Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Asymmetric Encryption Method for Smart Electricity Interaction

An asymmetric encryption and encryption method technology, applied in the field of intelligent electricity interaction, can solve the problems of inapplicable smart grid deployment, etc., and achieve the effect of reducing decryption time, increasing the degree of deciphering, and facilitating communication channel transmission

Active Publication Date: 2017-05-10
STATE GRID CORP OF CHINA +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the national requirements, the electric power external network adopts the national secret SM1 algorithm or RSA (above 1024bit) to meet the security protection requirements in some applications, but in some applications it is necessary to carry out non-stop operations on the national secret SM1 algorithm or RSA (above 1024bit). Symmetric encryption; the power intranet needs to use simple and stable encryption algorithms, and complex encryption algorithms often require a lot of computing power and energy, which is not suitable for large-scale smart grid deployment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Asymmetric Encryption Method for Smart Electricity Interaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] In Embodiment 1 of an asymmetric encryption method for intelligent electricity interaction provided by the present invention, as figure 1 A flow chart of this embodiment is shown. In this example:

[0037] 1.1 Plaintext data, intelligent electricity interaction information (corresponding to level 1), or national secret algorithm (SM1, SM2, SM3 or SM4) or international algorithm (DES, 3DES or RSA) key and corresponding encrypted plaintext data (corresponding level 3), or national secret algorithm (SM1, SM2, SM3 or SM4) or international algorithm (DES, 3DES or RSA) key encrypted plaintext data (corresponding to level 4), or national secret algorithm (SM1, SM2, SM3 or SM4) or international algorithm (DES, 3DES or RSA) key (corresponding to level 5);

[0038] 1.2 encryption, use the private key of "1.5 private key" to encrypt the data of "1.1 plaintext data";

[0039] 1.3 Ciphertext data, grouping the ciphertext data in groups of 8 bits;

[0040] 1.4 Add a scrambling co...

Embodiment 2

[0063] The remote communication channel of the power consumption information collection system of a rural comprehensive transformer user uses the electric power dedicated wireless network TD-LTE230MHz system as the transmission channel to solve the problem of fast and efficient encrypted transmission of the electric energy meter measurement information submitted remotely and automatically.

[0064] The SM1 (or RSA) key (corresponding to level 5) encrypted with the metering information of the electric energy meter automatically reported remotely is input into the system of the present invention as plaintext data. After encryption, scrambling, etc., use the electric power dedicated wireless network TD-LTE230MHz system as the transmission channel, and transmit it to the receiving end. After descrambling, decryption, etc., it will be restored to plaintext data: the metering of the electric energy meter submitted automatically remotely The SM1 (or RSA) key used to encrypt the messag...

Embodiment 3

[0066] The electricity consumption monitoring system of a 10kV special-purpose transformer industrial and commercial user, the remote communication channel adopts the leased public wireless network 3G system as the transmission channel, and solves the problem of fast and efficient encryption of information such as load control, abnormal monitoring and anti-theft alarm using the commercial key SM1 Encrypted transmission problem.

[0067] The commercial key SM1 and the corresponding encrypted plaintext data (corresponding to level 3) used for encryption of information such as load control, abnormal monitoring, and anti-theft alarm are input into the system of the present invention as plaintext data. After encryption, scrambling, etc., the leased public wireless network 3G system is used as the transmission channel, and it is transmitted to the receiving end. After descrambling, decryption, etc., it is restored to plaintext data: load control, abnormal monitoring and anti-theft al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an asymmetric encryption method for intelligent electricity using interaction. A private secrete key is generated by a sending terminal based on a random sequence, the private secrete key is used for encrypting plaintext data to obtain ciphertext data, a public secrete key is generated through the private secrete key, the ciphertex data and the public secrete key are scrambled to obtain ciphertex data provided with scrambles and a public secrete key provided with scrambles, and the ciphertex data provided with the scrambles and the public secrete key provided with the scrambles are transmitted to a receiving terminal through a transmission channel. Scrambling processing is carried out on the ciphertex data provided with the scrambles and the public secrete key provided with the scrambles through the receiving terminal to obtain corresponding ciphertex data and a public secrete key, a private secrete key is generated through the public secrete key, and decoding is carried out on the ciphertex data through the private secrete key to obtain plaintext data. The asymmetric encryption method is simple, safe, fast and private and can produce a practical safety effect in the engineering using process. The encrypted information is more puzzled through scrambling processing, the difficulty that an attacker decodes the code is increased, and convenience is brought to communication of channel transmission.

Description

technical field [0001] The invention is applied in the electric power industry and serves the smart grid, and specifically relates to the field of intelligent power interaction, and specifically relates to an asymmetric encryption method for intelligent power interaction. Background technique [0002] The number of communication nodes in the smart grid is huge and the working environment is complex. Simple and stable encryption algorithms are required. Complex encryption algorithms often require a large amount of computing power and energy, which is not suitable for large-scale smart grid deployment. [0003] Conventionally used encryption methods include symmetric encryption methods and asymmetric encryption methods. See GB / T17903.2—1999 for the implementation of symmetric key encryption algorithm: Information Technology - Security Technology - Non-repudiation Part 2: Mechanisms Using Symmetric Technology (ISO / IEC13888-2: 1997); Implementation of Asymmetric Key Encryption A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L29/06
Inventor 苗新陈希张东霞
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products