Quantum key classification providing method for improving electric power data transmission security

A technology of quantum key and power data, applied in the field of high-level provision, can solve the problem of mismatch between the speed of quantum key distribution and business demand, achieve fast encryption and decryption, improve practicability, and achieve simple effects

Active Publication Date: 2015-04-01
STATE GRID CORP OF CHINA +3
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the deficiencies of the above-mentioned prior art, the present invention provides a hierarchical quantum key provision method that improves the security of power data transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key classification providing method for improving electric power data transmission security
  • Quantum key classification providing method for improving electric power data transmission security
  • Quantum key classification providing method for improving electric power data transmission security

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0087] Example 1:

[0088] The power dispatch control center (master station) needs to remotely control the substations, and the key storage capacity in the key memory module is insufficient.

[0089] Step 1: The power dispatching control center (master station) sends the destination station ID, security level requirements, and estimated traffic of this encrypted communication to the central key controller through a USB cable. In this example, it is assumed to be station 1, which is safe The level is 0, and the expected traffic is 1500 bytes.

[0090] Step 2: After receiving the request information, the central key controller knows that this service is remote control communication, which requires the highest security and can accept a delay of less than 10 seconds, and then calculates the requirement based on the estimated traffic usage of this communication. Completing this communication requires a 3000-byte key (including extra overhead and key redundancy) and inquires the remainin...

Example Embodiment

[0097] Example 2:

[0098] The power dispatch control center (master station) needs to remotely control the substations, and the key storage capacity in the key memory module is insufficient.

[0099] Step 1: The power dispatching control center (master station) sends the destination station ID, security level requirements, and estimated traffic of this encrypted communication to the central key controller through a USB cable. In this example, it is assumed to be station 1, which is safe The level is 5, and the estimated traffic is 3000 bytes.

[0100] Step 2: After receiving the request information, the central key controller knows that this service is telemetry communication, which requires high security and can accept a delay of less than 4 seconds, and then calculates it based on the estimated traffic usage of this communication To complete this communication, a 1000-byte key (including extra overhead and key redundancy) is required, and the remaining amount of the key in the su...

Example Embodiment

[0105] Example 3:

[0106] The sub-station responds to the telemetry command from the power dispatching control center (master station), and the key storage capacity in the key memory is sufficient.

[0107] Step 1: The slave station 1 responds to the command request of the power dispatching control center (master station) to send the current line parameter data. The security level of this communication is -1, and the estimated traffic is 5000 bytes. This communication is carried out through a USB cable The request is sent to the terminal key generator.

[0108] Step 2: The terminal key generator receives the request and checks that the quantum key currently used for symmetric encryption has been used for 1 hour and the replacement time (2 hours) has not yet been reached.

[0109] Step 3: The terminal key generator sends an encrypted communication request to the central key controller.

[0110] Step 4: After receiving the information that the central key controller agrees to this encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a quantum key classification providing method for improving electric power data transmission security. The method comprises the following steps that a communication initiating party judges whether a local key length meets the present communication requirement or not; a communication receiving party judges whether the own residual local key length meets the present communication requirements or not after receiving the present communication request; the communication receiving party starts the quantum key encryption communication; the communication initiating party starts the quantum key encryption communication. According to the quantum key classification providing method for improving the electric power data transmission security provided by the invention, while the problem that the quantum key distribution speed is unmatched with the service requirement speed is relieved, an encryption service, which meets the respective security requirements, is provided for data transmission of an electric power system with different security levels, and the practicability of the quantum encryption technology in the electric power system is greatly improved.

Description

technical field [0001] The invention belongs to the technical field of electric power system automation, and in particular relates to a hierarchical provision method of a quantum key for improving the security of power data transmission. Background technique [0002] Distribution management automation is an information collection and processing system that uses modern computers, communication technology and equipment to manage the operation of distribution networks. The data processed by the distribution automation system belongs to the core data of the power industry, so the distribution automation system has high requirements for security. At present, the distribution automation system uses encryption algorithms such as RSA, ElGamal, Rabin, and ECC for communication encryption. In recent years, the rapid development of computer technology has made these encryption methods that rely on computational complexity to ensure security less and less reliable. The development of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0819H04L9/0852H04L63/062
Inventor 周静孙咏梅卢利锋焦健
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products