Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital signature quick generation method of SM2 public key cryptography

A technology of public key cryptography and digital signature, which is applied in the direction of digital transmission system, public key of secure communication, user identity/authority verification, etc. It can solve the problems of SM2 optimization acceleration, limited degree of optimization, and inconspicuous speed improvement, etc. Achieve the effect of improving calculation speed and speeding up

Active Publication Date: 2019-04-19
PEKING UNIV
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The calculation method of the SM2 digital signature algorithm on the recommended parameters in the GM / T 0003.2-2012 standard is divided into three levels: signature scheme, elliptic curve arithmetic and finite field calculation. The existing SM2 optimization methods are all signatures on the elliptic curve The general optimization method of the algorithm is not optimized and accelerated for the specific structure and parameters of SM2, nor is it analyzed and optimized in combination with the application scenarios of SM2. On general server platforms, such as ARM and X86 server platforms, the degree of optimization is limited , the speed improvement is not obvious. In the application scenario that requires signature speed, it is difficult for the general elliptic curve optimization acceleration method to meet the calculation speed requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature quick generation method of SM2 public key cryptography
  • Digital signature quick generation method of SM2 public key cryptography
  • Digital signature quick generation method of SM2 public key cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0185] Example 1: Realize the two-stage SM2 algorithm on the SM2 signature server with a longer key life cycle

[0186] On a typical SM2 signature server platform (such as an SM2 signature server supporting ARM or X86 instruction set), if the signed private key has a long life cycle, such as several months or even years, then the two-stage SM2 algorithm can be used. Application frameworks such as figure 1 :

[0187] 1) When running for the first time or when the secret key expires, the server obtains or generates a secret key that needs to be used, and specifies the validity period of a secret key. The variable t is obtained in the preprocessing stage and stored safely (for example, a password is required to read USB shield).

[0188] 2) When the server needs to sign, if the secret key has expired, destroy the variable t, and run to step 1), otherwise, run to step 3

[0189] 3) In the signature calculation stage, the variable t in the preprocessing stage is used to complete...

Embodiment 2

[0192] Embodiment 2: Optimizing the acceleration of elliptic curve calculations on the SM2 computing platform using recommended parameters

[0193] On a typical SM2 computing platform (such as an SM2 signature server that supports ARM or X86 instruction set), if the SM2 algorithm uses the recommended parameters, specifically, when SM2 performs elliptic curve calculations, the elliptic dotted line has a limited The domain is defined in F p (p=2 256 -2 224 -2 96 +2 64 -1), the multiplication and inversion on its finite field can be optimized and accelerated, thereby speeding up the operation on the elliptic curve. The application framework is as follows figure 2 Shown:

[0194] 1) When the server uses the recommended parameters, for the finite field F p (p=2 256 -2 224 -2 96 +2 64 -1), using the multiplication and inversion acceleration algorithm of the present invention.

[0195] 2) When performing operations such as addition and point multiplication on elliptic cur...

Embodiment 3

[0198] Example 3: SM2 signature server with recommended parameters and longer key period

[0199] On a typical SM2 signature server platform (such as an SM2 signature server that supports ARM or X86 instruction set), the signature private key has a long life cycle and uses standard recommended parameters. This is a very common situation and can be Integrate two-stage algorithm and finite field optimization algorithm to achieve higher speed, application framework such as image 3 :

[0200] 1) Use the two-stage SM2 algorithm to reduce the amount of computation. Specifically, in the case of no change in the key, this scheme reduces the one inversion and two multiplication calculations in the original scheme to one multiplication calculation.

[0201] 2) In the underlying finite field calculation, use the fast finite field multiplication and inversion calculation of this scheme to replace the original finite field multiplication and inversion calculation, thereby improving the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital signature quick generation method of SM2 public key cryptography. The method comprises a step of performing optimization based on a SM2 signature generation algorithmin GM / T 0003.2-2012 SM2 elliptic curve public key cryptography standard on a SM2 signature server platform, and the method is a quick computation method of the SM2 signature generation algorithm, thesignature formation in the SM2 digital signature algorithm and the quick computation on the 256-bit prime number field in the SM2 recommendation parameter can be quickly realized. The optimization isperformed for the signature scheme and the finite field computation in the existing method, compared with the general optimization method on the elliptic curve, the method disclosed by the inventionbelongs to the specific optimization for the SM2 algorithm; on the SM2 signature server platform, especially a server platform using the recommended SM2 parameter and with long private key life cycle,the computation overhead is small, and the speed increasing can be effectively realized.

Description

technical field [0001] The invention relates to the technical field of digital signatures, in particular to a fast calculation method for SM2 public key cryptography, a fast calculation method for domestic commercial encryption algorithm SM2 digital signature generation algorithm, and a fast calculation method for SM2 recommended parameters. Background technique [0002] SM2 Elliptic Curve Public Key Cryptography Algorithm is a series of cryptographic standards based on Elliptic Curve Cryptography issued by the State Cryptography Administration in 2012 (GM / T 0003.2-2012 SM2 Elliptic Curve Public Key Cryptographic Standard). Industry standard release, which includes SM2 digital signature algorithm (see Part 2 in GM / T 0003.2-2012), key exchange protocol, public key encryption algorithm and recommended 256-bit prime field elliptic curve parameters (see GM / T0003. Part 5: Parameter Definitions in 2-2012). Although the algorithms and protocols in the SM2 standard can be based on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3066H04L9/3252
Inventor 关志陈霄王珂陈钟南湘浩
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products