CN105391551A - Method for encryption and decryption of intelligent electric meter embedded engineering file - Google Patents

Method for encryption and decryption of intelligent electric meter embedded engineering file Download PDF

Info

Publication number
CN105391551A
CN105391551A CN201510833048.5A CN201510833048A CN105391551A CN 105391551 A CN105391551 A CN 105391551A CN 201510833048 A CN201510833048 A CN 201510833048A CN 105391551 A CN105391551 A CN 105391551A
Authority
CN
China
Prior art keywords
elliptic curve
encryption
intelligent electric
electric meter
subfile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510833048.5A
Other languages
Chinese (zh)
Inventor
蒋雯倩
李刚
唐利涛
龙东
李伟坚
杨舟
曾博
潘俊涛
梁捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Research Institute of Guangxi Power Grid Co Ltd
Original Assignee
Electric Power Research Institute of Guangxi Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Research Institute of Guangxi Power Grid Co Ltd filed Critical Electric Power Research Institute of Guangxi Power Grid Co Ltd
Priority to CN201510833048.5A priority Critical patent/CN105391551A/en
Publication of CN105391551A publication Critical patent/CN105391551A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Abstract

The invention belongs to the technical field of electric and automation, particularly relates to a method for encryption of a software engineering file, and specifically relates to a method for encryption and decryption of an intelligent electric meter embedded engineering file. The method includes preprocessing the intelligent electric meter embedded engineering file, converting the embedded engineering file into numeric characters, and then performing encryption and decryption operation of the intelligent electric meter software engineering file on the basis of using an elliptic curve to encrypt preprocessing, thereby guaranteeing confidentiality of the intelligent electric meter embedded engineering file of a submission unit, improving intellectual property security of an intelligent electric meter submission company, and reducing intelligent electric meter embedded software transmission and storage risks brought by the Internet. The method provided by the invention reduces the data length of a secret key, thereby reducing time consumption and resource consumption of encryption, reducing the calculation amount of encryption, and improving the encryption speed of the intelligent electric meter software engineering file.

