Research on Information Encryption Algorithm under the Power Network Communication Security Model

With the continuous development of current high-tech, network communication is quickly popularized in power automation monitoring systems, and colleagues have also brought many hidden dangers in communication security. This paper proposes a model that adapts to the security of power network communication. Based on the information encryption algorithm, this model can fully guarantee the security of both ends of the data transmission and can be applied to other network communication modes. Based on the power network communication security model, this article can use high-strength information encryption algorithms to encrypt data in the network to prevent the data transmitted in the network from being stolen or modified. The power network communication security model studied in this article mainly includes information encryption and decryption algorithms, client environment, and an SSL-based information encryption transmission protocol. Through analysis, it can be understood that the encryption and decryption algorithm is to perform MD5 transformation on key data and key strings, and the other is to use DES as the encryption algorithm before transmission. The experimental research results show that in the construction of power network communication, the power communication network is one of the most basic facilities in the development of the power grid. It is necessary to ensure the safety and economic operation of the power grid, and to improve the information level of the power grid enterprises and the network security protection system.


Introduction
The power network communication security system is the foundation of the development of various industries in our country, and the information system is a branch of the power network communication security system, which is mainly responsible for the transmission of various data information [1] .Compared with the previous traditional models, the grid security model has played an important role in operational efficiency, management and control [2] . In order to ensure the stable transmission of

Menezes-Vanstone algorithm
The Menezes-Vanstone algorithm is actually an implementation process based on the EIGamal algorithm on the elliptic curve. The difference from the original Eigamal is that one is implemented on the cyclic subgroup of the elliptic curve and the other is implemented on the finite field.
The Menezes-Vanstone algorithm is used to transform between encryption and decryption on a finite field. According to it, it can be concluded that the plain ciphertext space is: (2) Combining formula (1) and formula (2), it can be seen that the encryption algorithm is no longer a continuous finite domain space, but a set of discontinuous two-dimensional spaces E in a finite domain space. The algorithm is described as follows: First select a prime number P that is large enough. E is the elliptic curve of Z_P on the finite field, which is any point on E, and when the order of a is large enough, it makes the claimed cyclic discrete logarithm Is the most difficult: Randomly select an integer D, you can get: 1 ≤ D ≤ ord(a) (3) Calculate β=Da, where aβ is a public encryption key and D is a secret decryption key X=(X1, X2) in the plaintext form, Z p * × Z p * in the space, which is the same as the traditional 1 ≤ K ≤ ord(a) − 1 (4) The form of the ciphertext is y=(y0, y1, y2), and the ciphertext space is: E × Z p * × Z p * Encryption process: Y0=Ka, coordinates (c1, c2)=Kβ, y1=c1x1modp, y2=c2x2modp Decryption process: (c1, c2)=dy0, where: x = (y 1 c 1 −1 modp, y 2 c 2 −1 modp) (5) From the information encryption algorithm described above, it is obvious that the encryption algorithm on the elliptic curve greatly accelerates its encryption and decryption speed.

EIGamal signature algorithm
The EIGamal signature algorithm and the EIGamal signature algorithm were introduced at the same time. It is also a solution based on discrete logarithms. The specific description of the algorithm is as follows: Select a public key as parameter K, and a private key parameter as e, among which the largest public prime numbers a, p, calculate the transformation H(m) of the message, where: k = a e mod p (6) Perform signature transformation: S(H(m)) = (E 1 、E 2 ), Among, X = a n mod p (7) Y = (H(m) − eX) −1 mod(p − 1) (8) Perform signature verification: If the following formula is made to be valid, it can be regarded as a valid signature.
K Y X Y = a H(m) (mod p) (9) Therefore, after K, X, Y can be substituted accordingly, the resulting expression is as follows:

Comparative analysis of the above two algorithms
The RSA signature algorithm is based on its own algorithm as the technical standard. It has become a de facto standard after getting a considerable range of applications. Because the EIGamal signature algorithm was discovered relatively late, and its predecessor was the Rabin signature algorithm , Eigamal has already had many forms of correction before this.
At present, the application of RSA algorithm is wider than that of DSA algorithm. In addition to the earlier application of RSA algorithm, the main reason is that DSA is slow, has not undergone sufficient security and analysis, and has a small application area.

The Secret Key Problem in the Security Mode of Electric Power Network Communication
The key problem in the power network communication security mode usually refers to the transmission and storage of the key used when using a symmetric cryptosystem to encrypt data. The problem of key transmission refers to how the two parties in communication can safely transmit the key to the other party, while ensuring that they are not known or modified or forged by various attackers during the transmission process. Although asymmetric ciphers do not need to transmit the key, their encryption speed is slow and cannot be suitable for most occasions; on the surface, although the key can be transmitted safely and not exposed, the imposter attack (also called man-in-the-middle attack) of the active attacker is There is no way. The transmission problem of the key also causes the problem of key distribution and storage. Assuming that in a network composed of N users, each group of users needs to have a different key to encrypt and decrypt information, so that in the network There are a total of ∑_(i=1)^n〖(i-1))〗 keys that need to be stored, and they are usually to ensure data security. The judgment of the power network communication security risk rating prediction model is a typical two-category model in the risk rating process. The probability can determine the storage risk level of the communication data according to whether the threshold is set.

Establishment of the power network communication security risk mod
ρ(Y = 1|X) = 1 1 + e −(β 0 +β 1 x 1 +⋯+β n x n ) (10) The fitting effect of the rating model is expressed by the pseudo R-square statistic. It can be seen that: The coverage ratio of the result is the actual rating sample, the correct rating proportion model is as follows: The accuracy of the result is the actual rating sample, the correct rating proportion model is as follows: According to 30 synthesizable feature dimensions, in order to avoid information errors and omissions and increase the complexity of model calculation, it is necessary to expand feature selection to generate a relatively small and optimal feature set. After completing the above steps, construct a linear combination of classifiers: The final data cloud processor obtained from the scientific research is:  Figure 1 shows the measured change trend of the information security model data based on the information encryption algorithm. When other parameters remain unchanged, in the process of optimizing the power communication safety information system, changing the middle GBH715 height can flexibly adjust the fluctuations of the entire curve, especially when the safety performance deviation is large, the high-order loss coefficient It is reflected, so the influence of high-order on the four-wave mixing effect can be ignored in the ultra-flat coefficient distribution; Therefore, it is necessary to design a power network information security model based on information encryption algorithms. The measurement data in Table 1 shows that this method is more accurate when the degree of the inscribed triangle is small. When the link distance increases to 227km, Menetes Vanstone can accurately estimate the scattering loss, the error of nb101 is only 3, but the error of the correlation angle measurement data has a much greater impact on the calculation result.  Figure 2 shows the performance analysis diagram of three different information encryption algorithms in practical applications.

Conclusion
With the current rapid development of industrialization in my country, problems such as power shortages during peak power consumption of smart grids have become more and more prominent. The occurrence of such problems has caused certain problems on the production efficiency of enterprises and the daily lives of ordinary residents. Adverse effects. Therefore, improving the management level of the power demand side of the smart grid and strengthening the research of related monitoring terminal equipment are effective measures to enable the efficient operation of my country's smart grid. The security model system uses the SSL information encryption protocol algorithm to ensure that the information communicated between the two parties is encrypted through the encryption algorithm. encryption. And confirm the identity of both parties through digital signature technology, which not only guarantees the security of information transmission, but also confirms that the information will not be maliciously attacked and forged. Project practice has proved that the modified model can be used in power communication and can be extended to a wider range of Network communication application system.