Abstract
The greatly improvement of electric power automation is making electric power system increasingly depend on the information networks to ensure its safety, reliable and efficient operation. This paper introduces the general situation of electric power system and power information network system in nowadays. Finally, two typical encryption algorithms DES and RSA are analyzed and compared, and software program based on QT is used to prove the principle of the encryption algorithms. This paper also has some reference value for the research on security of electric power telecommunication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chen, Y.-J., Zhang, H.-F., Dang, Q.: Design and Application of Electronic Official Document Security Transmission Platform for Power Grid. Electric Power Information Technology (11), 75–79 (2011)
Hu, Y., Dong, M., Han, Y.: Consideration of Information Security for Electric Power Industry. Automation of Electric Power Systems 7, 1–4 (2002)
Xin, Y.: Development Trend of Power System Dispatching Automation Technology in 21st Century. Power System Technology 25(12), 1–10 (2001)
Yang, L.-L.: Technique of Mixed Cryptography and its Application in Network and Communication Security. Computer Knowledge and Technology (5), 1077–1078 (2009)
Rabah, K.: Data Security and Cryptographic Techniques-A Review. Information Technology Journal 3(1), 106–132 (2004)
Lei, S.: Security Communication of Real-Time Data in Power Information System. Electronic Design Engineering. Huazhong University of Science and Technology, 10–30 (2005)
You, C.: The Research of Information Security in Power Communication. Computer & Telecommunication (9), 55–57 (2009)
Wang, Y., Xin, Y., Xiang, L., et al.: Security and Protection of Dispatching Automation Systems and Digital Networks. Automation of Electric Power Systems 25(21), 5–8 (2001)
Baumeister, T.: Literature Review on Smart Grid Cyber Security. University of Hawaii, America (2010)
Feng, D.-G., Wang, X.-Y.: Progress and prospect of some fundamental research on information security in china. J. Comput. Sci. & Technol 21(5), 740–755 (2006)
Xia, Y.-B., Zhang, L.-L.: Research on One-Time Pad Cryptographic Scheme Based on DES and RSA. Jiangxi Electric Power (06), 38–40 (2011)
Xiao, G., Bai, E., Liu, X.: Some New Developments on the Cryptanalysis of AES. Acta Electronica Sinica 31(10), 1549–1553
Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309–318. Springer, Heidelberg (2001)
Feng, H.-J., Ma, H., Yang, B.: New Traitor Tracing Scheme Based on RSA. Application Research of Computers 24(5), 135–136 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ran, F., Huang, H., Ma, J., Xu, M. (2012). Analysis of Information Encryption on Electric Communication Network. In: Xiao, T., Zhang, L., Fei, M. (eds) AsiaSim 2012. AsiaSim 2012. Communications in Computer and Information Science, vol 324. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34390-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-34390-2_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34389-6
Online ISBN: 978-3-642-34390-2
eBook Packages: Computer ScienceComputer Science (R0)