White-box software realization method based on remainder system for commercial cipher SM2 encryption algorithm

A technology of remainder system and encryption algorithm, which is applied in the field of white box software implementation of commercial secret SM2 encryption algorithm, can solve problems such as key information occurrence, achieve high practicability, expand the scope of use, and reduce the cost of use

Active Publication Date: 2017-05-17
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cloud collaboration method cannot resist the leakage of the local key, and also needs to solve the identification problem between the cloud and the terminal; although the decentralized storage of the...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • White-box software realization method based on remainder system for commercial cipher SM2 encryption algorithm
  • White-box software realization method based on remainder system for commercial cipher SM2 encryption algorithm
  • White-box software realization method based on remainder system for commercial cipher SM2 encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0079]The design idea of ​​the present invention is to propose a white box software implementation scheme of the SM2 encryption algorithm based on technologies such as lookup table and scrambling for the private key security problem of the SM2 encryption algorithm running in an untrustworthy environment. The solution is implemented in the way of cloud plus terminal, which can effectively protect the security of the terminal private key during storage and operation, and can be directly used in combination with the standard SM2 encryption algorithm. In addition, this patent uses the remainder system theory to decompose large integer operations, thereby reducing the size of the lookup table and reducing the storage space required by the algorithm.

[0080] This application is constructed based on the national commercial encryption standard SM2 encryption algorithm. The technical solution requires three types of auxiliary functions: password hash function, key derivation function a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a white-box software realization method based on remainder system for a commercial cipher SM2 encryption algorithm and provides a white-box software realization scheme based on technology of a lookup table and the scrambling mixing. The white-box software is realized through cooperative computing of a cloud server end and a client, so safety of a terminal private key during storage and operation can be effectively protected, and the white-box software realization method can be used by combining the standard SM2 encryption algorithm. In addition, by use of the remainder system theory to resolve the big integer operation, the size of the lookup table is reduced and storage space required for the operation is reduced.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a white-box software implementation method of a business secret SM2 encryption algorithm based on a remainder system. Background technique [0002] With the rapid development of network and computer technology applications, information security issues have become a major issue related to the national economy and people's livelihood. Public key cryptography is the core of information security technology in today's society. It can not only realize encryption functions, but also realize functions such as digital signatures, identity authentication, and message authentication. Therefore, it is widely used in e-mail, digital content distribution, network transactions, electronic Government affairs and other applications. The security of the private key in public key cryptography is the basis for ensuring the security of many applications. However, in an untrustworthy en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/08H04L9/06H04L29/06
Inventor 周洁白健安红章
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products