Optimization implementation system and method for acceleration state cryptography SM2 algorithm
A technology for implementing a system and an implementation method, applied in the field of information security, can solve the problem of low algorithm performance, and achieve the effect of improving the performance of signature and verification.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] Such as figure 1 Shown is the overall process of SM2 elliptic curve signature and verification. Such as figure 1 As shown in (a), it is the signature generation process of SM2, specifically: according to the message M to be signed, the public key P used in this signature, the elliptic curve parameters a and b, the elliptic curve base point G, and the SM2 elliptic curve used by default ID generates the digest value e of the message, and calculates the signature data (r, s) of the message M to be signed.
[0021] The summary value e mentioned above is specifically obtained in the following way: as figure 2 As shown, the message M to be signed, the public key P, the elliptic curve system parameters (a, b, G, P), ID and ID length idlen, splice idlen, id, a, b, G, P in order, and use SM3 The hash algorithm calculates its hash value ZA=H256(idlen||id|a|b||G|P), where: || represents the byte splicing symbol, and H256() is the SM3 hash function; splicing ZA in order and me...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com