Implementation system of p-element domain SM2 elliptic curve public key cryptographic algorithm

A technology of elliptic curve and public key cryptography, which is applied in the field of information security and can solve problems such as difficult algorithms to be applied

Active Publication Date: 2012-10-31
AEROSPACE INFORMATION
View PDF1 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The p-element domain SM2 elliptic curve public key cryptographic algorithm has been published by the State Cryptography Administration, but it only publishes the algorithm flow, and there is no hardware device that can realize the algorithm, so it is difficult for the existing technology to implement this excellent algorithm. Algorithms put into application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation system of p-element domain SM2 elliptic curve public key cryptographic algorithm
  • Implementation system of p-element domain SM2 elliptic curve public key cryptographic algorithm
  • Implementation system of p-element domain SM2 elliptic curve public key cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0057] The p-element field SM2 elliptic curve public key encryption algorithm involved in the present invention is based on the elliptic curve in the p-element field (also known as p-element finite field, namely the finite field involved in the present invention). In the p-element domain, the equation of the elliptic curve is y 2 =x 3 +ax+b, where p is a prime number greater than 3, a and b are called the parameters of the elliptic curve, both of which are values ​​in the field of the p element, and satisfy (4a 3 +27b 2 ) mod p is not 0, where mod is the modulo operator.

[0058] In addition, the elliptic curve in the p-element field has several characteristic quantities of basis, order and cofactor. The present...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an implementation system of a p-element domain SM2 elliptic curve public key cryptographic algorithm. Under the control of a master control module, the system can utilize a signature control center and a verification control center to control the implementation of a digital signature algorithm, utilize an initiator control center and a responder control center to control the implementation of a key exchange protocol, utilize an encryption party control center and a decryption party control center to control the implementation of a public key encryption algorithm, utilize an S generation module, a random number generation module, a point doubling module, a point addition module and a key derivation module to implement basic operation in the algorithm and utilize an upper-layer reelection module to implement multiplexing of the modules, thereby reducing the use of hardware resources. The implementation system disclosed by the invention can implement the p-element domain SM2 elliptic curve public key cryptographic algorithm by hardware.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a realization system of the p-element field SM2 elliptic curve public key encryption algorithm. Background technique [0002] With the development of communication technology and information processing technology, the security of information in the transmission process has attracted more and more attention. Information processing technology is needed to ensure that information is not eavesdropped, tampered with and counterfeited during communication. Cryptography technology can solve this requirement very well. [0003] Since Diffie and Hellmann proposed the concept of public-key cryptosystem in 1976, three types of recognized safe and effective public-key cryptosystems have appeared, and the mathematical problems they rely on are integer factorization problem (IFP) and discrete logarithm problem (DLP). ) and Elliptic Curve Discrete Logarithm Problem (ECDLP), the co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
Inventor 徐树民屈善新刘振王绍麟田心刘建巍
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products