Description

The encryption and decryption method of the embedded project file of a kind of intelligent electric meter
Technical field
The invention belongs to electric and technical field of automation, refer more particularly to the encryption method of soft project file, be specifically related to the encryption and decryption method of the embedded project file of a kind of intelligent electric meter.
Background technology
The ultra-large development of power industry, brings many unprecedented challenges, and intelligent grid has become the common choice of countries in the world power industry reply Challenges for Future, is the developing direction of 21 century electric power system.Intelligent electric meter is one of basic equipment of intelligent grid data acquisition, carries the task of original electrical energy data acquiring, metering and transmission, is to realize the basis that information integerated, analysis optimization and information represents.
At present, due to the high speed development of intelligent grid, the demand of intelligent electric energy meter is increased rapidly.For ensureing accuracy and the accuracy of intelligent electric meter, according to the requirement of State Grid Corporation of China, must strictly detect the intelligent electric meter being about to come into operation according to intelligent electric energy meter technical requirement, and the approach of submitting to a higher level for approval or revision of the embedded project file of intelligent electric meter of each unit of company current is all be committed to the cloud platform of specifying, how ensureing the confidentiality of the embedded project file of intelligent electric meter and the intellectual property fail safe of each company, is a current difficult problem urgently to be resolved hurrily.Along with the development of wireless communication technique and network encryption technique, the encryption for the embedded project file of intelligent electric meter has become the development trend of industrial detection.
Summary of the invention
Object of the present invention is the problems referred to above solving prior art, the invention provides the encryption and decryption method of the embedded project file of a kind of intelligent electric meter, invention increases the efficiency of the embedded project file encryption of intelligent electric meter, add confidentiality and the fail safe of intelligent electric meter soft project file, to achieve these goals, the technical solution used in the present invention is as follows:
An encryption method for the embedded project file of intelligent electric meter, is characterized in that: described encryption method comprises the following steps:
Step 1: embedded project file is decomposed into each subfile;
Step 2: by the text character in each subfile of embedded project file according to order, be converted to ASCII character value one by one, obtains the ASCII form T of each subfile of embedded project file i, i is subfile T iserial number, wherein, 1≤i≤s, s is the sub-file number of embedded project file, T ibe the sequence of an ASCII value, T i={ a 1, a 2, a 3..., a j..., a n, wherein a jfor the ASCII value of character in subfile, n is file T ithe sum of middle ASCII value;
Step 3: to subfile ASCII form T iin a series of ASCII value divide into groups in order, according to calculate block length L, T ibecome after grouping:
T i'={{a 1,a 2,a 3,...,a L},{a L+1,a L+2,a L+3,...,a 2L},...,{a mL+1,a 2,a 3,...a n}},
Wherein
Step 4: to the T obtained in step 3 i'={ t 1, t 2..., t min each subsequence reconstruct in 65536 systems, wherein t qfor T i' in q subsequence, t q={ a (q-1) L+1, a (q-1) L+2..., a qL, 1≤q≤m+1, that is:
N q=65536 L-1a (q-1)L+1+65536 L-2a (q-1)L+2+...+65536a qL-1+a qL(1);
If T i' in element number in last subsequence be less than block length L, then mend 0 at sequence end, if sub-sequence length is L, substitutes in formula (1) and calculate, obtain T ithe Serial No. R of reconstruct i, R i={ N 1, N 2..., N m, if m is odd number, then at sequence R iend fills one 32, that is:
Step 5: utilize elliptic curve encryption algorithm to be encrypted to ASCII subfile, ciphering process is as follows:
