A white-box software implementation method of commercial secret sm2 encryption algorithm based on remainder system

A technology of remainder system and encryption algorithm, which is applied in the field of white box software implementation of commercial secret SM2 encryption algorithm, can solve problems such as key information occurrence, achieve high practicability, expand the scope of use, and reduce the cost of use

Active Publication Date: 2019-09-24
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cloud collaboration method cannot resist the leakage of the local key, and also needs to solve the identification problem between the cloud and the terminal; although the decentralized storage of the key can reduce the risk of the key being leaked when it is stored statically, the key must be synthesized when the cryptographic algorithm is run, which results in the complete key information being present in memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A white-box software implementation method of commercial secret sm2 encryption algorithm based on remainder system
  • A white-box software implementation method of commercial secret sm2 encryption algorithm based on remainder system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The design concept of the present invention is to propose a white box software implementation scheme of the SM2 encryption algorithm based on technologies such as lookup table and scrambling and obfuscation, aiming at the private key security problem of the business secret SM2 encryption algorithm running in an untrustworthy environment. The solution is implemented in the way of cloud plus terminal, which can effectively protect the security of the terminal private key during storage and operation, and can be directly used in combination with the standard SM2 encryption algorithm. In addition, this patent uses the remainder system theory to decompose large integer operations, thereby reducing the size of the lookup table and reducing the storage space required by the algorithm.

[0028] This application is constructed based on the national commercial encryption standard SM2 encryption algorithm. The technical solution requires three types of auxiliary functions: cryptogr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a white-box software realization method based on remainder system for a commercial cipher SM2 encryption algorithm and provides a white-box software realization scheme based on technology of a lookup table and the scrambling mixing. The white-box software is realized through cooperative computing of a cloud server end and a client, so safety of a terminal private key during storage and operation can be effectively protected, and the white-box software realization method can be used by combining the standard SM2 encryption algorithm. In addition, by use of the remainder system theory to resolve the big integer operation, the size of the lookup table is reduced and storage space required for the operation is reduced.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a white-box software implementation method of a business secret SM2 encryption algorithm based on a remainder system. Background technique [0002] With the rapid development of network and computer technology applications, information security issues have become a major issue related to the national economy and people's livelihood. Public key cryptography is the core of information security technology in today's society. It can not only realize encryption functions, but also realize functions such as digital signatures, identity authentication, and message authentication. Therefore, it is widely used in e-mail, digital content distribution, network transactions, electronic Government affairs and other applications. The security of the private key in public key cryptography is the basis for ensuring the security of many applications. However, in an untrustworthy en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/06H04L29/06
Inventor 周洁白健安红章
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products