首页 | 本学科首页   官方微博 | 高级检索  
     

电网智能单元加密算法效率评估
引用本文:张跃,张骞,黄益彬,金倩倩.电网智能单元加密算法效率评估[J].计算机测量与控制,2017,25(5):258-261, 272.
作者姓名:张跃  张骞  黄益彬  金倩倩
作者单位:南瑞集团公司国网电力科学研究院,南京 210000[HJ1.35mm],南瑞集团公司国网电力科学研究院,南京 210000[HJ1.35mm],南瑞集团公司国网电力科学研究院,南京 210000[HJ1.35mm],南瑞集团公司国网电力科学研究院,南京 210000[HJ1.35mm]
基金项目:国家电网科技(SGFJXT00YJJS1600064)。
摘    要:随着智能电网发展和电力终端设备智能化和网络化的提升,基于TCP/IP协议的数据通信面临着传统的网络安全隐患;智能电网单元是电网控制的关键组成部分,负责电网业务数据的采集处理、控制指令的收发和执行等工作,涉及大量数据传输,如何保证数据的机密性,是电网系统正常运作的关键因素之一;针对智能单元的传输规约和传输数据的特点,通过模拟智能单元计算环境,在保密性需求的基础上,结合智能单元计算资源的实际情况,综合分析电力行业和国内常见密码算法,包括对称算法和非对称算法,从运算时间及稳定性,数据长度相关性,密钥长度相关性和加密模式几个方面对算法的性能进行综合性评估;为不同智能单元的机密性保护尤其是加密算法的选取提供理论基础和实验数据。

关 键 词:智能单元  加密算法  加解密效率  加密模式  机密性
收稿时间:2017/2/4 0:00:00
修稿时间:2017/3/13 0:00:00

Efficiency Evaluation of Cryptographic Algorithms in Smart Grid
Zhang Yue,Zhang Qian,Huang Yibin and Jin Qianqian.Efficiency Evaluation of Cryptographic Algorithms in Smart Grid[J].Computer Measurement & Control,2017,25(5):258-261, 272.
Authors:Zhang Yue  Zhang Qian  Huang Yibin and Jin Qianqian
Affiliation:NARI Group CorporationState Grid Electric Power Research Institute,Nanjing 210000,China,NARI Group CorporationState Grid Electric Power Research Institute,Nanjing 210000,China,NARI Group CorporationState Grid Electric Power Research Institute,Nanjing 210000,China and NARI Group CorporationState Grid Electric Power Research Institute,Nanjing 210000,China
Abstract:With the development of smart grid and the improvement of intelligence and networking of power terminal equipment, the data communication based on TCP/IP protocol is facing the traditional network security risk. The key part of power grid control is the smart grid unit, which is responsible for the collection and processing of the business data of the power grid, and the receiving and dispatching of the control command and the execution of the data, involving much data transmission. How to ensure the data confidentiality is one of the key factors for the operation of power grid system. In this paper, according to the characteristics of the data and transmission protocol of intelligent unit, through the simulation of intelligent computing environment, on the basis of security requirements, combined with the actual situation of intelligent computing resources, we analysis the power industry and the common national cryptographic algorithm, and evaluate the computing time and stability ,correlation of data length, correlation of key length and working mode of the cryptographic algorithms. Providing theoretical basis and experimental data for the selection of confidentiality protection, especially encryption algorithm for different intelligent units.
Keywords:intelligent unit  cryptographic algorithm  encryption and decryption efficiency  cryptographic mode  confidentiality
点击此处可从《计算机测量与控制》浏览原始摘要信息
点击此处可从《计算机测量与控制》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号