Step 5.1: from random selecting integer k 1 to n-1;
Step 5.2: calculate wherein G is the generator point choosing elliptic curve, wherein G={60204628237568865675821348058752611191669876636884684 818,17405033229362203140485755228021941036402348892738665064 1}
Wherein represent the multiplication on elliptic curve;
Step 5.3: calculate wherein represent the addition on elliptic curve, pb represents the PKI of enabling decryption of encrypted file, wherein:
pb={2803000786541617331377384897435095499124748881890727495642,4269718021105944287201929298168253040958383009157463900739}
wherein nB is the private key of declassified document,
NB=28186466892849679686038856807396267537577176687436853 369; Pm is by sequence R iin element-pairwise composition, as elliptic curve cryptography method input expressly, that is:
pm={{N 1,N 2},{N 3,N 4},…}(3)
Calculate:
p m ⊕ k ⊗ p b = { { N 1 ⊕ k ⊗ p b , N 2 ⊕ k ⊗ p b } , { N 3 ⊕ k ⊗ p b , N 4 ⊕ k ⊗ p b } ... } - - - ( 4 ) ;
Step 5.4: calculate final encrypt file pT i, pT irepresent embedded project file T ilast ciphertext, then meet:
pT i = { k ⊗ G , p m ⊕ k ⊗ p b } - - - ( 5 )
Step 6: by the form of the filename called after " censorship unit English name+intelligent electric meter model+software version number+inspector's code+filename " of embedded project file subfile, filename is encrypted as digital ciphertext to the cryptographic algorithm of step 5 by repetition step 2.
Step 7: the storage order of the embedded project file subfile after all encryptions according to original document is stored.
Preferably, the calculating of the block length L in described encryption section step 3 comprises the steps:
Step 21: p is expressed as 65536 system p ';
Step 22: the digits long L ' calculating p ';
Step 23: block length L=L '-1;
Preferably, the step of the elliptic curve encryption algorithm encryption in described step 5 is as follows: pass through Elliptic Curve y 2=x 32 P (x on+ax+bmodp 1, y 1), Q (x 2, y 2), suppose if P, Q are different points, then calculate:
x 3={λ 2-x 1-x 2}modp(31);
y 3={λ(x 1-x 2)-y 1}modp(32);
Wherein
λ = y 2 - y 1 x 2 - x 1 mod p - - - ( 33 ) ;
If P, Q are same point (x 1, y 1),
x 3={λ 2-2x 1}modp(34);
y 3={λ(x 1-x 3)-y 1}modp(35);
Wherein
λ = 3 x 1 2 + a 2 y 1 mod p - - - ( 36 ) ;
Addition on elliptic curve meets associative law and law of communication:
P ⊕ Q = Q ⊕ P - - - ( 37 )
( P ⊕ Q ) ⊕ O = P ⊕ ( Q ⊕ O ) - - - ( 38 )
Cross the parallel lines that some P make y-axis, hand over elliptic curve in the negative unit of another P ', P ' be P, be denoted as-P, then the subtraction rule on elliptic curve meets:
Q - P = Q ⊕ ( - P ) = Q ⊕ P ′ - - - ( 39 ) ;
Namely minuend adds the negative unit of subtrahend, then carries out the multiplication of Point on Elliptic Curve.
Preferably, the elliptic curve side y of described step 3 2=x 3+ ax+bmodp journey meets:
Wherein x, y are the unknown number a of curvilinear equation, and b, p are the parameters of elliptic curve equation, and parameter value is taken as respectively: a=-3;
b=2455155546008943817740293915197451784769108058161191238065;
p=6277101735386680763835789423207666416083908700390324961279;
A decryption method for the embedded project file of intelligent electric meter, is characterized in that: the embedded project file of intelligent electric meter after encryption is decomposed into subfile one by one, obtains a series of encrypt file pT i, wherein, 1≤i≤s; , utilize selected Elliptic Curve y simultaneously 2=x 3+ ax+bmodp algorithm carries out private key and PKI, then generator point G and a series of encrypt file pT i, its decrypting process comprises the steps:
Step 51: the Elliptic Curve y used according to encryption 2=x 3+ ax+bmodp, obtains private key nB and generator point G;
Step 52: from random selecting integer k 1 to n-1, calculates
Step 53: calculate pm:
p m = p m ⊕ k ⊗ p b - n B ⊗ ( k ⊗ G ) = p m ⊕ k ⊗ p b - k ⊗ ( n B ⊗ G ) = p m ⊕ k ⊗ p b - k ⊗ p b = p m - - - ( 9 )
Wherein "-" operation be in elliptic curve on subtraction, obtain expressly pm, namely obtain Serial No. R i;
Step 54: by Serial No. R iin each element N q, be converted to corresponding ASCII value, obtain the ASCII value sequence T of embedded project file subfile i;
