The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on M...The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed—Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed—Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA);integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java.展开更多
模块化多电平换流器的固态变压器(modular multilevel converter based solid state transformer,MMC-SST)由于具备多电压等级、多电压形态的端口,在交直流混合配电网中得到广泛关注。传统的输入串联输出并联(inputseriesoutput paralle...模块化多电平换流器的固态变压器(modular multilevel converter based solid state transformer,MMC-SST)由于具备多电压等级、多电压形态的端口,在交直流混合配电网中得到广泛关注。传统的输入串联输出并联(inputseriesoutput parallel,ISOP)型MMC-SST具有较高的功率密度,但是在中压直流(medium voltage DC,MVDC)端口短路故障情况下无法持续向低压侧供电;双向有源全桥变换器(dualactive bridge,DAB)型MMC-SST则存在功率密度低、成本高等问题,并且传统的半桥结构的DAB型MMC-SST在MVDC端口短路故障情况下同样无法持续向低压侧供电。文章提出了一种子模块桥臂复用(arm integrated submodule,AISM)型MMC-SST拓扑,在不改变MMC-SST端口电气特性的情况下,在有效减少开关器件数量的同时,还使得SST具备中压直流端口短路故障下的不间断运行能力,进而提升SST的功率密度和供电可靠性。针对文中提出的AISM型MMCSST拓扑,该文还提出了一种针对输入级MMC的混频调制方法,基于共模、差模解耦原理,实现输入级MMC桥臂电压的高频分量和低频分量的解耦。通过理论分析与仿真模拟,验证了所提拓扑及控制方法的可行性。展开更多
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s...Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability.展开更多
With the rapid development of the genomic sequencing technology,the cost of obtaining personal genomic data and effectively analyzing it has been gradually reduced.The analysis and utilization of genomic dam gradually...With the rapid development of the genomic sequencing technology,the cost of obtaining personal genomic data and effectively analyzing it has been gradually reduced.The analysis and utilization of genomic dam gradually entered the public view,and the leakage of genomic dam privacy has attracted the attention of researchers.The security of genomic data is not only related to the protection of personal privacy,but also related to the biological information security of the country.However,there is still no.effective genomic dam privacy protection scheme using Shangyong Mima(SM)algorithms.In this paper,we analyze the widely used genomic dam file formats and design a large genomic dam files encryption scheme based on the SM algorithms.Firstly,we design a key agreement protocol based on the SM2 asymmetric cryptography and use the SM3 hash function to guarantee the correctness of the key.Secondly,we used the SM4 symmetric cryptography to encrypt the genomic data by optimizing the packet processing of files,and improve the usability by assisting the computing platform with key management.Software implementation demonstrates that the scheme can be applied to securely transmit the genomic data in the network environment and provide an encryption method based on SM algorithms for protecting the privacy of genomic data.展开更多
The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order ...The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol.展开更多
Environmental and electrical factors such as wind speed,air temperature and switching frequency have significant influences on the operational reliability of hybrid modular multilevel converter(MMC),which is commonly ...Environmental and electrical factors such as wind speed,air temperature and switching frequency have significant influences on the operational reliability of hybrid modular multilevel converter(MMC),which is commonly used for the wind power transmission.However,the existing reliability model of hybrid MMC based on statistics cannot accurately reflect the impact of these factors.In this paper,a new operational reliability model of hybrid MMC is presented.The reliability index of the hybrid MMC is coupled with its operation characteristics by calculating multi-term thermal cycling.In addition,an operation strategy of hybrid MMC is proposed to improve its reliability.The multi-state submodule(SM)is developed,which is capable of bypassing specific faulty power modules instead of the whole SM.Case studies show that the proposed operational reliability model could describe the impact of environmental and electrical factors.Also,the proposed operation strategy can improve the reliability of hybrid IMMC by extending the operation time of SMs.展开更多
在基于电压源型换流器的柔性高压直流输电(voltage sourced converter based high voltage direct current,VSC-HVDC)场合,由半桥和全桥子模块构成的混合型模块化多电平变流器(modular multilevel converter,MMC)因具备直流短路故障自...在基于电压源型换流器的柔性高压直流输电(voltage sourced converter based high voltage direct current,VSC-HVDC)场合,由半桥和全桥子模块构成的混合型模块化多电平变流器(modular multilevel converter,MMC)因具备直流短路故障自清除能力,引起了广泛的研究。而大容量MMC子模块电容的质量、体积大,成本较高,逐渐成为其取得更广泛应用的限制因素。分析并建立了混合型MMC子模块电容电压基频纹波系数与桥臂负电压以及功率因数之间的函数关系。根据该函数,提出一种混合型MMC的参数设计方法使子模块电容最小,在提高MMC功率密度的同时降低了子模块的成本和体积。同时,对比传统的桥臂参考电压始终为正的混合型MMC,在直流电压和桥臂电流有效值相等的情况下,建立了桥臂参考电压存在负电压的混合型MMC的功率传输特性函数,并求出了函数的最优解。最后,通过±160 kV混合型MMC的对比仿真验证了所提设计方法的正确性和有效性。展开更多
文摘The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed—Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed—Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA);integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java.
