CN115694815A - Communication encryption method and device for power distribution terminal - Google Patents

Communication encryption method and device for power distribution terminal Download PDF

Info

Publication number
CN115694815A
CN115694815A CN202310000639.9A CN202310000639A CN115694815A CN 115694815 A CN115694815 A CN 115694815A CN 202310000639 A CN202310000639 A CN 202310000639A CN 115694815 A CN115694815 A CN 115694815A
Authority
CN
China
Prior art keywords
quantum key
key
service
power
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310000639.9A
Other languages
Chinese (zh)
Other versions
CN115694815B (en
Inventor
张磐
杨挺
徐科
郭志标
魏然
吴磊
梁海深
郑悦
陈沼宇
张海丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
State Grid Corp of China SGCC
State Grid Tianjin Electric Power Co Ltd
Electric Power Research Institute of State Grid Tianjin Electric Power Co Ltd
Original Assignee
Tianjin University
State Grid Corp of China SGCC
State Grid Tianjin Electric Power Co Ltd
Electric Power Research Institute of State Grid Tianjin Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University, State Grid Corp of China SGCC, State Grid Tianjin Electric Power Co Ltd, Electric Power Research Institute of State Grid Tianjin Electric Power Co Ltd filed Critical Tianjin University
Priority to CN202310000639.9A priority Critical patent/CN115694815B/en
Publication of CN115694815A publication Critical patent/CN115694815A/en
Application granted granted Critical
Publication of CN115694815B publication Critical patent/CN115694815B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a communication encryption method and a communication encryption device for power distribution terminals, wherein a communication encryption strategy of a power service is determined according to the service priority of the power service to be transmitted between the power distribution terminals, and an original quantum key is obtained from a quantum key pool to encrypt and transmit the power service; calculating the net key generation rate of the quantum key pool in real time; when the net secret key generation rate is smaller than or equal to a preset rate threshold value, acquiring a recovery quantum secret key from a recovery secret key pool to carry out encryption transmission on a preset type of electric power service to be transmitted; wherein the recovered quantum key is generated from the used original quantum key. By adopting the method and the device, different communication encryption strategies can be distributed for the power services with different priorities, the encryption transmission process is adjusted according to the actual situation, and the residual secret key amount of the quantum secret key pool can meet the normal communication requirement between the power distribution terminals.

