Unlock instant, AI-driven research and patent intelligence for your innovation.

An encrypted communication method of power system debugging tool based on shared key

A power system and encrypted communication technology, which is applied in the field of encrypted communication of power system debugging tools based on shared keys, to achieve the effect of simple use and high encryption efficiency

Active Publication Date: 2018-12-25
ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY +2
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to solve the problem of using the same key pair for communication in all communication environments under the existing shared key mechanism, and there is a risk of being reversely analyzed and cracked by a malicious attacker by obtaining a large number of communication samples, and providing An encrypted communication method for a power system debugging tool based on a shared key, which implements communication using a different shared key each time based on a shared key group, so as to improve communication security and be simple and reliable to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encrypted communication method of power system debugging tool based on shared key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical method will be further described below in conjunction with the accompanying drawings and specific implementation cases, so that those skilled in the art can better understand the present invention and implement it, but the examples given are not intended as limitations of the present invention.

[0023] This embodiment provides a method for encrypted communication of a power system debugging tool based on a shared key, such as figure 1 As shown, the steps are as follows:

[0024] The communication parties agree to use the AES-256 encryption algorithm with a key length of 256bit (32 bytes); the communication parties share a 256bit initial key K Int , and a key group K containing 1024 groups of 256bit shared keys G ;Communication key K T is K G The T (1≤T≤1024) group key; the encryption process of the encryption algorithm AES-256 is marked as E AES-256 (K,x), the decryption process is marked as D AES-256 (K,x), where K is a 256bit key, and x is the mini...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for encrypting communication of a power system debugging tool based on a shared secret key. Under the existing shared-key mechanism, all communication environments usethe same key pair, and there is a risk that the malicious attacker can reverse-analyze the key by acquiring a large number of communication samples. The invention presets a shared initialization keyKInt and a shared key group KG, and agrees on the same encryption and corresponding decryption algorithm. In the communication process, the initiator and the receiver use the initialization key KInt to realize the mechanism that the communication key KT is specified by the receiver by checking the random number, and the mechanism that the initiator and the receiver agree to confirm the communication key together, so as to realize the method that the two sides use different shared key for each communication, and to improve the security of the encrypted communication.

Description

technical field [0001] The invention belongs to the field of power system communication, in particular to an encrypted communication method for a power system debugging tool based on a shared key. Background technique [0002] In the communication protocol of the secondary equipment debugging tool in the power system, private plaintext transmission is often used. Although this method facilitates the diagnosis of abnormal information during the use of the tool, it also brings the risk of internal information leakage of the secondary equipment, and there are potential safety hazards. . [0003] In encrypted communication of power system debugging tools, encrypted communication based on shared key is a common communication method. In this method, both parties to the communication are based on the agreed encryption algorithm and share a preset symmetric key to realize encrypted communication. This method is simple to use and has high encryption efficiency, but the same key is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0838H04L63/061H04L63/067
Inventor 方芳李广华宣晓华陆承宇王松孙文文汪冬辉戚宣威陈明杨涛阮黎翔吴栋萁丁峰顾浩周强
Owner ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY