Supercharge Your Innovation With Domain-Expert AI Agents!

Optimization implementation system and method for acceleration state cryptography SM2 algorithm

A technology for implementing a system and an implementation method, applied in the field of information security, can solve the problem of low algorithm performance, and achieve the effect of improving the performance of signature and verification.

Inactive Publication Date: 2019-10-22
SHANGHAI JIAO TONG UNIV
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing SM2 implementation schemes, the performance of the algorithm is relatively low. Therefore, improving the performance of the SM2 algorithm can not only reduce the time for signature and verification, but also save a lot of computing resources, especially on the server side. When a large number of signature and verification calculations are performed, saving computing resources is equivalent to saving energy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optimization implementation system and method for acceleration state cryptography SM2 algorithm
  • Optimization implementation system and method for acceleration state cryptography SM2 algorithm
  • Optimization implementation system and method for acceleration state cryptography SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Such as figure 1 Shown is the overall process of SM2 elliptic curve signature and verification. Such as figure 1 As shown in (a), it is the signature generation process of SM2, specifically: according to the message M to be signed, the public key P used in this signature, the elliptic curve parameters a and b, the elliptic curve base point G, and the SM2 elliptic curve used by default ID generates the digest value e of the message, and calculates the signature data (r, s) of the message M to be signed.

[0021] The summary value e mentioned above is specifically obtained in the following way: as figure 2 As shown, the message M to be signed, the public key P, the elliptic curve system parameters (a, b, G, P), ID and ID length idlen, splice idlen, id, a, b, G, P in order, and use SM3 The hash algorithm calculates its hash value ZA=H256(idlen||id|a|b||G|P), where: || represents the byte splicing symbol, and H256() is the SM3 hash function; splicing ZA in order and me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an optimization implementation system and method for an acceleration state cryptography SM2 algorithm. The system comprises a signature checking module composed of an abstractinformation generation unit and a signature generation unit, and a signature verification module composed of a verification point generation unit and a signature verification unit. The signature module generates an abstract value through the abstract information generation unit and outputs the abstract value to the signature generation unit, and the signature generation unit obtains a point multiplication result of a k-fold point [k] G of an elliptic curve base point G through a preset table and point addition operation and quickly generates signature data (r, s). A verification point generation unit in the signature checking module obtains intermediate parameters according to signature data (r, s), obtains verification point coordinates through a pre-calculation table and then outputs theverification point coordinates to a signature verification unit, and the signature verification unit obtains verification information according to the verification point coordinates and is used for checking the signature data to achieve signature verification. According to the method, scalar multiplication and bottom layer implementation in the algorithm are optimized, so that the operation speedof the state cryptography SM2 cryptographic algorithm is greatly increased.

Description

technical field [0001] The present invention relates to a technology in the field of information security, in particular to a system and method for accelerating the optimization of the national secret SM2 algorithm. Background technique [0002] The SM2 elliptic curve cryptographic algorithm includes the SM2 encryption / decryption cryptographic algorithm and the SM2 signature / signature verification cryptographic algorithm. The elliptic curve parameters currently used by the algorithm are 256-bit elliptic curve parameters recommended by the State Cryptography Administration. The scalar multiplication on the elliptic curve (including The dot product of fixed point and the dot product of indeterminate point) is to calculate the product R=[k]P of a 256-bit scalar k and a point P on an elliptic curve, and the speed of scalar multiplication directly determines the state secret SM2 algorithm speed. [0003] In the existing SM2 implementation schemes, the performance of the algorith...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/32H04L9/08
CPCH04L9/0863H04L9/3066H04L9/3247
Inventor 谷大武麦龙王舒然贾淞淋李卷孺
Owner SHANGHAI JIAO TONG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More