Description

Communication encryption method and device for power distribution terminal
Technical Field
The invention relates to the technical field of power distribution networks, in particular to a communication encryption method and device for a power distribution terminal.
Background
Communication and information security are two major problems which restrict the automation and the practicability of a power distribution network, and the development requirement of a power distribution automation access layer communication technology is continuously iterated and perfected by an information security guarantee technology matched with the development requirement. With the current technological development trend, 5G communication is a major alternative to distribution automation access stratum communication. The feeder automation based on 5G communication generally adopts the principles of quick-acting Multi-Agent, longitudinal differential protection and the like as the main logic of the feeder automation, and is particularly suitable for scenes with extremely high requirements on power supply reliability. The novel feeder automation principles of quick-acting Multi-Agent, longitudinal differential protection and the like depend on transverse peer-to-peer communication between a terminal and a terminal, and the existing distribution automation encryption authentication system is only established in the longitudinal communication dimension between a main station and the terminal and cannot adapt to the safety service requirement of transverse encryption authentication.
Therefore, aiming at the 5G feeder automation information communication authentication requirement, the communication data between the terminals are encrypted through the unique quantum key of the distribution terminal quantum security mobile medium, so that the secure transmission of peer-to-peer communication sessions between the terminals is realized, the direct mutual authentication between the terminals is facilitated, and the key power terminal is prevented from being attacked by violent tampering, capturing, stealing and the like in the identity information in a complex communication environment. Quantum Key Distribution (QKD) technology has the advantage of theoretically "unconditional security", so that Quantum secret communication is safer and more reliable than a traditional communication mode.
However, the inventors found that the prior art has at least the following problems: with the wide application of quantum secure communication, communication services between power distribution terminals are increasing continuously, the number of quantum keys required for realizing data communication between the power distribution terminals is greatly increased, the quantum key generation rate of the current quantum key distribution device is low, and if all communication services adopt a one-time pad (OTP) scheme, the number of quantum keys required to be consumed is large, so that the quantum key amount is insufficient, and the normal transmission requirements of all power services between the power distribution terminals cannot be met.
Disclosure of Invention
The embodiment of the invention aims to provide a communication encryption method and device for power distribution terminals, which can distribute different communication encryption strategies for power services with different priorities, adjust an encryption transmission process according to actual conditions and ensure that the residual key amount of a quantum key pool can meet the normal communication requirements between the power distribution terminals.
In order to achieve the above object, an embodiment of the present invention provides a communication encryption method for a power distribution terminal, including:
determining a communication encryption strategy of the power service according to the service priority of the power service to be transmitted between the power distribution terminals;
according to the communication encryption strategy, an original quantum key is obtained from a quantum key pool to encrypt and transmit the power service; the original quantum key is an unused quantum key generated by a quantum key pool;
calculating the net key generation rate of the quantum key pool in real time; the net key generation rate is the difference between the quantum key generation amount and the quantum key consumption amount of the quantum key pool in unit time;
when the net secret key generation rate is smaller than or equal to a preset rate threshold value, acquiring a recovery quantum secret key from a recovery secret key pool to carry out encryption transmission on a preset type of electric power service to be transmitted; wherein the recovered quantum key is generated from an original quantum key that has been used.
As an improvement of the above scheme, the higher the service priority of the power service is, the higher the encryption level and the key update frequency of the corresponding communication encryption strategy are; wherein the encryption level has a positive correlation with the quantum key amount used for transmitting the electric power service.
As an improvement of the above scheme, the preset type of power service is a power service with a service priority lower than a first preset level threshold.
As an improvement of the above scheme, the recovery quantum key is generated and stored by:
detecting whether the encryption transmission process of the power business is safe or not in the process of obtaining the original quantum key to carry out encryption transmission on the power business;
when the encryption transmission process is safe, acquiring a first quantum key in original quantum keys used in the encryption transmission process as the recovery quantum key, and storing the first quantum key in the recovery key pool; the first quantum key is obtained by dividing the used original quantum key through a preset segmentation algorithm.
As an improvement of the above scheme, in the process of obtaining the original quantum key to perform encryption transmission on the power service, detecting whether the encryption transmission process of the power service is safe specifically includes:
before the power business is encrypted and transmitted, dividing the obtained original quantum key into the first quantum key and the second quantum key by adopting the segmentation algorithm;
generating a detection tag from the first quantum key, the second quantum key, and the transmitted power traffic
Figure 886736DEST_PATH_IMAGE001
(ii) a Wherein k1 is a first quantum key, k2 is a second quantum key, x is service data of the transmitted power service,
Figure 965551DEST_PATH_IMAGE002
a preset hash function is adopted;
after the power service is encrypted and transmitted, whether a power distribution terminal serving as a receiving end receives service data within a preset waiting time is judged;
if yes, generating a verification label according to the received service data
Figure 276577DEST_PATH_IMAGE003
(ii) a Wherein, x' is the received service data;
when the detection tag and the verification tag are equal, judging that the encryption transmission process of the power service is safe, and when the detection tag and the verification tag are not equal, judging that the encryption transmission process of the power service is unsafe;
and if not, judging that the encryption transmission process of the power service is unsafe.
As an improvement of the above scheme, acquiring a recovery quantum key from a recovery key pool to perform encrypted transmission on a preset type of power service to be transmitted specifically includes:
randomly acquiring at least two recovery quantum keys in the recovery key pool;
and synthesizing the at least two recovered quantum keys by adopting a preset synthesis algorithm to obtain a combined quantum key, and encrypting and transmitting the preset type of power service to be transmitted by adopting the combined quantum key.
As an improvement of the above scheme, acquiring a recovery quantum key from a recovery key pool to perform encrypted transmission on a preset type of power service to be transmitted specifically includes:
randomly acquiring two recovered quantum keys in the recovered key pool as a first recovered quantum key and a second recovered quantum key;
and after the first recovery quantum key is adopted to encrypt the service data of the preset type of power service to be transmitted for the first time, the second recovery quantum key is adopted to encrypt the service data after the first encryption for the second time and transmit the service data.
As an improvement of the above solution, the recycled quantum key is generated according to an original quantum key that has been used in the encrypted transmission process of the power service with the service priority higher than the second preset level threshold.
As an improvement of the above solution, when the net key generation rate is less than or equal to the preset rate threshold, the method further includes:
and adjusting the communication encryption strategy of each power service by reducing the encryption grade and/or the key updating frequency of each power service.
An embodiment of the present invention further provides a communication encryption apparatus for a power distribution terminal, including:
the encryption strategy determining module is used for determining a communication encryption strategy of the power service according to the service priority of the power service to be transmitted between the power distribution terminals;
the first encryption transmission module is used for acquiring an original quantum key from a quantum key pool according to the communication encryption strategy to encrypt and transmit the power service; the original quantum key is an unused quantum key generated by a quantum key pool;
the net secret key generation rate calculation module is used for calculating the net secret key generation rate of the quantum secret key pool in real time; the net secret key generation rate is the difference between the quantum secret key generation amount and the quantum secret key consumption amount of the quantum secret key pool in unit time;
