CN-122027154-A - Dam monitoring system data encryption transmission method based on quantum key
Abstract
The invention discloses a dam monitoring system data encryption transmission method based on a quantum key, and belongs to the technical field of data encryption. The method comprises the steps of firstly generating a basic quantum key based on a BB84 protocol and obtaining a key fragment by blocking, collecting multi-class operation state data of a dam, binding time-space information, generating a security situation characteristic factor for data values, generating a derivative key by combining a time-space binding identifier, the characteristic factor and the key fragment, obtaining an independent encryption state key through disturbance displacement, obtaining a joint enhancement key through multi-round enhancement, and finally completing data encryption by adopting two types of keys. According to the invention, the security of dam monitoring data transmission is improved by combining the quantum key with the space-time and security situation hierarchical encryption mechanism.
Inventors
- Shan Zhibing
- Jiang Gexin
- Hu Yaoting
- SONG YUE
- LU CHUANG
- CAO XIN
Assignees
- 四川凉山水洛河电力开发有限公司
Dates
- Publication Date
- 20260512
- Application Date
- 20260413
Claims (10)
- 1. The dam monitoring system data encryption transmission method based on the quantum key is characterized by comprising the following steps of: s1, generating a basic quantum key by adopting a BB84 protocol, and blocking the basic quantum key to obtain multiple key fragments; S2, collecting multi-class running state data of the dam, and recording corresponding space coordinates and time stamps for numerical values at each moment in the collecting process; s3, generating a security situation characteristic factor for the numerical value in each type of operation state data; s4, acquiring a space-time binding identifier according to the space coordinates and the time stamp, and generating a derivative key based on the security situation characteristic factors and the key fragment; S5, generating a disturbance sequence according to the security situation characteristic factors of the single numerical value, and performing disturbance shift processing on the derivative key to obtain an independent encryption state key; S6, generating a joint risk factor and encryption depth according to the security situation characteristic factors of the numerical values of the multiple types of running state data, and performing multi-round enhancement processing on the derivative key to obtain a joint enhancement key; and S7, encrypting the corresponding numerical value by adopting the independent encryption state key and the joint enhancement key to obtain encrypted data.
- 2. The dam monitoring system data encryption transmission method based on quantum key according to claim 1, wherein the step S3 comprises the following sub-steps: S31, acquiring the change rate of the numerical value at each moment in each type of running state data; s32, obtaining a safety deviation degree according to the difference between the numerical value at each moment in each type of running state data and the safety reference value; S33, adding the change rate of the same value and the safety deviation degree, converting the added result into an integer, and limiting the integer within the range of 0-255 to obtain the safety situation characteristic factor of the corresponding value.
- 3. The method for encrypted data transmission of dam monitoring system based on quantum key according to claim 1, wherein S4 comprises the following sub-steps: s41, converting the space coordinates of the numerical values at each moment into a hash sequence; S42, converting the time stamp of the numerical value at each moment into a binary sequence; s43, performing exclusive OR processing on the hash sequence and the binary sequence to obtain a space-time binding identification; s44, generating a derivative key according to the space-time binding identification, the security situation characteristic factors and the key fragments.
- 4. The dam monitoring system data encryption transmission method based on quantum key according to claim 3, wherein the expression of the derivative key in S44 is: , Wherein, the Is the first Class run state data item A derivative key of the time of day value, Is the first The key fragment of the class is used to store, Is the first Class run state data item The security posture feature factor of the time of day value, The binary system is taken out and the data is stored in the memory, Is the first Class run state data item Time-space binding identification of time value, i is splicing operation, In the case of an exclusive-or operation, For the numbering of the classes, Is the number of the time.
- 5. The method for encrypted data transmission of dam monitoring system based on quantum key according to claim 1, wherein S5 comprises the following sub-steps: s51, generating a disturbance sequence for security situation characteristic factors of numerical values at each moment; S52, carrying out exclusive OR operation on the disturbance sequence and the derivative key, and carrying out cyclic shift processing on the result after the exclusive OR operation based on the security situation characteristic factors to obtain the independent encryption state key.
- 6. The method for encrypting and transmitting data of dam monitoring system based on quantum key according to claim 5, wherein the expression for obtaining the independent encryption state key in S52 is: , Wherein, the Is the first Class run state data item An independent encryption state key for the time of day value, Is the first Class run state data item A derivative key of the time of day value, Is the first Class run state data item A sequence of disturbances of the time of day value, Is the first Class run state data item The security posture feature factor of the time of day value, In the case of an exclusive-or operation, In order to cycle the left-hand shift, In order to perform the modular arithmetic operation, For the numbering of the classes, Is the number of the time.
- 7. The method for encrypted data transmission of dam monitoring system based on quantum key according to claim 1, wherein S6 comprises the following sub-steps: S61, adding the security situation characteristic factors of the same time numbering values of the multiple types of running state data to obtain a joint risk factor; s62, determining encryption depth according to the joint risk factors; s63, generating an initial enhancement sequence by adopting a hash function according to the joint risk factors; s64, carrying out multi-round enhancement processing on the derivative key according to the initial enhancement sequence and the encryption depth to obtain the joint enhancement key.
