encryptionalgorithms play a critical role in ensuring data security. However, challenges such as slow operation and suboptimal efficiency arise during the encryption and decryption processes. Improving encryption eff...
详细信息
ISBN:
(纸本)9789819732029;9789819732036
encryptionalgorithms play a critical role in ensuring data security. However, challenges such as slow operation and suboptimal efficiency arise during the encryption and decryption processes. Improving encryption efficiency has emerged as a critical objective. In this paper, we investigate the intricacies of the sm4 encryption algorithm, identifying complex iterations and computations. Through adopting a more efficient mathematical approach and streamlining processes, we achieve significant improvements in encryption efficiency. Through extensive research in GPU parallel computing, we propose an efficient encryptionalgorithm based on CUDA streams. This approach carefully considers the characteristics of both the CPU and the GPU, enabling the parallelization of the sm4 block encryption process. It also optimizes byte substitution and left shift operations, resulting in an optimal solution. The integration of fundamental method optimization with GPU parallel computing consistently improves encryption efficiency. Our encryptionalgorithm consistently outperforms the CUDA-based sm4algorithm for large volumes of data, especially beyond 30 MB. With a data volume of 1 KB, our improved CUDA stream-based sm4algorithm consistently outperforms the CUDA-based sm4algorithm by 0.24 mu s. With a data volume of 30 MB, our algorithm is nearly 400 mu s faster. We leverage the security and privacy benefits of the optimized sm4 encryption algorithm by integrating it with blockchain technology. This ensures the security of sensitive information and strengthens the integrity and security of the blockchain system. This approach not only secures data, but also promotes broader adoption of blockchain technology across industries, enhancing its reliability and trustworthiness.
With the development of smart grids, distribution network dispatch systems are facing increasingly complex challenges in multi-source data processing and security management. This article proposes a secure control met...
详细信息
In order to improve the security of distribution automation system nodes and ensure the safe operation of distribution network, a quantitative security protection technology for distribution automation nodes based on ...
详细信息
In order to improve the security of distribution automation system nodes and ensure the safe operation of distribution network, a quantitative security protection technology for distribution automation nodes based on attack tree is proposed. This paper analyzes the factors of node risk assessment of the distribution automation system, and through the evaluation and analysis of node vulnerabilities;it discovers the faulty nodes in the distribution automation system in advance. Based on the node vulnerability evaluation results of the distribution automation system, the risk of the distribution automation system is comprehensively evaluated using the attack tree. Establish the distribution network control model under network attack, locate the fault node, and use trusted computing technology to design trusted distribution terminals. When the amount of data is large, more effective symmetric encryptionalgorithmsm4 is required to achieve node security protection in the distribution network automation system. The experimental results show that the method has high fault node location accuracy, low reliability calculation time, and the distribution automation system network has certain robustness, which fully verifies the application effect of the method.
暂无评论