Enhanced RSA key encryption application for metering data in smart grid

被引:7
作者
Philips, Anita [1 ]
Jayaraj, Jayakumar [2 ]
Josh, F. T. [1 ]
Venkateshkumar, P. [1 ]
机构
[1] Karunya Univ, Dept Elect & Elect Engn, Coimbatore, Tamil Nadu, India
[2] Karunya Inst Technol & Sci, Dept Elect & Elect Engn, Coimbatore, Tamil Nadu, India
关键词
Cyber security; Asymmetric encryption; RSA cryptographic algorithm; Primality test; Rabin Miller algorithm; Digital signature; Advanced metering infrastructure; Smart grid;
D O I
10.1108/IJPCC-07-2021-0172
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose Digitizing of the electrical power grid promotes the advantages of efficient energy management alongside the possibilities of major vulnerabilities. A typical inadequacy that needs critical attention to ensure the seamless operation of the smart grid system remains in the data transmission between consumer premises smart devices and the utility centres. Many researches aim at establishing security protocols to ensure secure and efficient energy management resulting in perfect demand-supply balance. Design/methodology/approach In this paper, the authentication of the smart meter data has been proposed with enhanced Rivest-Shamir-Adleman (RSA) key encryption using an efficient way of generating large prime numbers. The trapdoor one-way function applied in the RSA algorithm makes it almost impossible for the reverse engineering attempts of cracking the key pair. Findings The algorithm for generating prime numbers has been tested both with the convention method and with the enhanced method of including a low-level primality test with a first few hundred primes. The combination of low-level and high-level primality tests shows an improvement in execution time of the algorithm. Originality/value There is a considerable improvement in the time complexities when using the combination method. This efficient generation of prime numbers can be successfully applied to the smart meter systems, thereby increasing the strength and speed of the key encryption.
引用
收藏
页码:596 / 610
页数:15
相关论文
共 33 条
[1]  
Abood OG, 2017, PROC INT MID EAST P, P644, DOI 10.1109/MEPCON.2017.8301249
[2]   PRIMES is in P [J].
Agrawal, M ;
Kayal, N ;
Saxena, N .
ANNALS OF MATHEMATICS, 2004, 160 (02) :781-793
[3]  
[Anonymous], 2019, Indicator 1: Population Distribution, P1
[4]  
Asundi A. K., 2019, INT J INNOVATIVE TEC, V8, P2908, DOI [10.35940/ijitee.I7846.0881019, DOI 10.35940/IJITEE.I7846.0881019]
[5]  
Azad S., 2014, PRACTICAL CRYPTOGRAP, P135, DOI [10.1201/b17707, DOI 10.1201/B17707]
[6]  
Bandyopadhyay S., 2009, IEEE International Conference, P1, DOI DOI 10.1109/ICC.2009.5198956
[7]  
Bertino E., 2012, CRYPTOGRAPHIC KEY MA
[8]  
Cao Z., 2013, IACR CRYPTOL EPRINT, V2013, P449
[9]  
Dang, 2015, NIST SP 3
[10]  
Doe U., 2000, MANAGEMENT, V1, P1