the second encryption transmission module is used for acquiring a recovery quantum key from a recovery key pool to carry out encryption transmission on the preset type of power service to be transmitted when the net key generation rate is less than or equal to a preset rate threshold; wherein the recovered quantum key is generated from the used original quantum key.
Compared with the prior art, the communication encryption method and device for the power distribution terminals disclosed by the invention have the advantages that different communication encryption strategies are distributed for power services with different service priorities among the power distribution terminals, the original quantum key is obtained from the quantum key pool for encryption transmission, the used original quantum key is recovered and stored in the encryption transmission process of the power services, meanwhile, the net key generation rate of the quantum key pool at the current moment is calculated in real time, when the net key generation rate is detected to be smaller than or equal to the preset rate threshold, the encryption transmission mode of the power services is adjusted, and the recovered quantum key is obtained from the recovery key pool for encryption transmission aiming at the preset type of power services to be transmitted.
By adopting the technical means of the embodiment of the invention, different communication encryption strategies are distributed to the electric power services with different service priorities, the consumed quantum key and the key updating frequency of the communication encryption strategy corresponding to the electric power service with low service priority are low, and the consumed quantum key and the key updating frequency of the communication encryption strategy corresponding to the electric power service with high service priority are high, so that the quantum key amount required to be consumed by the electric power service with low service priority in the encryption transmission process is reduced. On the basis, when the net secret key generation rate is detected to be too low, the encryption transmission process of part of the power business is adjusted to adopt the used quantum secret key for encryption, the use amount of the original quantum secret key can be further saved, more original quantum secret keys are reserved for the power business with high business priority, the net secret key generation rate of a quantum secret key pool is improved, the problem that the normal transmission requirements of all the power businesses between power distribution terminals cannot be met due to insufficient quantum secret key amount is avoided, and the normal transmission requirements and the transmission efficiency of the power businesses between the power distribution terminals are guaranteed.
Drawings
Fig. 1 is a schematic flowchart of a communication encryption method of a power distribution terminal according to a first implementation manner provided by an embodiment of the present invention;
FIG. 2 is a schematic flow chart of generating a recycled quantum key according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of the generation of a recycled quantum key in an embodiment of the invention;
fig. 4 is a schematic structural diagram of a communication encryption device of a power distribution terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, which is a schematic flow chart of a communication encryption method of a power distribution terminal in a first implementation manner according to an embodiment of the present invention, an embodiment of the present invention provides a communication encryption method of a power distribution terminal, which is applied to a power distribution network system and can be executed by a controller in a power distribution network, where the method specifically includes steps S11 to S14:
s11, determining a communication encryption strategy of the power service according to the service priority of the power service to be transmitted between the power distribution terminals;
s12, according to the communication encryption strategy, acquiring an original quantum key from a quantum key pool to encrypt and transmit the electric power service; the original quantum key is an unused quantum key generated by a quantum key pool;
s13, calculating the net key generation rate of the quantum key pool in real time; the net key generation rate is the difference between the quantum key generation amount and the quantum key consumption amount of the quantum key pool in unit time;
s14, when the net secret key generation rate is smaller than or equal to a preset rate threshold value, acquiring a recovery quantum secret key from a recovery secret key pool to carry out encryption transmission on the preset type of electric power service to be transmitted; wherein the recovered quantum key is generated from an original quantum key that has been used.
A plurality of power services are usually required to perform communication data transmission between different power distribution terminals in a power distribution network, and common power services include, for example, relay protection, safety and stability control, a dispatching data network, comprehensive transformer substation monitoring, dispatching telephone, distribution network automation, a communication intelligent management system, a customer contact system, a customer relationship management system, user power consumption information acquisition, a data center, a conference television system and other service scenarios. The embodiment of the invention encrypts the power business communication data between the terminals through the unique quantum key of the quantum security mobile medium of the power distribution terminal, thereby realizing the secure transmission of peer-to-peer communication data between terminals and facilitating the direct mutual authentication between the terminals. The quantum CPE power distribution terminal adopts polarization coding to realize quantum key distribution based on a decoy BB84 protocol, and provides a safe quantum key which cannot be decoded by calculation for both communication parties.
In the existing data communication field, a one-time pad scheme is generally adopted for data encryption transmission by using a quantum key, and the consumed quantum key amount is equal to the encrypted data amount, so that the quantum key consumption is large, and particularly, under the condition that the key updating frequency is high, the generation rate of the original quantum key in a quantum key distribution device (namely, a quantum key pool) cannot meet the normal encryption communication requirement easily. The embodiment of the invention improves the encryption transmission process of the power service between the power distribution terminals so as to ensure the normal transmission of the power service between the power distribution terminals.
Specifically, the power services to be transmitted between the power distribution terminals are divided into service priorities, and then different types of communication encryption strategies are allocated to the power services registered by different services according to the preset corresponding relationship between the service priorities and the communication encryption strategy types.
As an optional implementation, the dividing of the service priority of the power service that needs to be transmitted between the power distribution terminals specifically includes:
determining the service type of power service to be transmitted between power distribution terminals; the service types are obtained by dividing according to the importance and the time delay requirement of the power service; determining the service priority of the power service according to the service type of the power service; wherein the higher the importance and latency requirement of the power service, the higher the service priority.
As a preferred embodiment, the communication encryption policy includes an encryption level and a key update frequency, where the encryption level is in a positive correlation with the quantum key amount used for transmitting the power service, that is, the higher the encryption level is, the more quantum keys are used in the service transmission process, and the higher the encryption security is. The key updating frequency refers to the frequency of updating the quantum key in the service transmission process, and the larger the key updating frequency is, the higher the encryption security is.
In step S11, according to the service priority of the power service to be transmitted between the power distribution terminals, the communication encryption policy of the power service is determined, and the following requirements are met: the higher the service priority of the power service is, the higher the encryption level and the key updating frequency of the corresponding communication encryption strategy are.
And then, the power business to be transmitted between the power distribution terminals acquires the original quantum keys in corresponding quantity from the quantum key pool for encrypted transmission according to the correspondingly determined communication encryption strategy and the key updating frequency and the encryption grade of the power business.
Specifically, according to the communication encryption strategy, an original quantum key required for encrypting the power service is obtained from a quantum key pool and is used as a target quantum key;
and encrypting the service data of the power service by adopting the target quantum key to obtain encrypted service data so that the power distribution terminal serving as a sending end sends the encrypted service data to the power distribution terminal serving as a receiving end through a quantum transmission channel.
In a specific application scenario, as an example, the power service of the power distribution network is divided into three service types:
the power traffic belonging to the first traffic type includes: relay protection, safety and stability control, data network scheduling and comprehensive monitoring of a transformer substation;
the power traffic belonging to the second traffic type includes: dispatching telephone, distribution network automation, communication intelligent management system and customer contact system;
