P-element domain SM2 elliptic curve public key encryption, decryption and encryption-decryption hybrid system

An elliptic curve and public key encryption technology, which is applied to the public key and key distribution of secure communication, and can solve problems such as putting difficult algorithms into application

Inactive Publication Date: 2012-10-31
AEROSPACE INFORMATION
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, what the State Cryptography Administration has announced is only the flow of the public key encryption algorithm in the SM2 elliptic curve public key enc...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • P-element domain SM2 elliptic curve public key encryption, decryption and encryption-decryption hybrid system
  • P-element domain SM2 elliptic curve public key encryption, decryption and encryption-decryption hybrid system
  • P-element domain SM2 elliptic curve public key encryption, decryption and encryption-decryption hybrid system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The principles and features of the present invention will be described below with reference to the accompanying drawings. The examples are only used to explain the present invention, but not to limit the scope of the present invention.

[0072] The public key encryption algorithm in the SM2 elliptic curve public key encryption algorithm includes two processes: encrypting the message and decrypting the ciphertext. The user who encrypts the message is called the encryption party, which is represented by the label A. The user who decrypts the ciphertext is called the decryption party. It is denoted by the symbol B. The keys used in the two processes of encrypting the message and decrypting the ciphertext are a pair of public and private keys. The public key PB is used to encrypt the message, and the private key dB is used to decrypt the ciphertext, where PB is on the elliptic curve. The coordinates of a point, dB is a scalar, PB and dB are corresponding to each other, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a p-element domain SM2 elliptic curve public key encryption, decryption and encryption-decryption hybrid system. The system comprises an encryption party control center for performing judgment, bit string splicing, cryptographic hash and data exchange with other modules to control the working time sequence of other modules, a random number generation module for generating a random number, a point doubling module for performing a point doubling function and a key derivation module for performing a key derivation function, and all the modules are implemented by hardware. The system disclosed by the invention can implement a public key encryption algorithm in an SM2 elliptic curve public key cryptographic algorithm by hardware.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a p-element domain SM2 elliptic curve public key encryption, decryption and encryption-decryption hybrid system. Background technique [0002] With the development of communication technology and information processing technology, more and more attention has been paid to the security of information in the transmission process. It is necessary to use information processing technology to ensure that information is not eavesdropped, tampered and counterfeited during the communication process. Cryptography can solve this requirement very well. [0003] Since Diffie and Hellmann proposed the concept of public key cryptosystems in 1976, there have been three types of recognized safe and effective public key cryptosystems, which depend on the mathematical problems of integer factorization problem (IFP) and discrete logarithm problem (DLP). ) and elliptic curve discrete log...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/08
Inventor 徐树民屈善新刘振王绍麟田心刘建巍
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products