Supercharge Your Innovation With Domain-Expert AI Agents!

Message protection system and message protection method

A technology for protecting systems and messages, applied in transmission systems, digital transmission systems, and key distribution, which can solve the problems of long computing time and low computing efficiency.

Pending Publication Date: 2021-10-29
罗克佳华(重庆)科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present application is to provide a message protection system and a message protection method, which are used to solve the problem of implementing the SM2 algorithm in the fields of encryption, decryption, signature, signature verification, key agreement, and key generation in the prior art. Low efficiency and long computing time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message protection system and message protection method
  • Message protection system and message protection method
  • Message protection system and message protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047]The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0048] A message protection system and a message protection method provided by the embodiments of the present application can implement the SM2 algorithm in the fields of encryption, decryption, signature, signature verification, key negotiation, key generation, etc., and improve the operation efficiency, greatly Reduced computing time.

[0049] In order to facilitate the understanding of the embodiment of the present application, firstly, a message protection system provided by the embodiment of the present invention is described in detail:

[0050] Please refer to figure 1 , figure 1 A schematic structural diagram of a message protection system provided in an embodiment of the present application, specifically including a true random number generator 3 , an FPGA chip 2 and a processor 1 .

[005...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a message protection system and a message protection method; a processor is used for calling a true random number generator to generate a random number, and calling a plurality of parallel processing operation modules of an FPGA chip for data to be processed according to an SM2 algorithm to obtain a plurality of operation results, and obtaining target data according to the plurality of operation results. An SM2 algorithm, such as encryption, decryption, signature, signature verification, key agreement, key generation and the like based on SM2, is realized by adopting a message protection system, SM2 protocol correlation is realized by control of a processor, and calling of a true random number generator, an underlying cryptographic algorithm and elliptic curve operation is also realized by control of the processor. Meanwhile, the SM3 hash algorithm, the key derivation function, the point multiplication operation, the point addition operation, the point doubling operation and other operations of the SM2 algorithm are all realized by the FPGA logic, the parallel computing capability of the FPGA is utilized, the operation efficiency is improved, and the operation time is greatly shortened.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a message protection system and a message protection method. Background technique [0002] The SM2 algorithm is based on elliptic curve calculations. Calculation efficiency is one of the most concerned issues in elliptic curve cryptography. Point operations (point addition, point doubling, and point multiplication) on elliptic curves account for most of the calculations. For a dedicated cryptographic algorithm chip that is required for a single SM2 algorithm, the chip development cycle is long, lagging behind the development of technology, and easily causing waste of resources, and the performance improvement for SM2 is also relatively limited. [0003] At present, the SM2 algorithm is widely used in fields such as encryption, decryption, signature, signature verification, key negotiation, and key generation. Good at big data point calculation, low calculatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/32H04L9/08
CPCH04L9/3066H04L9/0869H04L9/3247H04L9/0863H04L9/0838
Inventor 李玮廖强夏博儒张俊峰楚梁陈维沈扬斯吴魁栾怀训谢晓民
Owner 罗克佳华(重庆)科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More