Since big data technology is integrated across interdisciplinary fields, where many new technologies are introduced but the risks are also higher. Therefore, in the big data environment, there are higher requirements for the security protection technology of information communication. Besides, the 3DES algorithm is generated after three rounds of polling based on the DES algorithm in the paper, which uses shift, XOR, S-box and other operations. What's more, the plain text is replaced by IP, and after multiple iterations, the sampling data is encrypted. Experiments prove that the research method proposed in the paper has the advantages of high encryption strength, low resource consumption and low encryption and decryption time, which is suitable for application in power systems.
Software And Hardware
• Hardware: Processor: i3 ,i5 RAM: 4GB Hard disk: 16 GB • Software: operating System : Windws2000/XP/7/8/10 Anaconda,jupyter,spyder,flask Frontend :-python Backend:- MYSQL