Supercharge Your Innovation With Domain-Expert AI Agents!

Power system communication message double encryption method, decryption method and message interaction system

A communication message and power system technology, applied in the field of power information system communication security, can solve problems such as crowding out system computing resources, affecting system communication capacity and response speed, communication task resource conflicts, etc., to ensure encryption efficiency and improve communication efficiency Stable, efficient and fast encryption effect

Active Publication Date: 2020-12-11
NANJING GUODIAN NANZI WEIMEIDE AUTOMATION CO LTD
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, the encryption and decryption process will inevitably occupy system computing resources, cause resource conflicts with communication tasks, and affect the communication capacity and response speed of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power system communication message double encryption method, decryption method and message interaction system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] This embodiment introduces a double encryption method for power system communication messages, including:

[0065] Obtain the original communication message;

[0066] Carry out message separation on the original communication message to obtain the separated message header and message body;

[0067] According to the preset encryption operation rules, the data segment in the message body is encrypted, and the ciphertext of the message body and the operation index information corresponding to the encryption operation process are obtained;

[0068] Add the operation index information to the separated message header to obtain the reorganized message header;

[0069] Use the agreed key to encrypt the reassembled message header twice to obtain the reassembled ciphertext of the message header;

[0070] Recombine the ciphertext of the message body and the reorganized ciphertext of the message header to obtain the reassembled encrypted message for sending.

Embodiment 1-1

[0072] On the basis of Embodiment 1, this embodiment specifically introduces the message encryption process, mainly involving the following contents.

[0073] 1.1 Message Separation

[0074] The original communication message applicable to the present invention can be a message conforming to the IEC60870 / IEC61850 / IEC61970 / IEC61968 communication protocol, or a message with a message header.

[0075] For a message without a message header, when the message is separated, the message fragment with a set byte length can be intercepted from the message header in sequence, as the separated message header, and the rest as the message body.

[0076] 1.2 Message body encryption operation and operation index information generation

[0077] The encryption operation rules for encrypting the message body in the present invention can be: according to a randomly selected or preset operation type, a random or preset operation sequence, a random or preset operation start position, length, and ...

Embodiment 2

[0092] Based on the same inventive concept as Embodiment 1, this embodiment introduces a message decryption method capable of decrypting the communication message obtained by using the encryption method of Embodiment 1, including:

[0093] Obtain the reassembled encrypted message;

[0094] Separate the reassembled encrypted message to obtain the message header ciphertext and message body ciphertext;

[0095] Use the agreed key to decrypt the ciphertext of the message header to obtain the plaintext of the message header containing the operation index information;

[0096] Segment the header plaintext to obtain the original header plaintext and operation index information;

[0097] According to the encryption operation process recorded in the operation index information, according to the reverse order of the encryption operation sequence, the reverse recovery operation of the corresponding encryption operation is performed on the ciphertext of the message body in turn, and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power system communication message double encryption method, a decryption method and a message interaction system. The encryption method comprises the steps: firstly carryingout message separation of an original communication message during encryption, then carrying out the encryption operation of combination of a plurality of operation types of data segments in a message main body, and obtaining the ciphertext of the message main body and the corresponding operation index information; and adding the operation index information into a message header, performing secondary encryption on the recombined message header by using a key, and finally combining the ciphertext of the message main body and the message header recombined ciphertext to obtain a recombined encrypted message to be sent. When a message is decrypted, a message receiving end can obtain operation index information through message separation and key decryption, and performs reverse recovery operation on the ciphertext of the message main body according to the operation index information, thereby obtaining a message main body plaintext, and further combining to obtain an original communicationmessage. According to the invention, the encryption and decryption efficiency is high, the security of the encrypted message is good, efficient encryption of messages of all data or all channels can be supported, the occupied system resources are few, and the communication efficiency of a power system is stable.

Description

technical field [0001] The invention relates to the technical field of electric power information system communication security, in particular to a double encryption method, a decryption method and a message interaction system for electric power system communication messages. Background technique [0002] The security of electric power information system has a very wide scope, including a series of links such as production, transmission and distribution of electric power. It belongs to a project with a complex management level. The common communication method of the power information system is based on different communication protocols, and most of the messages are sent in plain text, which obviously cannot guarantee the operation safety of the power information system. Various power-related departments are also trying to use symmetric encryption (DES, AES) and asymmetric encryption (RSA, DH, DSA) to encrypt the entire communication process, which significantly improves the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428Y04S40/20
Inventor 刘元张迎肖碧涛
Owner NANJING GUODIAN NANZI WEIMEIDE AUTOMATION CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More