文摘模块化多电平换流器的固态变压器(modular multilevel converter based solid state transformer,MMC-SST)由于具备多电压等级、多电压形态的端口,在交直流混合配电网中得到广泛关注。传统的输入串联输出并联(inputseriesoutput parallel,ISOP)型MMC-SST具有较高的功率密度,但是在中压直流(medium voltage DC,MVDC)端口短路故障情况下无法持续向低压侧供电;双向有源全桥变换器(dualactive bridge,DAB)型MMC-SST则存在功率密度低、成本高等问题,并且传统的半桥结构的DAB型MMC-SST在MVDC端口短路故障情况下同样无法持续向低压侧供电。文章提出了一种子模块桥臂复用(arm integrated submodule,AISM)型MMC-SST拓扑,在不改变MMC-SST端口电气特性的情况下,在有效减少开关器件数量的同时,还使得SST具备中压直流端口短路故障下的不间断运行能力,进而提升SST的功率密度和供电可靠性。针对文中提出的AISM型MMCSST拓扑,该文还提出了一种针对输入级MMC的混频调制方法,基于共模、差模解耦原理,实现输入级MMC桥臂电压的高频分量和低频分量的解耦。通过理论分析与仿真模拟,验证了所提拓扑及控制方法的可行性。
文摘Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability.
基金supported by the National Key Research and Development Program of China(No.2016YFC1000307)the National Natural Science Foundation of China(No.61571024,No.61971021).
文摘With the rapid development of the genomic sequencing technology,the cost of obtaining personal genomic data and effectively analyzing it has been gradually reduced.The analysis and utilization of genomic dam gradually entered the public view,and the leakage of genomic dam privacy has attracted the attention of researchers.The security of genomic data is not only related to the protection of personal privacy,but also related to the biological information security of the country.However,there is still no.effective genomic dam privacy protection scheme using Shangyong Mima(SM)algorithms.In this paper,we analyze the widely used genomic dam file formats and design a large genomic dam files encryption scheme based on the SM algorithms.Firstly,we design a key agreement protocol based on the SM2 asymmetric cryptography and use the SM3 hash function to guarantee the correctness of the key.Secondly,we used the SM4 symmetric cryptography to encrypt the genomic data by optimizing the packet processing of files,and improve the usability by assisting the computing platform with key management.Software implementation demonstrates that the scheme can be applied to securely transmit the genomic data in the network environment and provide an encryption method based on SM algorithms for protecting the privacy of genomic data.
文摘The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol.
基金This work was supported by the National Key R&D Program of China(No.2017YFB0902200)the Science and Technology Project of State Grid Corporation of China(No.5228001700CW)the International Cooperation and Exchange Project of National Natural Science Foundation of China(No.51861145406).
文摘Environmental and electrical factors such as wind speed,air temperature and switching frequency have significant influences on the operational reliability of hybrid modular multilevel converter(MMC),which is commonly used for the wind power transmission.However,the existing reliability model of hybrid MMC based on statistics cannot accurately reflect the impact of these factors.In this paper,a new operational reliability model of hybrid MMC is presented.The reliability index of the hybrid MMC is coupled with its operation characteristics by calculating multi-term thermal cycling.In addition,an operation strategy of hybrid MMC is proposed to improve its reliability.The multi-state submodule(SM)is developed,which is capable of bypassing specific faulty power modules instead of the whole SM.Case studies show that the proposed operational reliability model could describe the impact of environmental and electrical factors.Also,the proposed operation strategy can improve the reliability of hybrid IMMC by extending the operation time of SMs.
文摘在基于电压源型换流器的柔性高压直流输电(voltage sourced converter based high voltage direct current,VSC-HVDC)场合,由半桥和全桥子模块构成的混合型模块化多电平变流器(modular multilevel converter,MMC)因具备直流短路故障自清除能力,引起了广泛的研究。而大容量MMC子模块电容的质量、体积大,成本较高,逐渐成为其取得更广泛应用的限制因素。分析并建立了混合型MMC子模块电容电压基频纹波系数与桥臂负电压以及功率因数之间的函数关系。根据该函数,提出一种混合型MMC的参数设计方法使子模块电容最小,在提高MMC功率密度的同时降低了子模块的成本和体积。同时,对比传统的桥臂参考电压始终为正的混合型MMC,在直流电压和桥臂电流有效值相等的情况下,建立了桥臂参考电压存在负电压的混合型MMC的功率传输特性函数,并求出了函数的最优解。最后,通过±160 kV混合型MMC的对比仿真验证了所提设计方法的正确性和有效性。