期刊文献+

基于混沌序列的变电站信息加密方法 被引量:2

Substation information encryption method based on chaotic series
下载PDF
导出
摘要 对于电力系统这样一个可靠性和安全稳定性要求很高的系统而言,信息安全问题尤其突出。IEC62351-3指出加密和身份认证是两大核心安全措施,因此,寻求安全性高的有效的加密算法和协议以满足变电站信息传输的安全性成为必要。给出一种基于Chebychev混沌映射的数据加密方法,鉴于在变电站的远程控制环境中,连接持续的时间一般较长,而在长久的连接持续时间中,始终采用同一个加密密钥是不安全的,所提出的混沌加密算法通过使用外部密钥和定义每次的加密粒度,使得混沌加密密钥在持久连接中能够进行重新协商,混沌映射的外部密钥取自TLS的主密钥,实现一次一密、一字一密。 Information security is crucial to electric power system which requires high reliability, security and stability. According to IEC 62351 - 3, cncryption and authentication are two important ,security measures. So investigating more secure and more effective encryption algorithm to satisfy substation security communication is needed. A chaotic encryption algorithm based on Chebychev chaotic mapping is presented. In remote control environment of substation, duration of connection is quite long. Using one encryption key during the long time connection is not secure. By using external key and defining encryption granularity in the chaotic encryption algorithm, the encryption key can be renegotiated during persistent connection. The master key of TLS is adopted as the external key of the chaotic mapping. Once encipherment and one word encipherment are implemented.
出处 《华北电力大学学报(自然科学版)》 CAS 北大核心 2009年第6期94-97,103,共5页 Journal of North China Electric Power University:Natural Science Edition
关键词 混沌序列 Chebychev映射 外部密钥 一次一密 chaotic serics Chebychev mapping external key once encipherment
  • 相关文献

参考文献5

  • 1Pareek N K, Patidar V, Sud K K. Discrete chaotic cryptography using external key [J]. Physics Letters A 309 (2003) 75 - 82.
  • 2Pareek N K , Vinod Patidar, Sud K K. Cryptography using multiple one - dimensional chaotic maps [ J ]. Communications in Nonlinear Science and Numerical Simulation, 2005, (10) : 715- 723.
  • 3Tao Xiang, Kwok - wo Wong, Xiaofeng Liao. An improved chaotic cryptosystem with external key [J ]. Communications in Nonlinear Science and Numerical Simulation, 2008, (13): 1879-1887.
  • 4刘力政,段斌,黄生龙.变电站安全通信密码计算的设计与实现[J].电力系统自动化,2005,29(11):65-68. 被引量:14
  • 5朱静,高会生,李聪聪.基于D-S证据理论的信息安全风险评估[J].华北电力大学学报(自然科学版),2008,35(4):102-108. 被引量:12

二级参考文献11

  • 1蒋国萍,陈英武.基于证据推理的软件项目复杂性评估[J].计算机工程与应用,2005,41(2):4-6. 被引量:8
  • 2段斌,王键.变电站自动化信息交换安全认证体系[J].电力系统自动化,2005,29(9):55-59. 被引量:22
  • 3胡涛,钱筱丹,黎放,王树宗.未确知性信息的证据理论合成及其应用[J].海军工程大学学报,2005,17(4):53-55. 被引量:4
  • 4GB17859-1999.计算机信息系统安全保护等级划分准则[S].[S].,1999..
  • 5ANDERSSON L, BRAND K P. The Benefits of the Coming Standard IEC 61850 for Power Automation in Substations. In:Proceedings of Southern African Conference on Power System Protection. Johannesburg (Southern African): 2000.
  • 6Kari Sentz. Combination of evidence in dempster-shafer theory [M]. Binghamton University, 2002.
  • 7Sabrina Demotier, Walter Schon, Thierry Denoeux. Risk assessment based on weak information using belief functions: a case study in water treatment [ C]. IEEE Transactions on Systems, Man, and Cybernetics Psrt C. Applications and Reviews, 2006, 36 (3) : 382 - 396.
  • 8Bae H R, Grandhi R V, Canfield R A. Sensitivity analysis of structural response uncertainty propagation using evidence theory [ J ]. Structural and Multidisciplinary Optimization, 2006, (4) : 270 - 279.
  • 9Mark J. Wierman. Measuring conflict in evidence theory [C]. IFSA World Conqress and 20th NAFIPS International Conference, 2001, (3): 1741-1745.
  • 10郭振民,胡学龙,姜会亮.网络与信息系统安全性评估及其指标体系的研究[J].现代电子技术,2003,26(9):9-11. 被引量:22

共引文献24

同被引文献27

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部