Supercharge Your Innovation With Domain-Expert AI Agents!

Optimization method based on embedded platform SM2 encryption algorithm

An encryption algorithm and optimization method technology, which is applied in the field of optimization based on the embedded platform SM2 encryption algorithm, can solve the problems of long modification period, large storage space, and large changes, so as to reduce memory usage, realize encryption functions, and solve transformation problems. problem effect

Inactive Publication Date: 2013-04-03
STATE GRID SHANDONG ELECTRIC POWER +1
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Using the algorithm chip to implement the SM2 algorithm can well solve the problems of embedded running speed and resource limitation, but there are the following problems for power distribution terminals: 1) It is impossible to add chips to the already installed and used stereotyped terminals; 2) It is necessary to upgrade the hardware of the original embedded platform, and the changes are large, which may affect the hardware stability of the original platform; 3) The modification period is long
[0009] For the encryption function of the embedded platform implemented by the embedded algorithm library, it can solve the encryption needs of some power distribution terminals, but it cannot meet the encryption needs of all power distribution terminals. The main reasons are: 1) The SM2 open source library occupies a large storage space Many terminals cannot provide enough space; 2) The driver layer of the SM2 open source library needs to be implemented by calling the dynamic library of the operating system, which is an insurmountable threshold for terminals without an operating system; 3) The SM2 open source library is based on the general Realized in the C environment, it runs slowly on many terminals; 4) The operation of the SM2 open source library cannot be interrupted, which may affect the data processing function of the original terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optimization method based on embedded platform SM2 encryption algorithm
  • Optimization method based on embedded platform SM2 encryption algorithm
  • Optimization method based on embedded platform SM2 encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Such as figure 1 Shown, a kind of optimization method based on embedded platform SM2 encryption algorithm of the present invention comprises the following steps:

[0045] 1) Obtain an open source encryption library;

[0046] 2) Extract the API function of the SM2 encryption algorithm from the open source encryption library, and the extracted API function includes extracting all the subroutines related to the API function;

[0047] 3) Write the underlying driver function of the open-source encryption library algorithm, the writing of the underlying driver function at least includes writing the call interface function of the API function and the definition function of the CPU data direction.

[0048] 4) Optimize the extracted API functions.

[0049] Such as figure 2 As shown, the step of extracting the API function at least includes the following process:

[0050] 21) Extract data type conversion function;

[0051] 22) Extract the generation function of the key pair...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an optimization method based on an embedded platform SM2 encryption algorithm. The optimization method based on the embedded platform SM2 encryption algorithm comprises the following steps: 1) acquiring an open source encryption library; 2) extracting an API (application programming interface) function of the SM2 encryption algorithm from the open source encryption library; 3) compiling a bottom driving function of an open source encryption library algorithm; and 4) optimizing the extracted API function. The API function of the SM2 encryption algorithm is extracted from the open source encryption library including the SM2 algorithm, the algorithm optimization is performed on the extracted function, and according to the SM2 elliptical curve algorithm published by the State Secret Bureau, the bottom driving function of the API function of the encryption library is supplemented to form a new algorithm library, so that the memory usage rate of the encryption algorithm is reduced and an encryption function of an embedded platform is realized; and the embedded platform adopting the optimized SM2 encryption algorithm has downward compatibility, thus solving the reconstruction problem of most of power distribution terminals of a power distribution network.

Description

technical field [0001] The invention relates to an encryption technology of an embedded platform, in particular to an optimization method based on an embedded platform SM2 encryption algorithm. Background technique [0002] With the rapid development of low-voltage distribution networks, some low-voltage distribution networks that do not have optical fiber communication conditions use public network communication methods (GPRS / CDMA / TD-SCDMA / 230Mhz, etc.) to transmit control commands, causing the system to face attacks from public networks. risk, which affects the safe and reliable power supply to users, and at the same time, there is an invasion of the main station through the sub-station terminal, causing a wider range of security risks. In order to ensure the safe and stable operation of the power grid, it is necessary to upgrade the security protection of the existing power distribution terminals and introduce network information security technology. [0003] With the de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
Inventor 李建修李立生邵志敏郭上华汤定阳陈奎阳
Owner STATE GRID SHANDONG ELECTRIC POWER
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More