Unlock instant, AI-driven research and patent intelligence for your innovation.

SM2 digital signature verification failure reason judgment method and device, equipment and medium

A technology of digital signature and verification failure, applied in the field of information security, can solve the problems of misinformation, signature value mismatch, inability to analyze digital signature verification failure, etc.

Active Publication Date: 2021-06-29
工业信息安全(四川)创新中心有限公司
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In actual use, the verifier of the SM2 digital signature can only analyze whether the system parameters and the hash value of the signer are abnormal when calculating the verification failure result, but cannot analyze whether the digital signature verification failure is caused by the signature value or the public key. For example, if the message is tampered with, the signature value does not match, the signature value is sent incorrectly, or it is misrepresented as another public key, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 digital signature verification failure reason judgment method and device, equipment and medium
  • SM2 digital signature verification failure reason judgment method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] The symbols, abbreviations and symbols used in this embodiment are as follows:

[0080] A and B: Two users of the SM2 public key cryptosystem, A is the signer, B is the verification signer.

[0081] q : finite field The number of elements in .

[0082] : A finite field containing q elements.

[0083] a, b: elements in , which define An elliptic curve E on

[0084] : The set of all rational points of the upper elliptic curve E.

[0085] O: The point at infinity (or zero point) on the elliptic curve E, which is the identity element of the additive group of elliptic curves.

[0086] G: A base point of an elliptic curve whose order n is a prime number.

[0087] : The number of points on the elliptic curve is called order.

[0088] n : The order of the base point G.

[0089] [k]P: k times the point P on the elliptic curve.

[0090] : The private keys of user A and user B respectively.

[0091] : The public keys of user A and user B respectively....

Embodiment 2

[0136] as attached figure 2 As shown, it is a structural block diagram of the SM2 digital signature verification failure reason determination device provided by this embodiment, and the system specifically includes:

[0137] Main control module: its functions include: 1) receiving input parameters; 2) output detection results; 3) overall data scheduling and task allocation; 4) public key equality comparison, so as to realize the failure of SM2 digital signature verification provided by the previous embodiment Step S3 of the cause determination method. The main control module and the other four modules, namely the integer validity detection module, the public key validity detection module, the SM2 digital signature verification module, and the public key parsing module from the signature, are linked together.

[0138] Integer Validity Detection Module: Its function is to convert the input data type into an integer according to the provisions of Section 4.2 Data Type Conversio...

Embodiment 3

[0144] This preferred embodiment provides a computer device that can implement the steps in any embodiment of the SM2 digital signature verification failure reason determination method provided by the embodiment of the present application. Therefore, it can realize the steps provided by the embodiment of the present application. For the beneficial effects of the method for judging the cause of SM2 digital signature verification failure, see the previous embodiments for details, and will not be repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SM2 digital signature verification failure reason judgment method and device, equipment and a medium. According to the method and the device, the problem that signature verification fails due to signature value errors or public key errors when a verifier of the SM2 digital signature obtains a verification failure result through calculation is solved, the signature algorithm of the SM2 standard is not changed, the signature verification algorithm of the SM2 standard is not changed, and the existing SM2 signature algorithm and signature verification algorithm are completely compatible.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method, a device, a device and a medium for judging the failure reason of an SM2 digital signature verification. Background technique [0002] Cryptographers Neal Koblitz and Victor Miller proposed the idea of ​​Elliptic Curve Cryptography (Elliptic Curve Cryptography, ECC) in 1985, making it a powerful tool for constructing public key cryptosystems. The SM2 algorithm specified in my country's national standard GB / T 32918 "Information Security Technology SM2 Elliptic Curve Public Key Cryptography Algorithm" is a specific ECC cryptographic algorithm, which mainly includes three parts: digital signature algorithm, key exchange protocol and public key encryption algorithm . GB / T 32918.2 specifies the digital signature algorithm of SM2 elliptic curve public key cryptography algorithm, including digital signature generation algorithm and verification algorit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3252
Inventor 罗影张文科滕斌敖麒郭晓玲
Owner 工业信息安全(四川)创新中心有限公司