A security device based on asymmetric encryption

An asymmetric encryption and security device technology, applied in the field of asymmetric security devices, can solve problems such as high risk of key leakage and key leakage

Active Publication Date: 2020-01-24
AEROSPACE INFORMATION
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the asymmetric encryption algorithm, the sender and the receiver must use the same key for the symmetric encryption algorithm, so any party leaking the key will lead to key leakage, so the risk of key leakage is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security device based on asymmetric encryption
  • A security device based on asymmetric encryption
  • A security device based on asymmetric encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0020] figure 1 A schematic diagram of a security device based on the SM9 algorithm provided by the present invention is shown, specifically including a large number operation module, an ECC operation module, an extended domain element operation module, an extended domain ECC operation module, an ECC pair operation module, and an SM9 encryption algorithm protocol module. Among them, the large number operation module is used for addition, subtraction, multiplication, division, modular addition, modular subtraction, modular multiplication and modular exponentiation; the ECC operation module is used for ECC general addition, doubling and dot multiplication operatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of security, and discloses a security device based on asymmetric encryption. The security device comprises: a great number operation module used for performing addition, subtraction, multiplication, division, modular addition, modular subtraction, modular multiplication and modular exponentiation operations; an ECC operation module used for performing ordinary addition, doubling and point multiplication operations of an ECC; an extension field element operation module used for performing modular addition, modular subtraction, modular multiplication and modular exponentiation operations of extension field elements; an extension field ECC operation module used for performing ordinary addition, doubling and point multiplication operations of the extension field ECC; an ECC pairing operation module used for performing set mapping; an SM9 encryption algorithm protocol module used for performing encryption, decryption, signature verification and key exchange according to an SM9 cryptography algorithm and by using the great number operation module, the ECC operation module, the extension field element operation module, the extension field ECC operation module and the ECC pairing operation module. The security device provided by the invention adopts an elliptic curve cryptography algorithm, can support cryptography algorithms SM2 and SM9 released by the State Cryptography Administration, and can satisfy the secure use requirements of users in different scenes.

Description

technical field [0001] The invention relates to the security field, in particular to an asymmetric security device based on the national secret SM2 algorithm and the SM9 algorithm. Background technique [0002] Asymmetric encryption algorithm uses public key and private key for encryption and decryption. Because it uses two different keys, and the public key can be made public, it is convenient for others to send encrypted information to the owner of the private key without worrying about key leakage. In the symmetric encryption algorithm opposite to the asymmetric encryption algorithm, the sender and the receiver must use the same key, so any party leaking the key will lead to key leakage, so the risk of key leakage is relatively large. [0003] The asymmetric encryption algorithm has been extensively studied since the successful application of RSA. The elliptic curve encryption algorithm is a kind of asymmetric encryption algorithm, and it has been widely used at present...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/30
CPCH04L9/3066H04L9/3247H04L63/0428H04L63/0442H04L63/08
Inventor 郭宝安苏斌王素玲张庆胜
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products