the power traffic belonging to the third traffic type includes: the system comprises a customer relationship management system, a user electricity utilization information acquisition system, a data center and a conference television system.
The power service of the first service type is a key for maintaining the stability of the power system, and the power service of the first service type is the safest and most-preferred transmission of the power service, the second service type is the second service type, and the third service type is the last service type. Each service type corresponds to a service priority, the first service type corresponds to a first service priority, the second service type corresponds to a second service priority, and the third service type corresponds to a third service priority, wherein the first service priority is higher than the second service priority, and the second service priority is higher than the third service priority.
Further, aiming at the three service priorities, three communication encryption strategies are correspondingly set respectively:
the first communication encryption strategy is: the one-time pad scheme, namely, the quantum key consumption is equal to the encrypted data, and the quantum key consumption and the key updating frequency under the encryption strategy are the maximum.
The second communication encryption strategy is: quantum keys are used instead of session keys. In this strategy, the AES-128 encryption algorithm is selected. The length of each service and the key used for each encryption is 128 bits. The key update frequency is f = B/D, where f is the quantum key update frequency, B is the data flow of a certain power traffic transmission within one second, and D represents the data transmission threshold, representing the maximum encrypted data length using a 128-bit quantum key. It can be seen that the quantum key length consumed by the power service with the length of Bt in the encryption transmission process is 128 Bt/D. The key is encrypted every 8-16 traffic, taking into account the reduction of key freshness and the potential security risk due to the data transmission threshold being too high. That is, the data transmission threshold ranges from 1 kbit to 2 kbit. The amount of quantum keys consumed under the encryption strategy and the frequency of key update are the second order.
The third communication encryption strategy is: a quantum key is used instead of the master key. In classical encryption, the way in which the master key generates the session key may be denoted as K S =PRF(K M N, S), wherein K S Is a session key, n is a random value negotiated by two sites, S is a non-random string preventing different plaintexts from selecting the same key, K M Is the master key, which may be recorded as 128 bits in length. The PRF is a pseudo-random function, usually replaced by a hash function, and the higher security SHA-256 is preferable. Therefore, the generated session key has a length of 256 bits. According to the proportion of the master key and the session key, when the master key is replaced, the key updating threshold and the quantum key updating frequency are respectively 2 times and 1/2 times of those when the session key is replaced. The quantum key consumed by traffic Bt is 64Bt/D. The quantum key amount consumed and the key updating frequency are minimum under the encryption strategy.
It should be noted that the above scenarios are only taken as examples, and in practical applications, the service priorities of different power services may be divided according to the practical application conditions of the power distribution network, and different communication encryption strategies are allocated to different service priorities, which does not affect the beneficial effects obtained by the present invention.
It should be particularly noted that, in the process of performing encryption transmission on the power service, the embodiment of the present invention further configures the controller to collect an original quantum key used in the encryption transmission process, so as to generate a recovered quantum key, and store the recovered quantum key in a preset recovered key pool as a backup.
Further, in the process of performing encrypted transmission on the power service, the controller calculates a net key generation rate of the quantum key pool in real time, specifically, step S13 is calculated through the following steps S131 to S133:
s131, acquiring the number of original quantum keys generated by the quantum key pool in unit time, and recording as the generated number X1, and the number of original quantum keys consumed by the quantum key pool in unit time, and recording as the consumed number X2;
s132, calculating the difference value between the generated quantity X1 and the consumed quantity X2;
s133, calculating the net key generation rate of the quantum key pool according to the difference and the unit time:
△R=(X1-X2)/t;
wherein, Δ R is the net secret key generation rate, t is the unit time, and the value can be set and adjusted according to actual conditions.
Optionally, the number X2 of the raw quantum keys consumed by the quantum key pool in the unit time is calculated according to the encryption transmission demand of all the power services of the power distribution network in the unit time. The consumption amount X2 satisfies the following calculation formula:
Figure 48224DEST_PATH_IMAGE004
wherein,
Figure 998863DEST_PATH_IMAGE005
and the total sub-key quantity consumed by the power service adopting the communication encryption strategy of the mth service priority is represented, wherein m is the quantity of the divided service priorities.
Taking the above three service priority power services as an example, the consumption quantity Q2 satisfies the following calculation formula:
Figure 881368DEST_PATH_IMAGE006
wherein,
Figure 296169DEST_PATH_IMAGE007
Figure 48837DEST_PATH_IMAGE008
and
Figure 549088DEST_PATH_IMAGE009
the amount of the raw quantum key, y, consumed by the ith power service using the communication encryption strategy of the first service priority, the jth power service using the communication encryption strategy of the second service priority and the kth power service using the communication encryption strategy of the third service priority 1 、y 2 、y 3 Representing the number of these three types of power traffic, respectively.
Under the normal condition of quantum key encryption, the number of the remaining keys in the key pool is required to fluctuate within a reasonable range, the rate of increasing and decreasing the number of the remaining original quantum keys in the quantum key pool depends on the net key generation rate Δ R, when the net key generation rate Δ R is positive, the number of the keys in the pool increases with time, otherwise, the number decreases. Therefore, the embodiment of the present invention sets the preset rate threshold R set To characterize the net key generation rate, said preset rate threshold R set Is greater than or equal to 0. Preferably, R set =0。
When the net secret key generation rate satisfies delta R ≦ R set In time, it is shown that the number of the original quantum keys generated in the current quantum key pool cannot meet the encryption transmission requirements of all to-be-transmitted power services of the current power distribution network, and therefore, the encryption transmission process needs to be adjusted.
Specifically, when the net secret key generation rate is less than or equal to a preset rate threshold, judging whether the preset type of power service exists in the current power service of the power distribution terminal; if yes, determining that the power service to be transmitted is a preset type of power service, and replacing to obtain a recovery quantum key from a recovery key pool for encrypted transmission according to a communication encryption strategy of the preset type of power service without consuming an original quantum key generated in the quantum key pool.
It can be understood that, for the power service which is not of the preset type, the generated original quantum key may still be obtained from the quantum key pool by using the original communication encryption strategy for encrypted transmission.
Preferably, the preset type of power service is a power service with a service priority lower than a first preset level threshold.
It should be noted that the first preset level threshold is preset, and a value thereof may be determined according to a division number of the service priority of the power service under an actual application condition, and is not specifically limited herein.
Taking the power service with the above three service priorities as an example, the first preset level threshold may be set to be 2, and for the power service with the first service priority and the second service level, when Δ R is less than or equal to R set In time, the generated original quantum key can still be obtained from the quantum key pool for encryption transmission; and for the power service with the third service priority, acquiring a recovery quantum key from the recovery key pool for encrypted transmission instead.
The embodiment of the invention provides a communication encryption method of a power distribution terminal, which is characterized in that different communication encryption strategies are distributed to power services with different service priorities among the power distribution terminals, an original quantum key is obtained from a quantum key pool for encryption transmission, the used original quantum key is recovered and stored in the encryption transmission process of the power services, meanwhile, the net key generation rate of the quantum key pool at the current moment is calculated in real time, when the net key generation rate is detected to be smaller than or equal to a preset rate threshold value, the encryption transmission mode of the power services is adjusted, and the recovered quantum key is obtained from the recovered quantum key pool for encryption transmission aiming at the preset type of power services to be transmitted. By adopting the technical means of the embodiment of the invention, different communication encryption strategies are distributed to the electric power services with different service priorities, the quantum key and the key updating frequency consumed by the communication encryption strategy corresponding to the electric power service with low service priority are low, and the quantum key and the key updating frequency consumed by the communication encryption strategy corresponding to the electric power service with high service priority are high, so that the quantum key amount consumed by the electric power service with low service priority in the encryption transmission process is reduced. On the basis, when the net secret key generation rate is detected to be too low, the encryption transmission process of part of the power business is adjusted to adopt the used quantum secret key for encryption, the use amount of the original quantum secret key can be further saved, more original quantum secret keys are reserved for the power business with high business priority, the net secret key generation rate of a quantum secret key pool is improved, the problem that the normal transmission requirements of all the power businesses between power distribution terminals cannot be met due to insufficient quantum secret key amount is avoided, and the normal transmission requirements and the transmission efficiency of the power businesses between the power distribution terminals are guaranteed.
