SCADA file encryption method based on AES algorithm
The invention discloses an SCADA file encryption method based on an AES algorithm. The method includes the steps that S01, an improved AES encryption and decryption algorithm is achieved; S02, modules are selected according to file processing modes; S03, the length of a secret key K and the secret k...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | LUO CUN LI FANG LIU ZHICHAO BAO DEMEI YUE YIYANG CHU HONGJIAN LI YOUWEN |
description | The invention discloses an SCADA file encryption method based on an AES algorithm. The method includes the steps that S01, an improved AES encryption and decryption algorithm is achieved; S02, modules are selected according to file processing modes; S03, the length of a secret key K and the secret key are input; S04, an expansion secret key is generated; S05, an encryption/decryption file is established; S06, 16 bytes are taken out from the file waiting to be encrypted/decrypted, and the taken-out data are stored in an intermediate variable; S07, the data in the intermediate variable are encrypted/decrypted according to the length of the secrete key, and the encrypted/decrypted data are stored in the intermediate variable; S08, if the file waiting to be encrypted/decrypted is encrypted/decrypted, the file is closed, and the second step is executed, or else the sixth step is executed. According to the SCADA file encryption method, encryption and decryption linear attack resistance and differential attack resistance are improved, fewer hardware resources are occupied, and the method is particularly suitable for upgrading original equipment without modifying hardware design. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN104320420A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN104320420A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN104320420A3</originalsourceid><addsrcrecordid>eNrjZDAOdnZ0cVRIy8xJVUjNSy6qLCjJzM9TyE0tychPUUhKLE5NUQDyHV2DFRJz0vOLMksycnkYWNMSc4pTeaE0N4Oim2uIs4duakF-fGpxQWJyal5qSbyzn6GBibGRgYmRgaMxMWoAawsrHg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SCADA file encryption method based on AES algorithm</title><source>esp@cenet</source><creator>LUO CUN ; LI FANG ; LIU ZHICHAO ; BAO DEMEI ; YUE YIYANG ; CHU HONGJIAN ; LI YOUWEN</creator><creatorcontrib>LUO CUN ; LI FANG ; LIU ZHICHAO ; BAO DEMEI ; YUE YIYANG ; CHU HONGJIAN ; LI YOUWEN</creatorcontrib><description>The invention discloses an SCADA file encryption method based on an AES algorithm. The method includes the steps that S01, an improved AES encryption and decryption algorithm is achieved; S02, modules are selected according to file processing modes; S03, the length of a secret key K and the secret key are input; S04, an expansion secret key is generated; S05, an encryption/decryption file is established; S06, 16 bytes are taken out from the file waiting to be encrypted/decrypted, and the taken-out data are stored in an intermediate variable; S07, the data in the intermediate variable are encrypted/decrypted according to the length of the secrete key, and the encrypted/decrypted data are stored in the intermediate variable; S08, if the file waiting to be encrypted/decrypted is encrypted/decrypted, the file is closed, and the second step is executed, or else the sixth step is executed. According to the SCADA file encryption method, encryption and decryption linear attack resistance and differential attack resistance are improved, fewer hardware resources are occupied, and the method is particularly suitable for upgrading original equipment without modifying hardware design.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20150128&DB=EPODOC&CC=CN&NR=104320420A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20150128&DB=EPODOC&CC=CN&NR=104320420A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>LUO CUN</creatorcontrib><creatorcontrib>LI FANG</creatorcontrib><creatorcontrib>LIU ZHICHAO</creatorcontrib><creatorcontrib>BAO DEMEI</creatorcontrib><creatorcontrib>YUE YIYANG</creatorcontrib><creatorcontrib>CHU HONGJIAN</creatorcontrib><creatorcontrib>LI YOUWEN</creatorcontrib><title>SCADA file encryption method based on AES algorithm</title><description>The invention discloses an SCADA file encryption method based on an AES algorithm. The method includes the steps that S01, an improved AES encryption and decryption algorithm is achieved; S02, modules are selected according to file processing modes; S03, the length of a secret key K and the secret key are input; S04, an expansion secret key is generated; S05, an encryption/decryption file is established; S06, 16 bytes are taken out from the file waiting to be encrypted/decrypted, and the taken-out data are stored in an intermediate variable; S07, the data in the intermediate variable are encrypted/decrypted according to the length of the secrete key, and the encrypted/decrypted data are stored in the intermediate variable; S08, if the file waiting to be encrypted/decrypted is encrypted/decrypted, the file is closed, and the second step is executed, or else the sixth step is executed. According to the SCADA file encryption method, encryption and decryption linear attack resistance and differential attack resistance are improved, fewer hardware resources are occupied, and the method is particularly suitable for upgrading original equipment without modifying hardware design.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDAOdnZ0cVRIy8xJVUjNSy6qLCjJzM9TyE0tychPUUhKLE5NUQDyHV2DFRJz0vOLMksycnkYWNMSc4pTeaE0N4Oim2uIs4duakF-fGpxQWJyal5qSbyzn6GBibGRgYmRgaMxMWoAawsrHg</recordid><startdate>20150128</startdate><enddate>20150128</enddate><creator>LUO CUN</creator><creator>LI FANG</creator><creator>LIU ZHICHAO</creator><creator>BAO DEMEI</creator><creator>YUE YIYANG</creator><creator>CHU HONGJIAN</creator><creator>LI YOUWEN</creator><scope>EVB</scope></search><sort><creationdate>20150128</creationdate><title>SCADA file encryption method based on AES algorithm</title><author>LUO CUN ; LI FANG ; LIU ZHICHAO ; BAO DEMEI ; YUE YIYANG ; CHU HONGJIAN ; LI YOUWEN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN104320420A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>LUO CUN</creatorcontrib><creatorcontrib>LI FANG</creatorcontrib><creatorcontrib>LIU ZHICHAO</creatorcontrib><creatorcontrib>BAO DEMEI</creatorcontrib><creatorcontrib>YUE YIYANG</creatorcontrib><creatorcontrib>CHU HONGJIAN</creatorcontrib><creatorcontrib>LI YOUWEN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LUO CUN</au><au>LI FANG</au><au>LIU ZHICHAO</au><au>BAO DEMEI</au><au>YUE YIYANG</au><au>CHU HONGJIAN</au><au>LI YOUWEN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SCADA file encryption method based on AES algorithm</title><date>2015-01-28</date><risdate>2015</risdate><abstract>The invention discloses an SCADA file encryption method based on an AES algorithm. The method includes the steps that S01, an improved AES encryption and decryption algorithm is achieved; S02, modules are selected according to file processing modes; S03, the length of a secret key K and the secret key are input; S04, an expansion secret key is generated; S05, an encryption/decryption file is established; S06, 16 bytes are taken out from the file waiting to be encrypted/decrypted, and the taken-out data are stored in an intermediate variable; S07, the data in the intermediate variable are encrypted/decrypted according to the length of the secrete key, and the encrypted/decrypted data are stored in the intermediate variable; S08, if the file waiting to be encrypted/decrypted is encrypted/decrypted, the file is closed, and the second step is executed, or else the sixth step is executed. According to the SCADA file encryption method, encryption and decryption linear attack resistance and differential attack resistance are improved, fewer hardware resources are occupied, and the method is particularly suitable for upgrading original equipment without modifying hardware design.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_CN104320420A |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | SCADA file encryption method based on AES algorithm |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T06%3A04%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=LUO%20CUN&rft.date=2015-01-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN104320420A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |