SCADA file encryption method based on AES algorithm

The invention discloses an SCADA file encryption method based on an AES algorithm. The method includes the steps that S01, an improved AES encryption and decryption algorithm is achieved; S02, modules are selected according to file processing modes; S03, the length of a secret key K and the secret k...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: LUO CUN, LI FANG, LIU ZHICHAO, BAO DEMEI, YUE YIYANG, CHU HONGJIAN, LI YOUWEN
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator LUO CUN
LI FANG
LIU ZHICHAO
BAO DEMEI
YUE YIYANG
CHU HONGJIAN
LI YOUWEN
description The invention discloses an SCADA file encryption method based on an AES algorithm. The method includes the steps that S01, an improved AES encryption and decryption algorithm is achieved; S02, modules are selected according to file processing modes; S03, the length of a secret key K and the secret key are input; S04, an expansion secret key is generated; S05, an encryption/decryption file is established; S06, 16 bytes are taken out from the file waiting to be encrypted/decrypted, and the taken-out data are stored in an intermediate variable; S07, the data in the intermediate variable are encrypted/decrypted according to the length of the secrete key, and the encrypted/decrypted data are stored in the intermediate variable; S08, if the file waiting to be encrypted/decrypted is encrypted/decrypted, the file is closed, and the second step is executed, or else the sixth step is executed. According to the SCADA file encryption method, encryption and decryption linear attack resistance and differential attack resistance are improved, fewer hardware resources are occupied, and the method is particularly suitable for upgrading original equipment without modifying hardware design.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN104320420A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN104320420A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN104320420A3</originalsourceid><addsrcrecordid>eNrjZDAOdnZ0cVRIy8xJVUjNSy6qLCjJzM9TyE0tychPUUhKLE5NUQDyHV2DFRJz0vOLMksycnkYWNMSc4pTeaE0N4Oim2uIs4duakF-fGpxQWJyal5qSbyzn6GBibGRgYmRgaMxMWoAawsrHg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SCADA file encryption method based on AES algorithm</title><source>esp@cenet</source><creator>LUO CUN ; LI FANG ; LIU ZHICHAO ; BAO DEMEI ; YUE YIYANG ; CHU HONGJIAN ; LI YOUWEN</creator><creatorcontrib>LUO CUN ; LI FANG ; LIU ZHICHAO ; BAO DEMEI ; YUE YIYANG ; CHU HONGJIAN ; LI YOUWEN</creatorcontrib><description>The invention discloses an SCADA file encryption method based on an AES algorithm. The method includes the steps that S01, an improved AES encryption and decryption algorithm is achieved; S02, modules are selected according to file processing modes; S03, the length of a secret key K and the secret key are input; S04, an expansion secret key is generated; S05, an encryption/decryption file is established; S06, 16 bytes are taken out from the file waiting to be encrypted/decrypted, and the taken-out data are stored in an intermediate variable; S07, the data in the intermediate variable are encrypted/decrypted according to the length of the secrete key, and the encrypted/decrypted data are stored in the intermediate variable; S08, if the file waiting to be encrypted/decrypted is encrypted/decrypted, the file is closed, and the second step is executed, or else the sixth step is executed. According to the SCADA file encryption method, encryption and decryption linear attack resistance and differential attack resistance are improved, fewer hardware resources are occupied, and the method is particularly suitable for upgrading original equipment without modifying hardware design.