SCADA file encryption method based on AES algorithm

A file encryption and algorithm technology, applied in computing, electrical components, computer security devices, etc., can solve problems such as linear redundancy, replacement box linear redundancy, weak ability to resist algebraic attacks, etc.

Inactive Publication Date: 2015-01-28
GUODIAN NANJING AUTOMATION
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the S substitution box designed by the traditional mathematical method has a very high degree of nonlinearity, it is difficult to get rid of its inherent disadvantages, that is, its algebraic structure is relatively simple; the S substitution box designed by the evolutionary method The box has natural randomness, so if the S substitution box designed by this method has no trapdoor, it is not easy to find the weakness, but the non-linearity and differential uniformity of the S substitution box designed by this method are relatively poor , especially when designing the big S replacement box, the gap is more obvious
[0005] In the prior art, the S substitution box of the AES encryption algorithm is generally obtaine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SCADA file encryption method based on AES algorithm
  • SCADA file encryption method based on AES algorithm
  • SCADA file encryption method based on AES algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further described below in conjunction with the accompanying drawings.

[0048]Realize a kind of SCADA file encryption method based on AES algorithm, at first need to set up AES algorithm transformation module, realize improved AES encryption and decryption algorithm; The improved AES encryption and decryption algorithm of the present invention comprises two parts.

[0049] In the first part, the new S replacement box is proposed.

[0050] The AES algorithm is a block cipher algorithm. One of the cores of the block cipher algorithm is the S substitution box it uses. The S substitution box is the only non-linear place in the block cipher algorithm, and its strength determines the strength of the encryption algorithm. The cryptographic characteristics of the S-box are: differential uniformity, nonlinearity and autocorrelation; to improve the performance of the S-box, it is necessary to increase the nonlinearity and differential uniformity t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SCADA file encryption method based on an AES algorithm. The method includes the steps that S01, an improved AES encryption and decryption algorithm is achieved; S02, modules are selected according to file processing modes; S03, the length of a secret key K and the secret key are input; S04, an expansion secret key is generated; S05, an encryption/decryption file is established; S06, 16 bytes are taken out from the file waiting to be encrypted/decrypted, and the taken-out data are stored in an intermediate variable; S07, the data in the intermediate variable are encrypted/decrypted according to the length of the secrete key, and the encrypted/decrypted data are stored in the intermediate variable; S08, if the file waiting to be encrypted/decrypted is encrypted/decrypted, the file is closed, and the second step is executed, or else the sixth step is executed. According to the SCADA file encryption method, encryption and decryption linear attack resistance and differential attack resistance are improved, fewer hardware resources are occupied, and the method is particularly suitable for upgrading original equipment without modifying hardware design.

Description

technical field [0001] The invention relates to the professional technical field of electric power monitoring systems, in particular to an AES algorithm-based SCADA file encryption method. Background technique [0002] Data monitoring and acquisition system (SCADA) is the basis for constructing many power supply and distribution network automation application systems. With the computer and network application technology becoming more and more extensive and in-depth in the power monitoring system, the issue of safe storage and transmission of information in the power monitoring system has been paid more and more attention. In the power monitoring platform SCADA, many important data and configuration information are stored on the hard disk in the form of files, and protecting these important data and information from being easily leaked has become an important factor related to the safety performance of the system. Most of these data are stored in files in plain text, and the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0631G06F21/6209
Inventor 岳以洋李佑文罗存李芳包德梅刘志超褚红健
Owner GUODIAN NANJING AUTOMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products