Step 55: by T iin each ASCII value a jbe converted to corresponding character, obtain project file subfile.
Step 56: the filename of engineering subfile is deciphered to step 55 according to step 51, obtains original document.
In sum, the present invention is owing to have employed above technical scheme, and the present invention has following remarkable result:
(1), patent of the present invention is encrypted the embedded project file of the intelligent electric meter after preliminary treatment on the basis of elliptic curve encryption algorithm, the operation of deciphering, thus ensure that the confidentiality of the embedded project file of censorship unit intelligent electric meter, improve the intellectual property fail safe of intelligent electric meter censorship company.
(2), embedded project file is converted into numerical chracter by patent of the present invention, recycling elliptic curve encryption algorithm is to digital file encryption, intelligent electric meter embedded software after encryption transmitted and is stored into cloud server, reduce the embedded project file transmission of the intelligent electric meter brought the Internet and store risk.
(3), the encryption method that proposes of the present invention has less key data length, thus reduces time loss and the resource consumption of encryption, improves the enciphering rate of the embedded project file of intelligent electric meter.
Accompanying drawing explanation
In order to be illustrated more clearly in example of the present invention or technical scheme of the prior art, introduce doing accompanying drawing required in embodiment or description of the prior art simply below, apparently, accompanying drawing in the following describes is only examples more of the present invention, to those skilled in the art, do not paying under creationary prerequisite, other accompanying drawing can also obtained according to these accompanying drawings.
Fig. 1 is the general flow chart of the encryption method of the embedded project file of a kind of intelligent electric meter of the present invention.
Fig. 2 is the encryption flow figure of the encryption method of the embedded project file of a kind of intelligent electric meter of the present invention.
Fig. 3 is the deciphering flow chart of the decryption method of the embedded project file of a kind of intelligent electric meter of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in example of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Below in conjunction with Fig. 1, set forth the embedded project file encryption method of a kind of intelligent electric meter based on elliptic curve of the present invention, described encryption method comprises the following steps:
Step 1: embedded project file is decomposed into each subfile;
Step 2: by the text character in each subfile of embedded project file according to order, be converted to ASCII character value one by one, obtains the ASCII form T of each subfile of embedded project file i, i is subfile T iserial number, wherein, 1≤i≤s, s is the sub-file number of embedded project file, T ibe the sequence of an ASCII value, T i={ a 1, a 2, a 3..., a j..., a n, wherein a jfor the ASCII value of character in subfile, n is file T ithe sum of middle ASCII value;
Step 3: to subfile ASCII form T iin a series of ASCII value divide into groups in order, according to calculate block length L, the calculating of described block length L comprises the steps:
Step 21: p is expressed as 65536 system p ';
Step 22: the digits long L ' calculating p ';
Step 23: block length L=L '-1;
T ibecome after grouping:
T i'={{a 1,a 2,a 3,...,a L},{a L+1,a L+2,a L+3,...,a 2L},...,{a mL+1,a 2,a 3,...a n}},
Wherein
Step 4: to the T obtained in step 3 i'={ t 1, t 2..., t min each subsequence reconstruct in 65536 systems, wherein t qfor T i' in q subsequence, t q={ a (q-1) L+1, a (q-1) L+2..., a qL, 1≤q≤m+1, that is:
N q=65536 L-1a (q-1)L+1+65536 L-2a (q-1)L+2+...+65536a qL-1+a qL(1);
If T i' in element number in last subsequence be less than block length L, then mend 0 at sequence end, if sub-sequence length is L, substitutes in formula (1) and calculate, obtain T ithe Serial No. R of reconstruct i, R i={ N 1, N 2..., N m, if m is odd number, then at sequence R iend fills one 32, that is:
