Implementation method and system for SM3 algorithm in JAVA environment

A technology for implementing methods and algorithms, which is applied in the field of cryptography and information security, and can solve problems such as programming interfaces calling SM3 algorithms, and achieve the effect of avoiding cumbersome procedures

Active Publication Date: 2013-12-04
中电科网络安全科技股份有限公司
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the technical problem that the SM3 algorithm cannot be called directly through the programming interface of the encryption framework JCA standard in the JAVA environment, a method of using the SM3 algorithm in the JAVA environment is provided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and system for SM3 algorithm in JAVA environment
  • Implementation method and system for SM3 algorithm in JAVA environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0020] Such as figure 1 The flow chart of the implementation method of the shown SM3 algorithm in the JAVA environment. The invention discloses a method for implementing the SM3 algorithm in the JAVA environment, which specifically includes the following steps: developing and implementing an adaptation layer for algorithm replacement in accordance with the PKCS#11 specification; in the JAVA environment, when the application program passes the encryption framework JCA standard When the programming interface calls the secure hash algorithm SHA-256 algorithm in the password extension JCE, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of cryptogram and information safety, and discloses an implementation method and system for an SM3 algorithm in a JAVA environment. The implementation method specifically comprises the following steps that an adaptation layer for achieving algorithm replacement is developed based on a PKCS#11 standard; in the JAVA environment, when an application program calls a secure hash algorithm (SHA()-256 algorithm) in JAVA cryptography extension (JCE) through a programming interface of an encryption framework JCA standard, the adaptation layer directly calls the SM3 algorithm to achieve an application programming interface (API), operations and processing are carried out on data on which a hash algorithm needing to be carried out in a sublayer based on the SM3 algorithm, and thus the operation that the SHA-256 algorithm is replaced by the SM3 algorithm is achieved. The invention further discloses an implementation system for the SM3 algorithm in the JAVA environment. The algorithm ID of the SHA-256 algorithm is used for achieving the SM3 algorithm in the encryption framework JCA, the problem that a new algorithm cannot be added in the implementation of ready-made JCE is solved, and meanwhile the huge amount of workload for achieving new JCE and complex procedures for applying JCE authorized signatures are avoided.

Description

technical field [0001] The invention relates to the technical field of cipher and information security, and discloses a method and a system for realizing the SM3 algorithm in the JAVA environment. Background technique [0002] SM3 is a code hash algorithm. It is a commercial algorithm compiled by the State Cryptography Administration. It is used for digital signature and verification in cryptographic applications, generation and verification of message authentication codes, and random number generation. It can meet the security requirements of various cryptographic applications. For a message m with a length of l (l< 264) bits, the SM3 hash algorithm undergoes padding and iterative compression to generate a hash value with a length of 256 bits. [0003] JAVA is an object-oriented programming language that can write cross-platform application software. It is the general term for the Java programming language and Java platform (ie JavaSE, JavaEE, JavaME) launched by Sun Mic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/64H04L9/32
Inventor 何志平
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products