SM2 elliptic curve signature verification algorithm

An elliptic curve and signature verification technology, applied in the field of information security, can solve problems such as low security, slow operation speed, and time-consuming, and achieve the effect of improving security and preventing cracking and forgery

Active Publication Date: 2018-10-16
GUANGDONG UNIV OF TECH
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] During the signature generation (signature verification) process of the existing SM2 signature verification algorithm, most of the messages to be signed (the message to be verified) and the hash value are directly spliced ​​at the beginning and the end. attack, low security
[0004] In the operation process of the SM2 elliptic curve public key cryptographic algorithm, the most time-consuming is the point multiplication algorithm, and in the point multiplication operation, the most time-consuming is the modular inverse operation, which takes more than ten times the time required for the modular multiplication operation. The number of modular inversion operations required to complete a point multiplication operation under different coordinates is different. In the Montgomery point multiplication algorithm under the affine coordinate system, each point operation ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 elliptic curve signature verification algorithm
  • SM2 elliptic curve signature verification algorithm
  • SM2 elliptic curve signature verification algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0064] The technical problem to be solved by the present invention is to provide a SM2 elliptic curve signature verification algorithm, which improves the SM2 signature generation algorithm (signature verification algorithm). ) and the random bit string XOR operation, and then perform the NAND operation with the hash value, which improves the security of the signature verification system. The point product algorithm in the process of signature generation and signature verification adopts an improved Montgomery point product algorithm. Dot multiplication operation converts affine coordinates into standard projection coordinates, eliminates the modular inverse operation in the point operation (point addition, doubling point operation) in the dot multiplication operation, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SM2 elliptic curve signature verification algorithm. The SM2 elliptic curve signature verification algorithm comprises the following steps: a digital signature generation algorithm: inputting the original data of a signature party A, comprising system parameters (base point G, order n) of an elliptic curve, a hash value ZA, a private key dA of the signature party A and amessage M to be signed; and obtaining a random bit string W. In a process of generating a digital signature, a segment of random bit string is obtained at first, then after an XOR operation is performed on the message to be signed and the random bit string, a NAND operation is performed with the hash value, if the signature information is intercepted by a lawbreaker in a transmission process, thelawbreaker cannot completely crack or counterfeit the signature information without knowing the XOR operation and the NAND operation in the signature process, thereby improving the security of the signature information and preventing the lawbreaker from cracking and counterfeiting the signature information after intercepting the signature information.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an SM2 elliptic curve signature verification algorithm. Background technique [0002] Identity authentication technology is the leading force to ensure information security, and the design and implementation of authentication system is very important. Only through a high-reliability identity authentication system can the information security of both parties in communication be effectively guaranteed, and information can be prevented from being intercepted by criminals during transmission. SM2 is an elliptic curve public key cryptographic algorithm released by the State Cryptography Administration on December 17, 2010. Digital signature technology is an important application of the elliptic curve public key cryptographic algorithm. It plays an important role in modern e-commerce and government affairs. It can ensure the integrity of the message during transmission, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3006H04L9/3066H04L9/3247
Inventor 王丽雪熊晓明
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products