Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for implementing SM2 white-box digital signature based on residue number system

A residual system and digital signature technology, applied in the field of information security, can solve the problems of high use cost, inability to deal with white-box attack methods, poor versatility, etc., and achieve the effect of high practicability, expanding the scope of use, and reducing the cost of use.

Active Publication Date: 2017-05-03
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing software encryption algorithm, the key is directly in the memory of the computing platform, and the attacker can steal the key through malicious software, etc., which cannot deal with the existing white box attack method; the existing hardware encryption algorithm, It can better guarantee the security of key calculation, but the relative use cost is relatively high, and the versatility is poor, and it cannot be used for some application scenarios with relatively low security requirements; at the same time, some research institutions have proposed cloud-based Part of the key and the software encryption algorithm of the key decentralized storage strategy, but the cloud plus terminal strategy cannot resist the leakage of the local private key, and also stores the authentication problem between the cloud and the terminal. The key decentralized storage strategy must be synthesized when performing key calculations The key, and the complete plaintext of the key also exists in the memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing SM2 white-box digital signature based on residue number system
  • Method for implementing SM2 white-box digital signature based on residue number system
  • Method for implementing SM2 white-box digital signature based on residue number system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The design idea of ​​the present invention is to conduct research on the problem that the key operation is not safe in an untrusted environment, and malicious attackers can obtain the system key through white-box attack means, and realize the splitting of large numbers by using the remainder system, thereby reducing The size of the key table; by using scrambling and obfuscation to ensure that the intermediate results are invisible to the attacker; by using the random factor in the cloud to ensure the unknownness of the terminal key calculation relationship, the security of the signature private key during the terminal signature calculation process is realized, and at the same time It can be verified using the standard SM2 signature verification algorithm.

[0032] The present invention is constructed based on the national commercial cryptographic algorithm SM2 digital signature algorithm. Please refer to the management standard issued by the National Commercial Cryptogra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for implementing an SM2 white-box digital signature based on a residue number system. The method carries out research in allusion to problems that a key is unsafe in operation in an incredible environment and that a malicious attacker can acquire the key of the system through a means of white-box attacks. Splitting of a big number is realized through using the residue number system, so that the size of a key table is reduced; an intermediate result is ensured to be invisible to the attacker through using scrambling and confounding; and the uncertainty of a terminal key operation relation is ensured through using a random factor of the cloud, the safety of a signature private key in the terminal signature operation process is realized, and verification can be performed by using a standard SM2 signature verification algorithm at the same time. The method provided by the invention is small in required storage space, high in calculation efficiency, good in safety and high in practicability.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for realizing an SM2 white-box digital signature based on a remainder system. Background technique [0002] In the existing software encryption algorithm, the key is directly in the memory of the computing platform, and the attacker can steal the key through malicious software, etc., which cannot deal with the existing white box attack method; the existing hardware encryption algorithm, It can better guarantee the security of key calculation, but the relative use cost is relatively high, and the versatility is poor, and it cannot be used for some application scenarios with relatively low security requirements; at the same time, some research institutions have proposed cloud-based Part of the key and the software encryption algorithm of the key decentralized storage strategy, but the cloud plus terminal strategy cannot resist the leakage of the local private ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0869H04L9/3066H04L9/3249
Inventor 白健周洁安红章
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products