Public key parsing method, device, device and storage medium based on sm2 signature

An analysis method and public key technology, applied in the field of information security, can solve the problems of reducing the security of SM2 signature algorithm, reducing the security of SM2 algorithm signature, incompatibility with SM2 signature algorithm and signature verification algorithm, etc.

Active Publication Date: 2022-08-02
工业信息安全(四川)创新中心有限公司
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (2) These two schemes are not compatible with the existing SM2 signature algorithm and signature verification algorithm: on the one hand, the standard SM2 signature value cannot use these two schemes to recover the public key; on the other hand, the signature calculated by these two algorithms The value is also not recognized by the standard SM2 signature verification algorithm
[0007] (3) These two solutions lead to SM2 hardware and software implementation modules must be changed, especially not conducive to hardware implementation
[0008] (4) These two schemes may have the risk of reducing the security of the SM2 algorithm signature: the extra output parameter v is derived from the inside of the SM2 signature algorithm, whether this will reduce the security of the SM2 signature algorithm, neither of these two schemes has given a clear safety analysis and evaluation of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key parsing method, device, device and storage medium based on sm2 signature
  • Public key parsing method, device, device and storage medium based on sm2 signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] First, the symbols, abbreviations and symbols used in this embodiment will be described.

[0086] A and B: Two users of the SM2 public key cryptosystem, A is the signer and B is the signer verification.

[0087] q : finite field F q the number of elements in .

[0088] F q : a finite field containing q elements.

[0089] a, b: F q elements in , which define F q on an elliptic curve E.

[0090] E (F q ): F q The set of all rational points of the upper elliptic curve E.

[0091] O: The infinity point (or zero point) on the elliptic curve E, which is the identity element of the additive group of the elliptic curve.

[0092] G: A base point of an elliptic curve whose order n is a prime number.

[0093] #E (F q ): E (F q ), the number of points on the elliptic curve E (F q ) of the order.

[0094] n : The order of the base point G.

[0095] [k]P: point k times the point P on the elliptic curve.

[0096] d A , d B : are the private keys of user A and user B,...

Embodiment 2

[0121] The signs, abbreviations, and symbols used in this embodiment are the same as those in Embodiment 1, and will not be repeated here.

[0122] as attached figure 2 As shown, it is a flow chart of the public key parsing method based on SM2 signature provided by this embodiment, and the method specifically includes the following steps:

[0123] S1: Enter the standard SM2 signature value (r', s'), the digitally signed message M', the hash value of the signer , the identifiable identification of the signer and elliptic curve system parameters, elliptic curve system parameters include elliptic curve equation parameters a, b, base point G = (x G , y G ) and the base point of order n, check the input parameters and calculate the hash value calculation.

[0124] S1-1: Convert the data types of r' and s' to integers according to the stipulations of data type conversion in Section 4.2 of the SM2 standard GB / T 32918.1, and check and are all established. If one of them is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a public key parsing method, device, equipment and storage medium based on SM2 signature. The method includes S1: inputting a standard SM2 signature value (r', s'), a message M' to be digitally signed, and a signature The hash value of the signer, the distinguishable identity of the signer and the parameters of the elliptic curve system, the parameters of the elliptic curve system include the elliptic curve equation parameters a, b, the base point G = (x G , y G ) and the order n of the base point; S2: Convert the data types of r', s' to integers, set, calculate, and convert the data types of e' to integers; S3: Convert the compressed point to a point on the elliptic curve to resolve the signer's public key. The present invention realizes the public key analysis of SM2 signature with the execution efficiency basically equivalent to the traditional method without changing the SM2 signature algorithm and without reducing the security of the SM2 signature algorithm.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a public key analysis method, device, device and storage medium based on SM2 signature. Background technique [0002] Cryptographers Neal Koblitz and Victor Miller respectively proposed the idea of ​​elliptic curve cryptography (ECC) in 1985, making it a powerful tool for constructing public key cryptosystems. The SM2 algorithm specified in my country's national standard GB / T 32918 "Information Security Technology SM2 Elliptic Curve Public Key Cryptographic Algorithm" is a specific ECC cryptographic algorithm, which mainly includes three parts: digital signature algorithm, key exchange protocol and public key encryption algorithm. . GB / T 32918.2 specifies the digital signature algorithm of SM2 elliptic curve public key cryptographic algorithm, including digital signature generation algorithm, verification algorithm and corresponding process, which can meet the requ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46G06F21/64
CPCG06F21/46G06F21/64
Inventor 罗影张文科郭晓玲敖麒刘红军
Owner 工业信息安全(四川)创新中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products