算时间及稳定性,数据长度相关性,密钥长度相关性和加密模式几个方面对算法的性能进行综合性评估;为不同智能单元的机密性保护尤其是加密算法的选取提供理论基础和实验数据。 With the development of smart grid and the improvement of intelligence and networking of power terminal equipment,the data communication based on TCP/IP protocol is facing the traditional network security risk.The key part of power grid control is the smart grid unit,which is responsible for the collection and processing of the business data of the power grid,and the receiving and dispatching of the control command and the execution of the data,involving much data transmission.How to ensure the data confidentiality is one of the key factors for the operation of power grid system.In this paper,according to the characteristics of the data and transmission protocol of intelligent unit,through the simulation of intelligent computing environment,on the basis of security requirements,combined with the actual situation of intelligent computing resources,we analysis the power industry and the common national cryptographic algorithm,and evaluate the computing time and stability,correlation of data length,correlation of key length and working mode of the cryptographic algorithms.Providing theoretical basis and experimental data for the selection of confidentiality protection,especially encryption algorithm for different intelligent units.
出处 《计算机测量与控制》 2017年第5期258-261,272,共5页 Computer Measurement &Control
基金 基金项目:国家电网科技(SGFJXT00YJJS1600064)
关键词 智能单元 加密算法 加解密效率 加密模式 机密性 intelligent unit cryptographic algorithm encryption and decryption efficiency cryptographic mode confidentiality
  • 相关文献

参考文献9

二级参考文献61

  • 1孟辰.基于便携式TPM的TLS协议改进方案[J].保密科学技术,2012(6):50-54. 被引量:2
  • 2金心颖.浅析无线局域网安全技术[J].哈尔滨学院学报,2004,25(7):136-138. 被引量:2
  • 3刘小花,张凤.无线局域网安全技术分析[J].广西通信技术,2004(2):24-28. 被引量:3
  • 4刘淳,张凤元,张其善.基于智能卡的RSA与ECC算法的比较与实现[J].计算机工程与应用,2007,43(4):96-98. 被引量:10
  • 5Stallings W.密码编码学与网络安全:原理与实践[M].孟庆树,王丽娜,傅建明,等译.北京:电子工业出版社,2006.
  • 6杨波.现代密码学[M].2版.北京:清华大学出版社,2007.
  • 7SCHNEIER B. Description of a new variable-length key,64 bit block cipher (Blowfish) [ C ]//Proc of FastSoftware Encryption, the Cambridge Security Workshop. London : Springer-Verlag, 1994 : 191-204.
  • 8MANZANARES A I,SIERRA C J M, MARQUEZ J T. On the implementation of security policies with adaptative encryption [J]. Computer Communications ,2006,29 ( 2 ) :2750-2758.
  • 9HARRIS S, ADAMS C. Key-dependent S-box manipulations [ C ]// Proc of the Selected Areas in Cryptography. Berlin: Springer-Verlag, 1999:631-632.
  • 10SCHNEIER B. The Blowfish encryption algorithm[ EB/OL]. (1995- 09 ). http ://www. schneier, com/paper-blowfish-oneyear, html.

共引文献50

同被引文献49

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部