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150128&amp;DB=EPODOC&amp;CC=CN&amp;NR=104320420A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150128&amp;DB=EPODOC&amp;CC=CN&amp;NR=104320420A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>LUO CUN</creatorcontrib><creatorcontrib>LI FANG</creatorcontrib><creatorcontrib>LIU ZHICHAO</creatorcontrib><creatorcontrib>BAO DEMEI</creatorcontrib><creatorcontrib>YUE YIYANG</creatorcontrib><creatorcontrib>CHU HONGJIAN</creatorcontrib><creatorcontrib>LI YOUWEN</creatorcontrib><title>SCADA file encryption method based on AES algorithm</title><description>The invention discloses an SCADA file encryption method based on an AES algorithm. The method includes the steps that S01, an improved AES encryption and decryption algorithm is achieved; S02, modules are selected according to file processing modes; S03, the length of a secret key K and the secret key are input; S04, an expansion secret key is generated; S05, an encryption/decryption file is established; S06, 16 bytes are taken out from the file waiting to be encrypted/decrypted, and the taken-out data are stored in an intermediate variable; S07, the data in the intermediate variable are encrypted/decrypted according to the length of the secrete key, and the encrypted/decrypted data are stored in the intermediate variable; S08, if the file waiting to be encrypted/decrypted is encrypted/decrypted, the file is closed, and the second step is executed, or else the sixth step is executed. According to the SCADA file encryption method, encryption and decryption linear attack resistance and differential attack resistance are improved, fewer hardware resources are occupied, and the method is particularly suitable for upgrading original equipment without modifying hardware design.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDAOdnZ0cVRIy8xJVUjNSy6qLCjJzM9TyE0tychPUUhKLE5NUQDyHV2DFRJz0vOLMksycnkYWNMSc4pTeaE0N4Oim2uIs4duakF-fGpxQWJyal5qSbyzn6GBibGRgYmRgaMxMWoAawsrHg</recordid><startdate>20150128</startdate><enddate>20150128</enddate><creator>LUO CUN</creator><creator>LI FANG</creator><creator>LIU ZHICHAO</creator><creator>BAO DEMEI</creator><creator>YUE YIYANG</creator><creator>CHU HONGJIAN</creator><creator>LI YOUWEN</creator><scope>EVB</scope></search><sort><creationdate>20150128</creationdate><title>SCADA file encryption method based on AES algorithm</title><author>LUO CUN ; LI FANG ; LIU ZHICHAO ; BAO DEMEI ; YUE YIYANG ; CHU HONGJIAN ; LI YOUWEN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN104320420A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>LUO CUN</creatorcontrib><creatorcontrib>LI FANG</creatorcontrib><creatorcontrib>LIU ZHICHAO</creatorcontrib><creatorcontrib>BAO DEMEI</creatorcontrib><creatorcontrib>YUE YIYANG</creatorcontrib><creatorcontrib>CHU HONGJIAN</creatorcontrib><creatorcontrib>LI YOUWEN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LUO CUN</au><au>LI FANG</au><au>LIU ZHICHAO</au><au>BAO DEMEI</au><au>YUE YIYANG</au><au>CHU HONGJIAN</au><au>LI YOUWEN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SCADA file encryption method based on AES algorithm</title><date>2015-01-28</date><risdate>2015</risdate><abstract>The invention discloses an SCADA file encryption method based on an AES algorithm. The method includes the steps that S01, an improved AES encryption and decryption algorithm is achieved; S02, modules are selected according to file processing modes; S03, the length of a secret key K and the secret key are input; S04, an expansion secret key is generated; S05, an encryption/decryption file is established; S06, 16 bytes are taken out from the file waiting to be encrypted/decrypted, and the taken-out data are stored in an intermediate variable; S07, the data in the intermediate variable are encrypted/decrypted according to the length of the secrete key, and the encrypted/decrypted data are stored in the intermediate variable; S08, if the file waiting to be encrypted/decrypted is encrypted/decrypted, the file is closed, and the second step is executed, or else the sixth step is executed. According to the SCADA file encryption method, encryption and decryption linear attack resistance and differential attack resistance are improved, fewer hardware resources are occupied, and the method is particularly suitable for upgrading original equipment without modifying hardware design.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_CN104320420A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title SCADA file encryption method based on AES algorithm
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T06%3A04%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=LUO%20CUN&rft.date=2015-01-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN104320420A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true