As a preferred implementation manner, the embodiment of the present invention is further implemented on the basis of the previous embodiment, and referring to fig. 2, it is a schematic flow chart of generating the recovered quantum key in the embodiment of the present invention, and the recovered quantum key is generated and stored through the following steps S21 to S22:
s21, in the process of acquiring the original quantum key to carry out encryption transmission on the electric power service, detecting whether the encryption transmission process of the electric power service is safe or not;
s22, when the encryption transmission process is safe, acquiring a first quantum key in original quantum keys used in the encryption transmission process as the recovery quantum key, and storing the first quantum key in the recovery key pool; the first quantum key is obtained by dividing the used original quantum key through a preset segmentation algorithm.
In the embodiment of the present invention, in order to ensure the application security of the used original quantum cryptography in the subsequent service encryption process, security verification needs to be performed on the recovered original quantum cryptography. Specifically, in the process of performing encryption transmission on the power service of the power distribution network by using the original quantum key generated by the quantum key pool, the controller is further configured to detect security of the encryption transmission process, and when it is detected that the encryption transmission process is secure, recover the original quantum key used in the encryption transmission process, and more preferably recover a part of the quantum key (i.e., the first quantum key) in the used original quantum key. And when the encryption transmission process is detected to be unsafe, discarding the original quantum key used in the encryption transmission process without recycling.
By adopting the technical means of the embodiment of the invention, the used original quantum key is recovered after the encryption transmission safety is detected, the safety of the subsequent service encryption transmission process can be improved, and the keys used in any two encryption transmission processes are not completely the same by adopting the mode of recovering part of the quantum key, thereby further improving the safety of the encryption transmission process.
Preferably, referring to fig. 3, which is a schematic diagram illustrating a principle of generating a recovered quantum key in an embodiment of the present invention, step S21 is to detect whether an encryption transmission process of the power service is safe in the process of obtaining an original quantum key to encrypt and transmit the power service, and specifically includes steps S211 to S216:
s211, before the power service is encrypted and transmitted, dividing the obtained original quantum key into the first quantum key and the second quantum key by adopting the segmentation algorithm;
s212, generating a detection label according to the first quantum key, the second quantum key and the transmitted electric power service
Figure 969705DEST_PATH_IMAGE001
(ii) a Wherein k1 is a first quantum key, k2 is a second quantum key, x is service data of the transmitted power service,
Figure 442275DEST_PATH_IMAGE002
is a preset hash function;
s213, after the power service is encrypted and transmitted, whether the power distribution terminal serving as a receiving end receives service data within a preset waiting time is judged;
s214, if the power distribution terminal serving as a receiving end receives the service data within the preset waiting time, generating a verification label according to the received service data
Figure 368774DEST_PATH_IMAGE003
(ii) a Wherein x' is the received service data;
s215, when the detection tag and the verification tag are equal, judging that the encryption transmission process of the power service is safe, and when the detection tag and the verification tag are not equal, judging that the encryption transmission process of the power service is unsafe;
and S216, if the power distribution terminal serving as the receiving end does not receive the service data within the preset waiting time, judging that the encryption transmission process of the power service is unsafe.
In the embodiment of the present invention, the original quantum key shared between terminals (distribution terminal a as the transmitting end and distribution terminal B as the receiving end) is first divided into two parts k = k1 | k2, and they are used to generate one detection tag,
Figure 294004DEST_PATH_IMAGE001
for the encrypted traffic data x,
Figure 518312DEST_PATH_IMAGE002
denoted as AXU hash function. The distribution terminal A sends the character string x | t to the distribution terminal B on the transmission channel C, after a period of preset time, after judging whether the distribution terminal B receives the character string x '| t', if the character string is received, checking the verification label
Figure 579809DEST_PATH_IMAGE003
And if the detection tag is equal to the detection tag, the detection tag indicates that illegal monitoring is not detected and the transmission of the transmission channel C is safe, the detection tag receives and outputs the service data x' through an external interface, and immediately recovers the key k1 output by the power distribution terminal A. If they are not equal, the flow is transmittedThe transmission process of the decision is not safe if the symbol nor is erroneous. If the character string is not received after a predetermined time, an error symbol nor is also output, and the determined transmission process is unsafe.
It should be noted that the specific means of dividing the original quantum key k into the first quantum key k1 and the second quantum key k2 by using the preset segmentation algorithm is set according to the actual situation, and the beneficial effects obtained by the present invention are not affected.
By adopting the technical means of the embodiment of the invention, the original quantum key is divided into two parts, the detection tag and the verification tag are correspondingly and respectively generated before and after transmission by combining the service data of encrypted transmission, so that the judgment on whether the encrypted transmission process is safe is realized, the accuracy of encrypted safety detection is improved, and the usability of the recovered quantum key is ensured.
As a preferred implementation manner, the embodiment of the present invention is further implemented on the basis of any of the above-mentioned embodiments, and in order to further improve the security of encrypted transmission using the recovered quantum key, the embodiment of the present invention optimizes the process of encrypted transmission using the recovered quantum key in the recovered key pool to the power service.
In a preferred embodiment, in step S14, the obtaining a recycling quantum key from a recycling key pool performs encrypted transmission on a preset type of power service to be transmitted, specifically including steps S141a and S142a:
s141a, randomly acquiring at least two recovery quantum keys in the recovery key pool;
and S142a, synthesizing the at least two recovered quantum keys by adopting a preset synthesis algorithm to obtain a combined quantum key, and encrypting and transmitting the preset type of power service to be transmitted by adopting the combined quantum key.
In the embodiment of the invention, for the preset type of electric power service to be transmitted, at least two recovery quantum keys are randomly obtained from a recovery key pool, and are synthesized and then used for encrypting and transmitting the electric power service.
It should be noted that, the specific means for synthesizing at least two recovered quantum keys by using a preset synthesis algorithm is set according to actual conditions, which does not affect the beneficial effects obtained by the present invention.
By adopting the technical means of the embodiment of the invention, at least two recovered quantum keys are randomly obtained and synthesized into the combined quantum key, the combined quantum key is not from the original quantum key used in the previous encryption process of the same power service at a high probability, and the combined quantum key is adopted to encrypt and transmit the subsequent service, so that the encryption security can be further improved.
In another preferred embodiment, in step S14, the obtaining of the recycling quantum key from the recycling key pool performs encrypted transmission on a preset type of power service to be transmitted, specifically including steps S141b and S142b:
s141b, randomly acquiring two recovery quantum keys in the recovery key pool as a first recovery quantum key and a second recovery quantum key;
and S142b, after the first recovered quantum key is adopted to encrypt the service data of the preset type of power service to be transmitted for the first time, the second recovered quantum key is adopted to encrypt the service data after the first encryption for the second time and transmit the encrypted service data.
In the embodiment of the invention, for the preset type of electric power service to be transmitted, two recovery quantum keys are randomly obtained from a recovery key pool, one recovery quantum key is adopted to encrypt the service data to be transmitted for the first time, the encrypted data obtained after the encryption for the first time is subjected to secondary encryption by the other recovery quantum key to obtain secondary encrypted data, and the secondary encrypted data is transmitted to the power distribution terminal of the receiving end through a transmission channel by the power distribution terminal of the transmitting end.
It can be understood that, after receiving the secondary encrypted data, the power distribution terminal at the receiving end needs to perform primary decryption and then perform secondary decryption to obtain the service data.
According to the technical means of the embodiment of the invention, the business data is encrypted twice by randomly obtaining two recovered quantum keys, so that the encryption security can be further improved, and the condition that the transmitted business data is easy to eavesdrop due to the fact that the recovered quantum keys are used for encryption is avoided to a great extent.
As a preferred implementation manner, in order to further improve the security of encrypted transmission using the recovered quantum key, in an embodiment of the present invention, the recovered quantum key is generated according to an original quantum key that has been used in the encrypted transmission process by the power service with a service priority higher than the second preset level threshold.
It should be noted that the second preset level threshold is preset, and the value thereof may be determined according to the number of divisions of the service priority of the power service under the actual application condition, and is not specifically limited herein.
Taking the above three service priority power services as an example, the second preset level threshold may be set to be 2, that is, only the original quantum key used in the encryption transmission process of the power service with the first service priority is recovered, and the original quantum key used in the encryption transmission process of the power service with the second and third service priorities is discarded.
Optionally, with reference to the foregoing embodiment, the power service with a service priority higher than the second preset level threshold (e.g., the power service with the first service priority) is recycled from the original quantum key that has been used in the encryption transmission process, so as to generate a recycled quantum key, and when it is detected that the net key generation rate of the quantum key pool is less than or equal to the preset rate threshold, the recycled quantum key is obtained from the recycled quantum key pool, so as to perform encryption transmission on the power service to be transmitted (e.g., the power service with the third service priority) with a service priority lower than the first preset level threshold.
As a preferred implementation manner, the embodiment of the present invention further implements the method on the basis of any of the above embodiments, and further includes step S15:
and S15, when the net secret key generation rate is smaller than or equal to the preset rate threshold, adjusting the communication encryption strategy of each electric power service by reducing the encryption level and/or the secret key updating frequency of each electric power service.
Specifically, step S15 includes:
s151, acquiring the power service of which the service priority is greater than a third preset grade threshold in the power service to be transmitted currently, and taking the power service as a first type of adjustment power service; acquiring the power service of which the service priority is less than or equal to the third preset level threshold in the current power service to be transmitted, and taking the power service as a second type of adjustment power service;
s152, executing a first adjusting operation; the first adjusting operation comprises: resetting the key updating frequency of the first type of adjustment power service, reducing the encryption level of the first type of adjustment power service by at least one level value, and reducing the key updating frequency of the second type of adjustment power service by at least one frequency adjustment step length;
s153, judging whether the current condition of successful adjustment is met or not through a first preset time length; wherein, the condition of successful adjustment is as follows: the net secret key generation rate is greater than a second preset rate threshold value R set ', or the remaining quantum keys in the quantum key pool are larger than a preset key amount threshold; wherein the second preset rate threshold R set ' greater than the preset rate threshold R set
S154, if the conditions of successful adjustment are met, resetting the communication encryption strategy of each power business;
s155, if the condition for successful adjustment is not met, performing a second adjustment operation, where the second adjustment operation includes: reducing the key updating frequency of the first type of adjustment power service by at least one frequency adjustment step length, resetting the key updating frequency of the second type of adjustment power service, and reducing the encryption level of the second type of adjustment power service by at least one level value;
s156, judging whether the current condition of successful adjustment is met or not through a second preset time length;
s157, if the condition of successful adjustment is met, resetting the communication encryption strategy of each power service;
and S158, if the condition of successful adjustment is not met, returning to the step S151 to re-execute the first adjustment operation.
By adopting the technical means of the embodiment of the invention, when the net secret key generation rate is detected to be less than or equal to the preset rate threshold, the quantum secret key recovery mechanism is started, and the encryption grade and/or the secret key updating frequency of the electric power service are/is adjusted, so that the residual quantity of the original quantum secret keys in the quantum secret key pool is increased rapidly, the net secret key generation rate is increased, and the normal transmission requirement and the transmission efficiency of the electric power service between the power distribution terminals are ensured.
Referring to fig. 4, which is a schematic structural diagram of a communication encryption device of a power distribution terminal according to an embodiment of the present invention, an embodiment of the present invention further provides a communication encryption device 30 of a power distribution terminal, including:
the encryption strategy determining module 31 is configured to determine a communication encryption strategy of a power service to be transmitted between power distribution terminals according to a service priority of the power service;
the first encryption transmission module 32 is configured to obtain an original quantum key from a quantum key pool according to the communication encryption policy to perform encryption transmission on the power service; the original quantum key is an unused quantum key generated by a quantum key pool;
a net key generation rate calculation module 33, configured to calculate a net key generation rate of the quantum key pool in real time; the net key generation rate is the difference between the quantum key generation amount and the quantum key consumption amount of the quantum key pool in unit time;
the second encryption transmission module 34 is configured to, when the net secret key generation rate is less than or equal to a preset rate threshold, obtain a recovery quantum secret key from a recovery secret key pool to encrypt and transmit a preset type of power service to be transmitted; wherein the recovered quantum key is generated from the used original quantum key.
By adopting the technical means of the embodiment of the invention, different communication encryption strategies are distributed to the electric power services with different service priorities, the quantum keys and the key updating frequencies consumed by the different communication encryption strategies are different, the quantum key amount required to be consumed by the electric power services with low service priorities in the encryption transmission process is reduced, and compared with the scheme that all the electric power services adopt one-time pad, the embodiment of the invention can effectively solve the problem that the normal transmission requirements of all the electric power services cannot be met due to the low rate of quantum key generation of the quantum key pool. On the basis, when the net secret key generation rate is detected to be too low, the encryption transmission process of part of the power business is adjusted to adopt the used quantum secret key for encryption, the use amount of the original quantum secret key can be further saved, more original quantum secret keys are reserved for the power business with high business priority, the net secret key generation rate of a quantum secret key pool is improved, the problem that the normal transmission requirements of all the power businesses between power distribution terminals cannot be met due to insufficient quantum secret key amount is avoided, and the normal transmission requirements and the transmission efficiency of the power businesses between the power distribution terminals are guaranteed.
It should be noted that, the communication encryption device for a power distribution terminal according to the embodiment of the present invention is configured to execute all the process steps of the communication encryption method for a power distribution terminal according to any one of the embodiments, and working principles and beneficial effects of the two are in one-to-one correspondence, so that details are not repeated.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), or the like.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention.

Claims (10)

1. A communication encryption method for a power distribution terminal is characterized by comprising the following steps:
determining a communication encryption strategy of the power service according to the service priority of the power service to be transmitted between the power distribution terminals;
according to the communication encryption strategy, an original quantum key is obtained from a quantum key pool to encrypt and transmit the power service; the original quantum key is an unused quantum key generated by a quantum key pool;
calculating the net key generation rate of the quantum key pool in real time; the net key generation rate is the difference between the quantum key generation amount and the quantum key consumption amount of the quantum key pool in unit time;
when the net secret key generation rate is smaller than or equal to a preset rate threshold value, acquiring a recovery quantum secret key from a recovery secret key pool to carry out encryption transmission on a preset type of electric power service to be transmitted; wherein the recovered quantum key is generated from the used original quantum key.
2. The communication encryption method for the power distribution terminal according to claim 1, wherein the higher the service priority of the power service is, the higher the encryption level and the key update frequency of the corresponding communication encryption policy are; wherein the encryption level has a positive correlation with the quantum key amount used for transmitting the power service.
3. The communication encryption method for the power distribution terminal according to claim 2, wherein the predetermined type of power traffic is power traffic having a traffic priority lower than a first predetermined level threshold.
4. The communication encryption method for the power distribution terminal according to claim 1, wherein the recycling quantum key is generated and stored by:
detecting whether the encryption transmission process of the power business is safe or not in the process of obtaining the original quantum key to carry out encryption transmission on the power business;
when the encryption transmission process is safe, acquiring a first quantum key in original quantum keys used in the encryption transmission process as the recovery quantum key, and storing the first quantum key in the recovery key pool; the first quantum key is obtained by dividing the used original quantum key through a preset segmentation algorithm.
5. The communication encryption method for the power distribution terminal according to claim 4, wherein in the process of obtaining the original quantum key to encrypt and transmit the power service, whether the encryption transmission process of the power service is safe is detected, specifically:
before the power business is encrypted and transmitted, dividing the obtained original quantum key into the first quantum key and the second quantum key by adopting the segmentation algorithm;
generating a detection tag from the first quantum key, the second quantum key, and the transmitted power traffic
Figure 416802DEST_PATH_IMAGE001
(ii) a Wherein k1 is a first quantum key, k2 is a second quantum key, x is service data of the transmitted power service,
Figure 60273DEST_PATH_IMAGE002
is a preset hash function;
after the power service is encrypted and transmitted, whether a power distribution terminal serving as a receiving end receives service data within a preset waiting time is judged;
if yes, generating a verification label according to the received service data
Figure 205559DEST_PATH_IMAGE003
(ii) a Wherein x' is the received service data;
when the detection tag and the verification tag are equal, judging that the encryption transmission process of the power service is safe, and when the detection tag and the verification tag are not equal, judging that the encryption transmission process of the power service is unsafe;
and if not, judging that the encryption transmission process of the power service is unsafe.
6. The communication encryption method for the power distribution terminal according to claim 1, wherein the obtaining the recycling quantum key from the recycling key pool encrypts and transmits a preset type of power service to be transmitted, and specifically includes:
randomly acquiring at least two recovery quantum keys in the recovery key pool;
and synthesizing the at least two recovered quantum keys by adopting a preset synthesis algorithm to obtain a combined quantum key, and encrypting and transmitting the preset type of power service to be transmitted by adopting the combined quantum key.
7. The communication encryption method for the power distribution terminal according to claim 4, wherein the obtaining of the recycling quantum key from the recycling key pool performs encrypted transmission on a preset type of power service to be transmitted, and specifically includes:
randomly acquiring two recovered quantum keys in the recovered key pool as a first recovered quantum key and a second recovered quantum key;
and after the first recovery quantum key is adopted to encrypt the service data of the preset type of power service to be transmitted for the first time, the second recovery quantum key is adopted to encrypt the service data after the first encryption for the second time and transmit the service data.
8. The communication encryption method for the power distribution terminal according to claim 3, wherein the recovered quantum key is generated according to an original quantum key that has been used in the encryption transmission process by the power service with the service priority higher than the second preset level threshold.
9. The communication encryption method for the power distribution terminal according to claim 2, wherein when the net key generation rate is equal to or less than the preset rate threshold, the method further comprises:
and adjusting the communication encryption strategy of each power service by reducing the encryption grade and/or the key updating frequency of each power service.
10. A communication encryption apparatus for a power distribution terminal, comprising:
the encryption strategy determining module is used for determining a communication encryption strategy of the power service according to the service priority of the power service to be transmitted between the power distribution terminals;
the first encryption transmission module is used for acquiring an original quantum key from a quantum key pool according to the communication encryption strategy to encrypt and transmit the power service; the original quantum key is an unused quantum key generated by a quantum key pool;
the net key generation rate calculation module is used for calculating the net key generation rate of the quantum key pool in real time; the net key generation rate is the difference between the quantum key generation amount and the quantum key consumption amount of the quantum key pool in unit time;
the second encryption transmission module is used for acquiring a recovery quantum key from a recovery key pool to carry out encryption transmission on the preset type of power service to be transmitted when the net key generation rate is less than or equal to a preset rate threshold; wherein the recovered quantum key is generated from the used original quantum key.
CN202310000639.9A 2023-01-03 2023-01-03 Communication encryption method and device for power distribution terminal Active CN115694815B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310000639.9A CN115694815B (en) 2023-01-03 2023-01-03 Communication encryption method and device for power distribution terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310000639.9A CN115694815B (en) 2023-01-03 2023-01-03 Communication encryption method and device for power distribution terminal

