Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SM2 elliptic curve public key cryptosystem optimization method

A public key cryptosystem and optimization method technology, applied in the field of SM2 elliptic curve public key cryptosystem optimization, can solve problems such as complex mathematical operations and complex implementation of optimization techniques, and achieve the effects of improving multiplication efficiency, improving efficiency, and easy reduction

Active Publication Date: 2020-02-04
浙江双成电气有限公司 +2
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the elliptic curve public key cryptosystem involves complex mathematical operations and presents a hierarchical relationship, the implementation of optimization technology is also complicated and mutually restrained.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 elliptic curve public key cryptosystem optimization method
  • SM2 elliptic curve public key cryptosystem optimization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings, but the present invention is not limited to these embodiments.

[0038] The basic idea of ​​the embodiment of the present invention is to optimize the fixed-point multi-point operation in the SM2 digital signature algorithm by using the comb algorithm of two pre-stored tables; for the fixed-point multi-point operation in the SM2 public key encryption algorithm, use two Optimize the comb algorithm of a pre-stored table; for E(GF 2 m) The unfixed point multi-point operation on the curve is optimized by using the multi-point Montgomery method; for E(GF p ) unfixed point multi-point operation on the curve, using the projective coordinate algorithm for optimization. The invention improves the operation efficiency by optimizing the algorithm, and optimizes the performances of digital signature, key exchange and data encryption.

[0039] Based on th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computers, in particular to an SM2 elliptic curve public key cryptosystem optimization method, which adopts a comb algorithm of two pre-stored tables to optimizefixed point multiple point operation in an SM2 digital signature algorithm. For fixed point multi-point operation in the SM2 public key encryption algorithm, a comb algorithm of two pre-stored tablesis adopted for optimization; for unfixed-point multi-point operation on the curve, a multi-point Montgomery method is adopted for optimization; for unfixed-point multi-point operation on an E (GFp) curve, a projective coordinate algorithm is adopted for optimization. According to the method, the operation efficiency is improved through an optimization algorithm, and the digital signature, key exchange and data encryption performance of the method are optimized.

Description

technical field [0001] The invention relates to the field of computers, in particular to an optimization method for an SM2 elliptic curve public key cryptosystem. Background technique [0002] SM2 is an elliptic curve public key cryptosystem independently designed by my country, and is considered to have better security than other elliptic curve cryptosystems. The SM2 national standard can be applied to finance, government affairs, security and other fields to provide services such as encryption, authentication, and key negotiation. However, for most application scenarios, computing efficiency is important. [0003] Since the elliptic curve public-key cryptosystem involves complex mathematical operations and presents a hierarchical relationship, the implementation of optimization techniques is also complicated and mutually restrained. [0004] Research on software optimization implementation is not as sufficient as hardware optimization implementation, and the implementatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3252H04L9/3066
Inventor 赵刚杨才明陈建平蒋正威沈祥章立宗陶涛周华严利锋杜奇伟陈培东张锋明周进李博葛彬彬
Owner 浙江双成电气有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products