Adaptive RSA Encryption Algorithm for Smart Grid

Information security has been paid more and more attention as it is a high-weight factor that affects many aspects in our life. Many technologies have been introduced to improve information security. Encryption algorithm is one of the most frequently used method. There are many encryption algorithms. RSA algorithm, which uses asymmetric encryption method, is a secure encryption algorithms. RSA’s encryption effect is pretty good due to difficulty in cracking its private key. Smart grid is the upgrade of power grid, which is based on integrated, high-speed two-way communication network. In smart grid, there are lots of data to be transferred along the network. In order to ensure that the data are not stolen or tampered with, it is necessary to encrypt the data during transferring. However, it is ineffective to use conventional RSA algorithm directly in smart grid. To solve the problem, we propose an adaptive RSA algorithm to generate primes, which modifies the application scope of RSA algorithm, so that the algorithm can be successfully applied in smart grid. According to the time limit of the encryption algorithm, the prime number is generated adaptively, so that the encryption time of the algorithm is reasonably controlled. The data is encrypted by generating the public key and the private key used for encryption through the generated prime number. The experiments verified the effectiveness of the algorithm.

[1]  Haitao Wu,et al.  Analysis Framework of RSA Algorithms in Elastic Optical Rings , 2019, Journal of Lightwave Technology.

[2]  Insoo Koo,et al.  Energy-Efficient Data Encryption Scheme for Cognitive Radio Networks , 2018, IEEE Sensors Journal.

[3]  Weimin Jin,et al.  Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography , 2018 .

[4]  E Junaeti,et al.  Implementation of Digital Signature Using Aes and Rsa Algorithms as a Security in Disposition System af Letter , 2017 .

[5]  Addepalli Hari Narayana,et al.  Fully homomorphic encryption with matrix based digital signature standard , 2017 .

[6]  Zvika Brakerski,et al.  Function-Private Functional Encryption in the Private-Key Setting , 2015, Journal of Cryptology.

[7]  H. Pastén,et al.  GCD Bounds for Analytic Functions , 2017 .

[8]  Sherali Zeadally,et al.  Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Yuguang Fang,et al.  A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid , 2016, IEEE Transactions on Smart Grid.

[10]  P. Hogg,et al.  Encryption and decryption of tissue factor , 2013, Journal of thrombosis and haemostasis : JTH.

[11]  Jun Feng Wang,et al.  Chinese Characters Knapsack Public Key Encryption Algorithm Research , 2012 .

[12]  Simon J. Shepherd,et al.  The Tiny Encryption Algorithm , 2007, Cryptologia.

[13]  Andreas Stein,et al.  Cryptographic protocols on real hyperelliptic curves , 2007, Adv. Math. Commun..

[14]  B.F. Wollenberg,et al.  Toward a smart grid: power delivery for the 21st century , 2005, IEEE Power and Energy Magazine.