Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SM2 signature authentication method and system

An authentication method and authentication system technology, which is applied in the field of digital signature and authentication, can solve the problem that ASIC chips cannot directly implement the SM2 algorithm, and achieve the effect of reducing the development cycle

Inactive Publication Date: 2011-12-21
TSINGHUA UNIV
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the ASIC chip that implements the ECDSA algorithm, the SM2 algorithm cannot be directly implemented, which has become an obstacle to the popularization and use of the SM2 algorithm.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 signature authentication method and system
  • SM2 signature authentication method and system
  • SM2 signature authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0042] The notable feature of the present invention is that the existing application specific integrated circuit (Application Specific Integrated Circuit, ASIC) chip for realizing ECDSA signature authentication is used to realize the SM2 signature authentication operation, without specially designing the chip for SM2 signature authentication, which reduces the development cycle, It can also avoid performing elliptic curve point multiplication and point addition operations outside the chip, which reduces the overhead of the off-chip system and ensures that the performance of the system depends on the performance of the ASIC chip.

[0043] Another feature of the present inve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for authenticating an SM2 (Smart Media 2) signature, relating to the technical fields of digital signature and authentication technology. The method for authenticating the SM2 signature is implemented through an ASIC (Application Specific Integrated Circuit) chip in which an ECDSA (Elliptic Curve Digital Signature Algorithm) is adopted. The method comprises the following steps of: 1, converting an SM2 signature waiting to be authenticated into a corresponding ECDSA signature; 2, authenticating the ECDSA signature obtained by conversion by using the ASIC chip in which the ECDSA is adopted; and 3, performing out-chip modular addition operation on an authentication result of the ECDSA signature, authenticating a modular addition operation result toobtain an authentication result of the SM2 signature, and returning a result indicating whether the signature is received. In the method, the SM2 signature is converted into the ECDSA signature, and ECDSA authentication is performed on the ECDSA signature to obtain the authentication result of the SM2 signature, so that an SM2 algorithm can be directly realized by using the conventional ASIC chipfor realizing ECDSA signature authentication, a chip design special for SM2 signature authentication is not required, and the developing period is shortened.

Description

technical field [0001] The invention relates to the technical field of digital signature and authentication, in particular to an SM2 signature authentication method and system. Background technique [0002] Cryptographic systems can be divided into traditional (or symmetric) encryption systems and public key (or asymmetric) encryption systems. In 1976, W.Diffie and M.E.Hellman proposed the concept of public key cryptography, which had a profound impact on the development of the entire cryptography. The currently widely used public key cryptosystem is RSA, which has the advantages of simple principle and convenient use. However, with the continuous improvement of the large integer factorization method and the continuous improvement of computer performance, the number of key bits required to ensure the security of RSA continues to increase. At present, it is generally believed that the number of bits of the RSA key is more than 1024 bits to ensure security. . The increase i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
Inventor 李树国黄震
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products