- 8. The method for encrypting and transmitting data of dam monitoring system based on quantum key according to claim 7, wherein the formula for determining encryption depth in S62 is: , Wherein, the Is the first The encryption depth of the risk factors is combined at the moment, Is the first The time of day is combined with the risk factor, As a result of the maximum joint risk factor, For the maximum encryption depth to be the maximum, In order to take the integer down, Is the number of the time.
- 9. The method for encrypting and transmitting data of dam monitoring system based on quantum key according to claim 8, wherein the expression for obtaining the joint enhanced key in S64 is: , Wherein, the Is the first Class run state data item Time of day The joint enhancement key at the time of the secondary enhancement, Is the first Class run state data item Time of day The joint enhancement key at the time of the secondary enhancement, Is the first Class run state data item A derivative key of the time of day value, In order to perform the modular arithmetic operation, In the case of an exclusive-or operation, In order to cycle the left-hand shift, Taking initial enhancement sequence , For the numbering of the classes, For the purpose of enhancing the number of times, in Equal to When this is done, the enhancement process ends.
- 10. The method for encrypted data transmission of a dam monitoring system based on quantum key according to claim 1, wherein S7 comprises the following sub-steps: s71, carrying out quantization coding on the numerical value, and obtaining a corresponding binary system to obtain a sequence to be encrypted; s72, dividing the sequence to be encrypted into two sections to obtain a first subsequence to be encrypted and a second subsequence to be encrypted; S73, performing exclusive OR processing on the first sub-sequence to be encrypted and the independent encryption state key to obtain a first encrypted sub-sequence; S74, carrying out exclusive OR processing on the second sub-sequence to be encrypted and the joint enhancement key to obtain a second encrypted sub-sequence; and S75, splicing the first encryption subsequence and the second encryption subsequence to obtain encrypted data.
Description
Dam monitoring system data encryption transmission method based on quantum key Technical Field The invention relates to the technical field of data encryption, in particular to a dam monitoring system data encryption transmission method based on a quantum key. Background The dam is used as a core structure of the hydraulic junction, and the real-time acquisition, the safe transmission and the reliable storage of the running state data of the dam are directly related to the safety of hydraulic engineering, the flood control and the disaster reduction of the area and the civil guarantee. Along with the deep application of the technology of the Internet of things and the sensing network in the field of water conservancy monitoring, the dam monitoring has realized transformation from traditional manual inspection to multidimensional, high-precision and real-time automatic monitoring, and monitoring data cover various key indexes such as dam body displacement, seepage and osmotic pressure, stress strain, water level flow and the like, and the data are not only core basis of dam running state evaluation and risk early warning, but also engineering core parameters, and have extremely high requirements on safety and confidentiality of data transmission. In the existing dam monitoring data encryption transmission technology, a transmission encryption scheme based on a traditional symmetric encryption algorithm (such as an AES algorithm) is widely applied. The scheme generally generates a fixed symmetric key through a pre-deployed key management center, the key is distributed to a monitoring terminal and a data receiving center through a secure channel, the monitoring terminal acquires data and then encrypts the data by using the symmetric key, the encrypted data is transmitted to a back-end platform, and the back-end platform decrypts the data by using the same key to acquire original data. The encryption key in the prior art is not related to the real-time state of dam monitoring data, the key generation and updating are triggered by a fixed period, the dynamic adjustment cannot be carried out according to the monitoring data situation of different monitoring points and different time periods, all monitoring data in the corresponding period are easily decrypted and stolen due to key leakage, and the problem of low encryption security exists. Disclosure of Invention Aiming at the defects in the prior art, the dam monitoring system data encryption transmission method based on the quantum key solves the problem of low encryption security in the prior art. In order to achieve the aim of the invention, the technical scheme adopted by the invention is that the dam monitoring system data encryption transmission method based on the quantum key comprises the following steps: s1, generating a basic quantum key by adopting a BB84 protocol, and blocking the basic quantum key to obtain multiple key fragments; S2, collecting multi-class running state data of the dam, and recording corresponding space coordinates and time stamps for numerical values at each moment in the collecting process; s3, generating a security situation characteristic factor for the numerical value in each type of operation state data; s4, acquiring a space-time binding identifier according to the space coordinates and the time stamp, and generating a derivative key based on the security situation characteristic factors and the key fragment; S5, generating a disturbance sequence according to the security situation characteristic factors of the single numerical value, and performing disturbance shift processing on the derivative key to obtain an independent encryption state key; S6, generating a joint risk factor and encryption depth according to the security situation characteristic factors of the numerical values of the multiple types of running state data, and performing multi-round enhancement processing on the derivative key to obtain a joint enhancement key; and S7, encrypting the corresponding numerical value by adopting the independent encryption state key and the joint enhancement key to obtain encrypted data. Further, S3 comprises the following sub-steps: S31, acquiring the change rate of the numerical value at each moment in each type of running state data; s32, obtaining a safety deviation degree according to the difference between the numerical value at each moment in each type of running state data and the safety reference value; S33, adding the change rate of the same value and the safety deviation degree, converting the added result into an integer, and limiting the integer within the range of 0-255 to obtain the safety situation characteristic factor of the corresponding value. Further, S4 comprises the following sub-steps: s41, converting the space coordinates of the numerical values at each moment into a hash sequence; S42, converting the time stamp of the numerical value at each moment into a binary sequence; s43, performing exclusive OR