Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption system based on SM2 and RSA encryption algorithms and working method

An encryption algorithm and encryption and decryption technology, applied in the field of encryption and decryption systems based on SM2 and RSA encryption algorithms, can solve the problems of complex calculation steps, high cost, and difficulty in compromising calculation speed and encryption system area, so as to reduce costs, The effect of high security

Inactive Publication Date: 2019-07-23
GUANGDONG UNIV OF TECH
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The core of the RSA public key encryption algorithm is a large number modular exponentiation operation, and the core of the SM2 public key encryption algorithm is an elliptic curve point multiplication operation; because the calculation steps of both the RSA and SM2 encryption algorithms are very complicated, most current encryption systems Both of them only implement one of the encryption algorithms, but it is difficult to compromise the calculation speed and the area of ​​the encryption system in a system that can implement two encryption algorithms at the same time.
That is to say, in the existing systems that can realize the two encryption algorithms of RSA and SM2, the area of ​​the system design is relatively large and the cost is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption system based on SM2 and RSA encryption algorithms and working method
  • Encryption and decryption system based on SM2 and RSA encryption algorithms and working method
  • Encryption and decryption system based on SM2 and RSA encryption algorithms and working method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to reduce the area of ​​the encryption and decryption system of the SM2 and RSA hybrid encryption algorithm, this scheme is based on the commonality of the multiplication and addition operations in the SM2 algorithm and the RSA algorithm, and the proposed technical scheme is:

[0041] An encryption and decryption system based on SM2 and RSA encryption algorithms, including: a CPU interface module, a main control module connected to the CPU interface module, and a multiplier module, an adder module, and a modular operation module respectively connected to the main control module , dot product operation module, modular exponentiation operation module, random number generation module, and key generation module. In this system, modular control is adopted, and the larger multiplier, adder module and part registers of the consumption circuit area commonly used by shared SM2 and RSA operations make the circuit of the present invention consume more than the two encrypti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption and decryption system based on SM2 and RSA encryption algorithms and a working method. The system comprises a CPU interface module, a main control module connected with the CPU interface module, and a multiplier module, an adder module, a modular arithmetic module, a point multiplication operation module, a modular exponentiation operation module, a random number generation module and a key generation module which are respectively connected to the main control module. In the system, modular control is adopted, and a multiplier, an adder module and a part of registers which are commonly used by SM2 and RSA operations and consume a large circuit area are shared, so that the circuit of the scheme consumes less circuit area and logic resources compared with circuits which independently realize two encryption algorithms; and meanwhile, encryption and decryption operation is carried out by adopting a method of mixing the SM2 and the RSA encryption algorithm, so that the security and the confidentiality of the encryption and decryption system are greatly enhanced.

Description

technical field [0001] The invention relates to the technical field of cryptographic chips, in particular to an encryption and decryption system and working method based on SM2 and RSA encryption algorithms. Background technique [0002] With the rapid development of computers and the Internet, the ways and means for people to transmit information have been greatly changed. A large amount of sensitive information is often exchanged through public communication facilities or the Internet. Cryptography technology is the leading force to ensure information security. The research and application of cryptographic algorithms is the core research field of information security technology. [0003] The RSA public key encryption algorithm was developed by Ron Rivest, Adi Shamirh and Len Adleman at the Massachusetts Institute of Technology in 1977. The RSA algorithm is the first algorithm that can be used for encryption and digital signature at the same time, and it is also easy to un...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0825H04L63/0442
Inventor 陆江城熊晓明
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products