Negotiation method for cryptographic algorithm of data transport services in distribution network

A cryptographic algorithm and data transmission technology, which is applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems that cannot meet the negotiating requirements of cryptographic algorithms in distribution networks, and meet the needs of easy upgrade and maintenance, prevention of network attacks, and fast matching Effect

Active Publication Date: 2017-10-27
BEIJING CHINA POWER INFORMATION TECH +5
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, directly applying the cryptographic algorithm matching method in the traditional network security protocol cannot meet the business-oriented cryptographic algorithm negotiation requirements in the distribution network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Negotiation method for cryptographic algorithm of data transport services in distribution network
  • Negotiation method for cryptographic algorithm of data transport services in distribution network
  • Negotiation method for cryptographic algorithm of data transport services in distribution network

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0040] After the preparations are completed, the following will refer to the attached figure 1 , 2 and 3 to describe a specific implementation of the negotiation method of the cryptographic algorithm of the data transmission service in the distribution network according to the present invention, the negotiation method includes the following steps:

[0041] Step 1: the master station sends a cryptographic algorithm negotiation request to the terminal;

[0042] Step 2: The terminal sends a list of supported cryptographic algorithms to the main station, including a signature algorithm set SS21={SA1, SA2, SA3, SA4, SA5} and an encryption algorithm set SS22={EA1, EA2, EA3, EA4,EA5};

[0043] Step 3: The master station intersects the supported signature algorithm set SS11 and encryption algorithm set SS12 with SS21 and SS22 respectively to obtain SS1 and SS2. Since it is assumed that the master station supports all cryptographic algorithms, SS1=SS21, SS2 = SS22;

[0044] Step 4:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a negotiation method for a cryptographic algorithm of data transport services in a distribution network. The negotiation method is characterized by comprising a service security label, an algorithm security label and two matching modes, wherein the negotiation process of the cryptographic algorithm between network nodes in the distribution network completely refers to the service security label of the current data transport service. The negotiation method avoids the problem of weak cipher suite matching security caused by the client cryptographic algorithm priority in the traditional network security protocol. The two matching modes not only consider the quick matching requirement of novel distribution equipment, but also consider the compatibility matching requirement of old equipment, thereby effectively solving the problem of transition from the cryptographic algorithm to national cryptographic algorithm standards in the distribution network.

Description

technical field [0001] The invention generally relates to the field of secure communication of smart grids, and more specifically relates to a method for negotiating cryptographic algorithms of data transmission services in distribution networks. Background technique [0002] With the rapid development of national economic construction, electric power automation system has been widely used. A large number of power distribution terminals with power distribution network control functions are scattered and deployed in the power distribution network. The power distribution master station sends commands through the front-end computer to realize remote management of each power distribution terminal in the form of telemetry, remote signaling, and remote control, thereby realizing the control of the power distribution network. In recent years, with the continuous deepening of networking and informatization, the requirements for secure communication of power distribution terminals a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/28H04L29/06
CPCH04L9/0838H04L9/0861H04L63/0807
Inventor 张浩杨斌吴文炤王一蓉郑越峰侯悦闻楷郑世慧马文洁张鹍孔德秋李菁竹段敬孟亚宁
Owner BEIJING CHINA POWER INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products