Step 5: utilize elliptic curve encryption algorithm to be encrypted to ASCII subfile, composition graphs 2, described ciphering process is as follows:
Step 5.1: from random selecting integer k 1 to n-1;
Step 5.2: calculate wherein G is the generator point choosing elliptic curve, wherein G={60204628237568865675821348058752611191669876636884684 818,17405033229362203140485755228021941036402348892738665064 1}
Wherein represent the multiplication on elliptic curve;
Step 5.3: calculate wherein represent the addition on elliptic curve, pb represents the PKI of enabling decryption of encrypted file, wherein:
pb={2803000786541617331377384897435095499124748881890727495642,4269718021105944287201929298168253040958383009157463900739}
wherein nB is the private key of declassified document,
nB=28186466892849679686038856807396267537577176687436853369;
Pm is by sequence R iin element-pairwise composition, as elliptic curve cryptography method input expressly, that is:
p m ⊕ k ⊗ p b = { { N 1 ⊕ k ⊗ p b , N 2 ⊕ k ⊗ p b } , { N 3 ⊕ k ⊗ p b , N 4 ⊕ k ⊗ p b } ... } - - - ( 3 ) ;
Step 5.4: calculate final encrypt file pT i, pT irepresent embedded project file T ilast ciphertext, then meet:
pT i = { k ⊗ G , p m ⊕ k ⊗ p b } - - - ( 4 )
The step of described elliptic curve encryption algorithm is as follows: pass through Elliptic Curve y 2=x 32 P (x on+ax+bmodp 1, y 1), Q (x 2, y 2), suppose if P, Q are different points, then calculate:
x 3={λ 2-x 1-x 2}modp(5);
y 3={λ(x 1-x 2)-y 1}modp(6);
Wherein
λ = y 2 - y 1 x 2 - x 1 mod p - - - ( 7 ) ;
If P, Q are same point (x 1, y 1),
x 3={λ 2-2x 1}modp(8);
y 3={λ(x 1-x 3)-y 1}modp(9);
Wherein
λ = 3 x 1 2 + a 2 y 1 mod p - - - ( 10 ) ;
Addition on elliptic curve meets associative law and law of communication:
P ⊕ Q = Q ⊕ P - - - ( 11 ) ;
( P ⊕ Q ) ⊕ O = P ⊕ ( Q ⊕ O ) - - - ( 12 ) ;
Cross the parallel lines that some P make y-axis, hand over elliptic curve in the negative unit of another P ', P ' be P, be denoted as-P, then the subtraction rule on elliptic curve meets:
Q - P = Q ⊕ ( - P ) = Q ⊕ P ′ - - - ( 13 ) ;
Namely minuend adds the negative unit of subtrahend, then carries out the multiplication of Point on Elliptic Curve, then meets:
Step 6: by the form of the filename called after " censorship unit English name+intelligent electric meter model+software version number+inspector's code+filename " of embedded project file subfile, filename is encrypted as digital ciphertext to the cryptographic algorithm of step 5 by repetition step 2;
Step 7: the storage order of the embedded project file subfile after all encryptions according to original document is stored.
As shown in Figure 3, in the decryption method of the embedded project file of a kind of intelligent electric meter of the present invention, be by encryption after the embedded project file of intelligent electric meter be decomposed into subfile one by one, obtain a series of encrypt file pT i, wherein, 1≤i≤s; Utilize selected Elliptic Curve y simultaneously 2=x 3+ ax+bmodp algorithm carries out private key and PKI, then generator point G and a series of encrypt file pT i, its decrypting process comprises the steps:
Step 51: the Elliptic Curve y used according to encryption 2=x 3+ ax+bmodp algorithm, obtains private key nB and generator point G;
Step 52: from random selecting integer k 1 to n-1, calculates
Step 53: calculate pm:
p m = p m ⊕ k ⊗ p b - n B ⊗ ( k ⊗ G ) = p m ⊕ k ⊗ p b - k ⊗ ( n B ⊗ G ) = p m ⊕ k ⊗ p b - k ⊗ p b = p m - - - ( 13 ) ;
Wherein "-" operation be in elliptic curve on subtraction, obtain expressly pm, namely obtain Serial No. R i;
Step 54: by Serial No. R iin each element N q, be converted to corresponding ASCII value, obtain the ASCII value sequence T of embedded project file subfile i;
Step 55: by T iin each ASCII value a jbe converted to corresponding character, obtain project file subfile.
Step 56: the filename of engineering subfile is deciphered to step 55 method according to step 51, obtains original document.
The foregoing is only the preferred embodiment of invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (5)

1. an encryption method for the embedded project file of intelligent electric meter, is characterized in that: described encryption method comprises the following steps:
Step 1: embedded project file is decomposed into each subfile;
Step 2: by the text character in each subfile of embedded project file according to order, be converted to ASCII character value one by one, obtains the ASCII form T of each subfile of embedded project file i, i is subfile T iserial number, wherein, 1≤i≤s, s is the sub-file number of embedded project file, T ibe the sequence of an ASCII value, T i={ a 1, a 2, a 3..., a j..., a n, wherein a jfor the ASCII value of character in subfile, n is file T ithe sum of middle ASCII value;
Step 3: to subfile ASCII form T iin a series of ASCII value divide into groups in order, according to calculate block length L, T ibecome after grouping:
T′ i={{a 1,a 2,a 3,...,a L},{a L+1,a L+2,a L+3,...,a 2L},...,{a mL+1,a 2,a 3,...a n}},
Wherein
Step 4: to the T ' obtained in step 3 i={ t 1, t 2..., t min each subsequence reconstruct in 65536 systems, wherein t qfor T ' iin q subsequence, t q={ a (q-1) L+1, a (q-1) L+2..., a qL, 1≤q≤m+1, that is:
N q=65536 L-1a (q-1)L+1+65536 L-2a (q-1)L+2+...+65536a qL-1+a qL(1);
If T ' iin element number in last subsequence be less than block length L, then mend 0 at sequence end,
If sub-sequence length is L, substitutes in formula (1) and calculate, obtain T ithe Serial No. R of reconstruct i, R i={ N 1, N 2..., N m, if m is odd number, then at sequence R iend fills one 32, that is:
Step 5: utilize elliptic curve encryption algorithm to be encrypted to ASCII subfile, ciphering process is as follows:
Step 5.1: from random selecting integer k 1 to n-1;
Step 5.2: calculate wherein G is the generator point choosing elliptic curve, wherein
G={60204628237568865675821348058752611191669876636884684818,174050332293622031404857552280219410364023488927386650641}
Wherein represent the multiplication on elliptic curve;
Step 5.3: calculate wherein represent the addition on elliptic curve, pb represents the PKI of enabling decryption of encrypted file, wherein:
pb={2803000786541617331377384897435095499124748881890727495642,4269718021105944287201929298168253040958383009157463900739}
wherein nB is the private key of declassified document,
nB=28186466892849679686038856807396267537577176687436853369;
Pm is by sequence R iin element-pairwise composition, as elliptic curve cryptography method input expressly, that is:
pm={{N 1,N 2},{N 3,N 4},…}(3);
Calculate:
Step 5.4: calculate final encrypt file pT i, pT irepresent embedded project file T ilast ciphertext, then meet:
Step 6: by the form of the filename called after " censorship unit English name+intelligent electric meter model+software version number+inspector's code+filename " of embedded project file subfile, filename is encrypted as digital ciphertext to the cryptographic algorithm of step 5 by repetition step 2.
Step 7: the storage order of the embedded project file subfile after all encryptions according to original document is stored.
2. the encryption method of the embedded project file of a kind of intelligent electric meter according to claim 1, is characterized in that: the calculating of the block length L in described encryption section step 3 comprises the steps:
Step 21: p is expressed as 65536 system p ';
Step 22: the digits long L ' calculating p ';
Step 23: block length L=L '-1.
3. the encryption method of the embedded project file of a kind of intelligent electric meter according to claim 1, is characterized in that: the step of the elliptic curve encryption algorithm encryption in described step 5 is as follows: pass through Elliptic Curve y 2=x 32 P (x on+ax+bmodp 1, y 1), Q (x 2, y 2), suppose if P, Q are different points, then calculate:
x 3={λ 2-x 1-x 2}modp(31);
y 3={λ(x 1-x 2)-y 1}modp(32);
Wherein
If P, Q are same point (x 1, y 1),
x 3={λ 2-2x 1}modp(34);
y 3={λ(x 1-x 3)-y 1}modp(35);
Wherein
Addition on elliptic curve meets associative law and law of communication:
Cross the parallel lines that some P make y-axis, hand over elliptic curve in the negative unit of another P ', P ' be P, be denoted as-P,
Subtraction rule then on elliptic curve meets:
Namely minuend adds the negative unit of subtrahend, then carries out the multiplication of Point on Elliptic Curve.
4. the encryption method of the embedded project file of a kind of intelligent electric meter according to claim 1, is characterized in that: the elliptic curve side y of described step 3 2=x 3+ ax+bmodp journey meets:
Wherein x, y are the unknown number a of curvilinear equation, and b, p are the parameters of elliptic curve equation, and parameter value is taken as respectively: a=-3;
b=2455155546008943817740293915197451784769108058161191238065;
p=6277101735386680763835789423207666416083908700390324961279。
5. a decryption method for the embedded project file of intelligent electric meter, is characterized in that: the embedded project file of intelligent electric meter after encryption is decomposed into subfile one by one, obtains a series of encrypt file pT i, wherein, 1≤i≤s; , utilize selected Elliptic Curve y simultaneously 2=x 3+ ax+bmodp algorithm carries out private key and PKI, then generator point G and a series of encrypt file pT i, its decrypting process comprises the steps:
Step 51: the Elliptic Curve y used according to encryption 2=x 3+ ax+bmodp, obtains private key nB and generator point G;
Step 52: from random selecting integer k 1 to n-1, calculates
Step 53: calculate pm:
Wherein "-" operation be in elliptic curve on subtraction, obtain expressly pm, namely obtain Serial No. R i;
Step 54: by Serial No. R iin each element N q, be converted to corresponding ASCII value, obtain the ASCII value sequence T of embedded project file subfile i;
Step 55: by T iin each ASCII value a jbe converted to corresponding character, obtain project file subfile.
Step 56: the filename of engineering subfile is deciphered to step 55 according to step 51, obtains original document.
CN201510833048.5A 2015-11-25 2015-11-25 Method for encryption and decryption of intelligent electric meter embedded engineering file Pending CN105391551A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510833048.5A CN105391551A (en) 2015-11-25 2015-11-25 Method for encryption and decryption of intelligent electric meter embedded engineering file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510833048.5A CN105391551A (en) 2015-11-25 2015-11-25 Method for encryption and decryption of intelligent electric meter embedded engineering file

Publications (1)

Publication Number Publication Date
CN105391551A true CN105391551A (en) 2016-03-09

Family

ID=55423406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510833048.5A Pending CN105391551A (en) 2015-11-25 2015-11-25 Method for encryption and decryption of intelligent electric meter embedded engineering file

Country Status (1)

Country Link
CN (1) CN105391551A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040545A (en) * 2017-05-26 2017-08-11 中国人民解放军信息工程大学 Project file Life cycle method for security protection
CN110430050A (en) * 2019-07-31 2019-11-08 湖南匡安网络技术有限公司 A kind of smart grid collecting method based on secret protection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101418103B1 (en) * 2014-04-02 2014-07-11 에스피브이(주) Efficient energy management and storage system applied with appropriate storage and supply method of electric power and use of diversified new regeneration energy
CN104252147A (en) * 2013-06-27 2014-12-31 英飞凌科技股份有限公司 System and method for estimating periodic signal
CN104376647A (en) * 2014-11-04 2015-02-25 国家电网公司 Real-time charging system used for electric power
CN204758672U (en) * 2015-06-04 2015-11-11 南京国电南自城乡电网自动化工程有限公司 Digital electric energy meter with ESAM encryption function

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104252147A (en) * 2013-06-27 2014-12-31 英飞凌科技股份有限公司 System and method for estimating periodic signal
KR101418103B1 (en) * 2014-04-02 2014-07-11 에스피브이(주) Efficient energy management and storage system applied with appropriate storage and supply method of electric power and use of diversified new regeneration energy
CN104376647A (en) * 2014-11-04 2015-02-25 国家电网公司 Real-time charging system used for electric power
CN204758672U (en) * 2015-06-04 2015-11-11 南京国电南自城乡电网自动化工程有限公司 Digital electric energy meter with ESAM encryption function

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
侯整风,李岚: "椭圆曲线密码系统(ECC)整体算法设计及优化研究", 《电子学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040545A (en) * 2017-05-26 2017-08-11 中国人民解放军信息工程大学 Project file Life cycle method for security protection
CN107040545B (en) * 2017-05-26 2019-05-31 中国人民解放军信息工程大学 Project file Life cycle method for security protection
CN110430050A (en) * 2019-07-31 2019-11-08 湖南匡安网络技术有限公司 A kind of smart grid collecting method based on secret protection
CN110430050B (en) * 2019-07-31 2021-11-23 湖南匡安网络技术有限公司 Smart power grid data acquisition method based on privacy protection

Similar Documents

Publication Publication Date Title
CN103475472B (en) The full homomorphic cryptography method of NTRU types on ring LWE
CN103259662B (en) A kind of new allograph based on Integer Decomposition problem and verification method
CN101764686A (en) Encryption method for network and information security
CN102571357B (en) Signature realization method and signature realization device
Li et al. Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem
CN105488422A (en) Homomorphically encrypted private data protection based editing distance calculation system
CN106452748A (en) Multiple users-based outsourcing database audit method
CN103916248A (en) Fully homomorphic encryption public key space compression method
CN101814985A (en) Block cipher system using multi-chaotic mapping multi-dynamic S-box
CN112052466B (en) Support vector machine user data prediction method based on multi-party secure computing protocol
CN104077356A (en) Homomorphic encryption based cloud storage platform retrieval method
CN103220146A (en) Zero knowledge digital signature method based on multivariate public key cryptosystem
CN106254073A (en) A kind of operation method for ciphertext number and system
CN106209365A (en) The method that Backup Data is heavily signed is utilized when user cancels under cloud environment
JunLi et al. Email encryption system based on hybrid AES and ECC
CN105391551A (en) Method for encryption and decryption of intelligent electric meter embedded engineering file
CN102769528A (en) Quick large number decomposition method based on cryptographic technology application
CN101783728B (en) Public key encryption method for ergodic matrix over hidden field
CN104618098B (en) Cryptography building method and system that a kind of set member's relation judges
CN103716162B (en) Identity-based safe generalized signcryption method under standard model
Yang et al. Simulation Study Based on Somewhat Homomorphic Encryption
CN104601323B (en) Solves the method for socialism millionaires' problem based on BDD
CN116743341A (en) Measurement data secure sharing method based on homomorphic encryption
KR102070061B1 (en) Batch verification method and apparatus thereof
CN103401681B (en) Model taking method, impression-taking apparatus and chip

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20190423

AD01 Patent right deemed abandoned