Publications (2)

Publication Number Publication Date
CN115694815A true CN115694815A (en) 2023-02-03
CN115694815B CN115694815B (en) 2023-03-28

Family

ID=85057153

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310000639.9A Active CN115694815B (en) 2023-01-03 2023-01-03 Communication encryption method and device for power distribution terminal

Country Status (1)

Country Link
CN (1) CN115694815B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116318689A (en) * 2023-05-25 2023-06-23 天津市城市规划设计研究总院有限公司 Method and system for improving information transmission safety of Internet of things equipment by utilizing quantum key
CN118214164A (en) * 2024-04-11 2024-06-18 湖北兴盛通电气设备有限公司 Preassembled transformer substation management system and method
CN118555142A (en) * 2024-07-29 2024-08-27 成都凌亚科技有限公司 Multi-interface data processing method and system based on FPGA

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170324550A1 (en) * 2016-05-06 2017-11-09 Alibaba Group Holding Limited System and method for encryption and decryption based on quantum key distribution
CN107508671A (en) * 2017-08-18 2017-12-22 北京邮电大学 Service communication method and device based on quantum key distribution
CN108134669A (en) * 2018-01-11 2018-06-08 北京国电通网络技术有限公司 Towards the quantum key dynamic supply method of power scheduling business and management system
CN110048833A (en) * 2019-03-04 2019-07-23 全球能源互联网研究院有限公司 Power business encryption method and device based on quantum satellite key network
CN113765660A (en) * 2021-09-06 2021-12-07 东南大学 Method for distributing quantum keys of terminal equipment of Internet of things on demand
CN114499842A (en) * 2021-12-31 2022-05-13 华南师范大学 QKD network key resource pre-allocation method based on reinforcement learning
CN115314270A (en) * 2022-07-29 2022-11-08 国网浙江省电力有限公司宁波供电公司 Power business hierarchical encryption method and communication method based on quantum key

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170324550A1 (en) * 2016-05-06 2017-11-09 Alibaba Group Holding Limited System and method for encryption and decryption based on quantum key distribution
CN107508671A (en) * 2017-08-18 2017-12-22 北京邮电大学 Service communication method and device based on quantum key distribution
CN108134669A (en) * 2018-01-11 2018-06-08 北京国电通网络技术有限公司 Towards the quantum key dynamic supply method of power scheduling business and management system
CN110048833A (en) * 2019-03-04 2019-07-23 全球能源互联网研究院有限公司 Power business encryption method and device based on quantum satellite key network
CN113765660A (en) * 2021-09-06 2021-12-07 东南大学 Method for distributing quantum keys of terminal equipment of Internet of things on demand
CN114499842A (en) * 2021-12-31 2022-05-13 华南师范大学 QKD network key resource pre-allocation method based on reinforcement learning
CN115314270A (en) * 2022-07-29 2022-11-08 国网浙江省电力有限公司宁波供电公司 Power business hierarchical encryption method and communication method based on quantum key

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李恕海;王育民;: "四维Hilbert空间上的量子密钥分配协议" *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116318689A (en) * 2023-05-25 2023-06-23 天津市城市规划设计研究总院有限公司 Method and system for improving information transmission safety of Internet of things equipment by utilizing quantum key
CN118214164A (en) * 2024-04-11 2024-06-18 湖北兴盛通电气设备有限公司 Preassembled transformer substation management system and method
CN118555142A (en) * 2024-07-29 2024-08-27 成都凌亚科技有限公司 Multi-interface data processing method and system based on FPGA

Also Published As

Publication number Publication date
CN115694815B (en) 2023-03-28

Similar Documents

Publication Publication Date Title
CN115694815B (en) Communication encryption method and device for power distribution terminal
US9032208B2 (en) Communication terminal, communication system, communication method and communication program
US20130142328A1 (en) Encryption device, encryption system, encryption method, and encryption program
US10412063B1 (en) End-to-end double-ratchet encryption with epoch key exchange
CN110086616B (en) Forward one-time pad secret communication method based on wireless channel
CN113094743B (en) Power grid data storage method based on improved Byzantine consensus algorithm
CN112422276B (en) Method and system for realizing multi-party key agreement
CN113630248A (en) Session key negotiation method
CN110430571A (en) A kind of face recognition device and implementation method based on 5G framework
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN115567201A (en) Adaptive terminal quantum encryption and decryption method and system thereof
CN101552666B (en) Real time media stream encryption transmission method
CN115277094A (en) Block chain-based communication method, terminal, system and storage medium
CN112861164A (en) Encryption method, decryption method, data processing method, terminal and encryption machine
CN114386049A (en) Encryption method, decryption method, device and equipment
CN116866052A (en) Efficient block chain hidden communication method based on address coding
CN112039663A (en) Data transmission method and system
JP2011002810A (en) Encryption device, program, encryption system, and encryption method
CN113328993B (en) Data security transmission method and system combining multimode communication and Aont transformation
CN115694922A (en) File transmission encryption method and equipment under domestic CPU and OS
CN112423295A (en) Lightweight security authentication method and system based on block chain technology
CN111431721A (en) IBE-based Internet of things equipment encryption method in intelligent medical environment
CN107087000A (en) A kind of substation secondary shares the security processing of information
CN118019000B (en) High-security mobile phone communication system based on dynamic token link encryption
CN116866902B (en) Data protection method based on interactive data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant