Skip to main content

Analysis of Information Encryption on Electric Communication Network

  • Conference paper
AsiaSim 2012 (AsiaSim 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 324))

Included in the following conference series:

Abstract

The greatly improvement of electric power automation is making electric power system increasingly depend on the information networks to ensure its safety, reliable and efficient operation. This paper introduces the general situation of electric power system and power information network system in nowadays. Finally, two typical encryption algorithms DES and RSA are analyzed and compared, and software program based on QT is used to prove the principle of the encryption algorithms. This paper also has some reference value for the research on security of electric power telecommunication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, Y.-J., Zhang, H.-F., Dang, Q.: Design and Application of Electronic Official Document Security Transmission Platform for Power Grid. Electric Power Information Technology (11), 75–79 (2011)

    Google Scholar 

  2. Hu, Y., Dong, M., Han, Y.: Consideration of Information Security for Electric Power Industry. Automation of Electric Power Systems 7, 1–4 (2002)

    Google Scholar 

  3. Xin, Y.: Development Trend of Power System Dispatching Automation Technology in 21st Century. Power System Technology 25(12), 1–10 (2001)

    Google Scholar 

  4. Yang, L.-L.: Technique of Mixed Cryptography and its Application in Network and Communication Security. Computer Knowledge and Technology (5), 1077–1078 (2009)

    Google Scholar 

  5. Rabah, K.: Data Security and Cryptographic Techniques-A Review. Information Technology Journal 3(1), 106–132 (2004)

    Article  MathSciNet  Google Scholar 

  6. Lei, S.: Security Communication of Real-Time Data in Power Information System. Electronic Design Engineering. Huazhong University of Science and Technology, 10–30 (2005)

    Google Scholar 

  7. You, C.: The Research of Information Security in Power Communication. Computer & Telecommunication (9), 55–57 (2009)

    Google Scholar 

  8. Wang, Y., Xin, Y., Xiang, L., et al.: Security and Protection of Dispatching Automation Systems and Digital Networks. Automation of Electric Power Systems 25(21), 5–8 (2001)

    Google Scholar 

  9. Baumeister, T.: Literature Review on Smart Grid Cyber Security. University of Hawaii, America (2010)

    Google Scholar 

  10. Feng, D.-G., Wang, X.-Y.: Progress and prospect of some fundamental research on information security in china. J. Comput. Sci. & Technol 21(5), 740–755 (2006)

    Article  Google Scholar 

  11. Xia, Y.-B., Zhang, L.-L.: Research on One-Time Pad Cryptographic Scheme Based on DES and RSA. Jiangxi Electric Power (06), 38–40 (2011)

    Google Scholar 

  12. Xiao, G., Bai, E., Liu, X.: Some New Developments on the Cryptanalysis of AES. Acta Electronica Sinica 31(10), 1549–1553

    Google Scholar 

  13. Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309–318. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  14. Feng, H.-J., Ma, H., Yang, B.: New Traitor Tracing Scheme Based on RSA. Application Research of Computers 24(5), 135–136 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ran, F., Huang, H., Ma, J., Xu, M. (2012). Analysis of Information Encryption on Electric Communication Network. In: Xiao, T., Zhang, L., Fei, M. (eds) AsiaSim 2012. AsiaSim 2012. Communications in Computer and Information Science, vol 324. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34390-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34390-2_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34389-6

  • Online ISBN: 978-3-642-34390-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics