CN107147488A - A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms - Google Patents

A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms Download PDF

Info

Publication number
CN107147488A
CN107147488A CN201710183058.8A CN201710183058A CN107147488A CN 107147488 A CN107147488 A CN 107147488A CN 201710183058 A CN201710183058 A CN 201710183058A CN 107147488 A CN107147488 A CN 107147488A
Authority
CN
China
Prior art keywords
register
module
software
sign test
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710183058.8A
Other languages
Chinese (zh)
Inventor
郑欣
徐崇耀
熊晓明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201710183058.8A priority Critical patent/CN107147488A/en
Publication of CN107147488A publication Critical patent/CN107147488A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The present invention relates to a kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms, system includes software module and hardware module;Hardware module includes computing module, register and randomizer;Randomizer produces the random number for algorithm, symmetric key, sender's public key and private key, recipient's public key and private key;Computing module, the algorithm for SM2, SM3, SM4 in computing encryption process;Software module, for realizing signature sign test function;Register, by software module access scheduling computing module.The random number produced during present invention signature sign test is produced by randomizer, drastically increases the security of data;Arithmetic section realizes that software module realizes signature sign test function by hardware module, by software-hardware synergism cooperation, is realized compared to pure software, drastically increases arithmetic speed;Compared to pure hard-wired inoperable property, with stronger controllable, programmable, portable, compatibility.

Description

A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms
Technical field
The present invention relates to the technical field of cyberspace safety, more particularly to a kind of label based on SM2 enciphering and deciphering algorithms Name sign test system and method.
Background technology
As network security problem is on the rise, the influence caused is increasing, and digital signature sign test is arisen at the historic moment;Numeral The reliability of user identity can be achieved in signature;Realize the integrality of information;Ensure data during storage, transmission and processing Exempt from it is any unauthorized or it is unexpected modification, insertion, delete, retransmit etc. destruction so that realize the authenticity of data, effectively Property and uniformity;Non-repudiation is realized, the sender for ensuring information by digital signature can not deny the information once sent, no The operation behavior of oneself can be denied.
SM2 algorithms are the ellipse curve public key cipher algorithms that national Password Management office issued on December 17th, 2010, its The more advanced safety compared with RSA Algorithm, is applied to digital signature sign test.
Many software approach realize that the computing module in SM2 signature sign test steps all employs OpenSSL condoms at present Word layer cryptographic libraries are connect, this includes main cryptographic algorithm, conventional key and certificate encapsulation manager function and ssl protocol, and carries Used for abundant application program for test or other purposes.But have the disadvantage:(1) OpenSSL, which is exposed, occurs in that severe safety leaks Hole, hacker can directly initiate PC " heart bleeding " (Heartbleed) attack using this leak;Have big on Windows Software is measured using the OpenSSL code libraries that there is leak, the internal storage data on user computer, peace may be captured by assault Full property is poor.(2) simple to realize SM2 signature sign tests using software approach, its arithmetic speed is slower, it is impossible to meet the need of user Ask.
And if signature sign test is merely realized by hardware, its inoperable property and poor compatibility also determine its with The paces in not upper diversification epoch.
The content of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of software-hardware synergism cooperation, it is safe, can The high signature sign test system based on SM2 enciphering and deciphering algorithms of strong, the compatible good, operation efficiency of control property.
To achieve the above object, technical scheme provided by the present invention is:Including software module and hardware module;It is described hard Part module includes computing module, register and randomizer;Wherein,
The randomizer, produces the random number for algorithm, carries out the symmetrical close of encryption and decryption to bright ciphertext respectively Key, respectively to symmetric key carry out encryption and decryption recipient's public key and private key and respectively to summary and digital signature be encrypted With the sender's private key and public key of decryption;
The computing module, the algorithm for SM2, SM3 and SM4 in computing encryption process;Three kinds of algorithms are The close algorithm of state, is issued by State Commercial Cryptography Administration;Wherein, SM2 algorithms are ellipse curve public key cipher algorithm, and SM2 standards include general provisions, Digital Signature Algorithm, IKE, four parts of public key encryption algorithm, Digital Signature Algorithm, IKE and Public key encryption algorithm all employ the SM3 algorithms and randomizer of national close management board's approval;SM3 algorithms are calculated for hash Method, gives the computational methods and calculation procedure of Hashing function algorithms, it is adaptable to commercial cipher application in digital signature and test Card, generation and checking and the generation of random number of message authentication code, can meet the demand for security of a variety of cipher applications;SM4 is Symmetry algorithm, a grouping algorithm, for Wireless LAN Equipments;Decipherment algorithm is identical with the structure of AES, simply takes turns The use order of key is on the contrary, decryption round key is the backward of encryption round key.
The software module, for realizing signature sign test function;
The register, by software module access scheduling computing module.
To achieve the above object, the present invention also provides a kind of for the signature sign test system based on SM2 enciphering and deciphering algorithms Method, it includes encrypted signature and sign test decryption, wherein,
Encrypted signature comprises the following steps:
1) randomizer is called to produce symmetric key, sender's public key and private key, recipient's public key and private key;
2) software module carries out SM4 AES computings by accessing register scheduling computation module, makes in symmetric key On the basis of the plaintext to be sent is encrypted, obtain message ciphertext;
3) software module carries out SM2 AES computings by accessing register scheduling computation module, makes public in recipient Symmetric key is encrypted on the basis of key, symmetric key ciphertext is obtained;
4) software module is by accessing register scheduling computation module to step 2) obtained message ciphertext carries out SM3 algorithms Computing, forms summary;
5) software module carries out SM2 AES computings by accessing register scheduling computation module, makes private in sender To step 4 on the basis of key) formed summary be encrypted, generate digital signature;
6) digital signature and message ciphertext are sent jointly to recipient by sender;
Sign test decryption comprises the following steps:
(1 recipient receives the digital signature and message ciphertext sended over;
(2 software modules carry out SM3 algorithm computings by accessing register scheduling computation module to message ciphertext, obtain new Summary;
(3 software modules carry out SM2 decipherment algorithm computings by accessing register scheduling computation module, make public in sender Digital signature is decrypted on the basis of key, original summary is obtained;
(4 pairs of two summaries are contrasted, and software module is carried out by accessing register scheduling computation module if identical SM2 decipherment algorithm computings, make symmetric key ciphertext is decrypted on the basis of recipient's private key, obtain symmetric key;
(5 software modules carry out SM4 algorithm computings by accessing register scheduling computation module, make the base in symmetric key Message ciphertext is decrypted on plinth, obtained in plain text.
Further, the SM3 algorithms are realized by software-hardware synergism, wherein, SM3 algorithms are performed by computing module, process It is as follows:
1)) fill
SM3 is less than to message-length for 2^64 progress computings, it is assumed that the length of message m is l bits, first by bit " 1 " It is added to the end of message, another addition k " 0 ", k is the minimum nonnegative integer for meeting l+1+k=448mod512, Ran Houling Add 64 Bit Strings, the Bit String is length l binary representation, message m after filling ' bit length be 512 Multiple;
2)) Iteration Contraction
Extension of message is first carried out, afterwards iteration and compression, it extends calculates based on cyclic shift with compression, and has XOR Calculate, carry out 64 wheel iteration after the message of filling is expanded again, finally calculate hash result;
The software scheduling portion of SM3 algorithms is as follows:
By configuring the address of hardware register, all interface registers are conducted interviews, wherein needing having for scheduling Status register, control register and data register;According to the difference of big small end, input register is write data into, is passed through Corresponding computing is realized in operation to control register, the reading to status register, judges whether calculating completes, and is being calculated Value into rear reading output register is used as output.
Further, the SM2 enciphering and deciphering algorithms are realized that calculating section is realized by computing module by software-hardware synergism, soft Realize signature sign test function in part part.
Further, the SM2 enciphering and deciphering algorithms need to pre-process input data during realizing signature sign test, The data used in pretreatment using big end representation, need to try to achieve the Hash Value of byte stream twice in the process, finally Hash Value be that the summary of plaintext is used as the real input of signature function.
Further, the SM2 enciphering and deciphering algorithms include modular arithmetic and point processing;Wherein, modular arithmetic add including mould, mould Subtract, modular multiplication, mould it is inverse, modular multiplication uses alternate algorithm, and mould is inverse to use binary system euler algorithm, while by modular multiplication, mould is inverse merges Realize that mould is inverse to multiply;Point processing include point plus, dot product, point doubling, point plus, times point scheduling introduce projection coordinate, reduce mould it is inverse Operation time.
This programme principle and advantage are as follows:
The random number produced during signature sign test is produced by randomizer, is greatly enhanced the security of data; Arithmetic section in scheme realizes that software module realizes signature sign test function, by software-hardware synergism cooperation by hardware module, Realized compared to pure software, be greatly enhanced arithmetic speed, can with stronger compared to pure hard-wired inoperable property Control, programmable, portable, compatibility.
Brief description of the drawings
Fig. 1 is encryption and decryption flow chart of the invention;
Fig. 2 is the structural representation of system in the present invention.
Embodiment
With reference to specific embodiment, the invention will be further described:
Referring to shown in accompanying drawing 1-2, a kind of signature sign test system based on SM2 enciphering and deciphering algorithms described in the present embodiment is wrapped Include software module 1 and hardware module 2;The hardware module 2 includes computing module 3, register 4 and randomizer 5;Its In,
The randomizer 5, produces the random number for algorithm, carries out the symmetrical close of encryption and decryption to bright ciphertext respectively Key, respectively to symmetric key carry out encryption and decryption recipient's public key and private key and respectively to summary and digital signature be encrypted With the sender's private key and public key of decryption;
Computing module 3, the algorithm for SM2, SM3 and SM4 in computing encryption process;
Software module 1, for realizing signature sign test function;
Register 4, by the access scheduling computing module 3 of software module 1.
During encrypted signature, by following steps:
1) randomizer is called to produce symmetric key, sender's public key and private key, recipient's public key and private key;
2) software module 1 carries out SM4 AES computings by accessing the scheduling computation module 3 of register 4, makes symmetrical close The plaintext to be sent is encrypted on the basis of key, message ciphertext is obtained;
3) software module 1 carries out SM2 AES computings by accessing the scheduling computation module 3 of register 4, makes in recipient Symmetric key is encrypted on the basis of public key, symmetric key ciphertext is obtained;
4) software module 1 is by accessing the scheduling computation module 3 of register 4 to step 2) obtained message ciphertext carries out SM3 Algorithm computing, forms summary;
5) software module 1 carries out SM2 AES computings by accessing the scheduling computation module 3 of register 4, makes in sender To step 4 on the basis of private key) formed summary be encrypted, generate digital signature;
6) digital signature and message ciphertext are sent jointly to recipient by sender;
During encrypted signature, by following steps:
(1 recipient receives the digital signature and message ciphertext sended over;
(2 software modules 1 carry out SM3 algorithm computings by accessing the scheduling computation module 3 of register 4 to message ciphertext, obtain New summary;
(3 software modules 1 carry out SM2 decipherment algorithm computings by accessing the scheduling computation module 3 of register 4, make in sender Digital signature is decrypted on the basis of public key, original summary is obtained;
(4 pairs of two summaries are contrasted, and software module 1 is entered by accessing the scheduling computation module 3 of register 4 if identical Row SM2 decipherment algorithm computings, make symmetric key ciphertext is decrypted on the basis of recipient's private key, obtain symmetric key;
(5 software modules 1 carry out SM4 algorithm computings by accessing the scheduling computation module 3 of register 4, make in symmetric key On the basis of message ciphertext is decrypted, obtain in plain text.
In the present embodiment, SM2 and SM3 algorithms are realized by software-hardware synergism.Wherein, SM2 algorithms are in hardware module 2 Computing module 3 is performed, and its enciphering and deciphering algorithm includes modular arithmetic and point processing, and modular arithmetic adds including mould, mould subtracts, modular multiplication, mould are inverse, mould Multiplication uses alternate algorithm, and mould is inverse to use binary system euler algorithm, multiplies while modular multiplication, the inverse merging of mould are realized into mould is inverse;Point fortune Calculation include a little plus, dot product, point doubling, point plus, times point scheduling introducing projection coordinate, reduction mould inverse operation time.
SM2 enciphering and deciphering algorithms need to pre-process input data during realizing signature sign test, are used in pretreatment Data using big end representation, need to try to achieve the Hash Value of byte stream twice in the process, final Hash Value is bright Text summary as signature function real input.
And SM3 algorithms are performed by computing module, process is as follows:
1)) fill
SM3 is less than to message-length for 2^64 progress computings, it is assumed that the length of message m is l bits, first by bit " 1 " It is added to the end of message, another addition k " 0 ", k is the minimum nonnegative integer for meeting l+1+k=448mod512, Ran Houling Add 64 Bit Strings, the Bit String is length l binary representation, message m after filling ' bit length be 512 Multiple;
3)) Iteration Contraction
Extension of message is first carried out, afterwards iteration and compression, it extends calculates based on cyclic shift with compression, and has XOR Calculate, carry out 64 wheel iteration after the message of filling is expanded again, finally calculate hash result;
The software scheduling portion of SM3 algorithms is as follows:
By configuring the address of hardware register, all interface registers are conducted interviews, wherein needing having for scheduling Status register, control register and data register;According to the difference of big small end, input register is write data into, is passed through Corresponding computing is realized in operation to control register, the reading to status register, judges whether calculating completes, and is being calculated Value into rear reading output register is used as output.
In the present embodiment, the random number produced during signature sign test is produced by randomizer, is drastically increased The security of data;Arithmetic section in scheme realizes that software module realizes signature sign test function, by soft by hardware module Hardware cooperative cooperating, realizes compared to pure software and drastically increases arithmetic speed, hard-wired inoperable compared to pure Property, with stronger controllable, programmable, portable, compatibility.
Examples of implementation described above are only the preferred embodiments of the invention, and the implementation model of the present invention is not limited with this Enclose, therefore the change that all shape, principles according to the present invention are made, it all should cover within the scope of the present invention.

Claims (6)

1. a kind of signature sign test system based on SM2 enciphering and deciphering algorithms, it is characterised in that:Including software module (1) and hardware mould Block (2);The hardware module (2) includes computing module (3), register (4) and randomizer (5);Wherein,
The randomizer (5), produces the random number for algorithm, carries out the symmetrical close of encryption and decryption to bright ciphertext respectively Key, respectively to symmetric key carry out encryption and decryption recipient's public key and private key and respectively to summary and digital signature be encrypted With the sender's private key and public key of decryption;
The computing module (3), the algorithm for SM2, SM3 and SM4 in computing encryption process;
The software module (1), for realizing signature sign test function;
The register (4), by software module (1) access scheduling computing module (3).
2. a kind of method of signature sign test system based on SM2 enciphering and deciphering algorithms for described in claim 1, its feature exists In:Decrypted including encrypted signature and sign test, wherein,
Encrypted signature comprises the following steps:
1) randomizer is called to produce symmetric key, sender's public key and private key, recipient's public key and private key;
2) software module carries out SM4 AES computings by accessing register scheduling computation module, makes the base in symmetric key The plaintext to be sent is encrypted on plinth, message ciphertext is obtained;
3) software module carries out SM2 AES computings by accessing register scheduling computation module, makes in recipient's public key On the basis of symmetric key is encrypted, obtain symmetric key ciphertext;
4) software module is by accessing register scheduling computation module to step 2) obtained message ciphertext carries out SM3 algorithm fortune Calculate, form summary;
5) software module carries out SM2 AES computings by accessing register scheduling computation module, makes in sender's private key On the basis of to step 4) formed summary be encrypted, generate digital signature;
6) digital signature and message ciphertext are sent jointly to recipient by sender;
Sign test decryption comprises the following steps:
(1 recipient receives the digital signature and message ciphertext sended over;
(2 software modules carry out SM3 algorithm computings by accessing register scheduling computation module to message ciphertext, obtain new pluck Will;
(3 software modules carry out SM2 decipherment algorithm computings by accessing register scheduling computation module, make in sender's public key On the basis of digital signature is decrypted, obtain original summary;
(4 pairs of two summaries are contrasted, and software module carries out SM2 solutions by accessing register scheduling computation module if identical Close algorithm computing, makes symmetric key ciphertext is decrypted on the basis of recipient's private key, obtains symmetric key;
(5 software modules carry out SM4 algorithm computings by accessing register scheduling computation module, make on the basis of symmetric key Message ciphertext is decrypted, obtained in plain text.
3. a kind of method for the signature sign test system based on SM2 enciphering and deciphering algorithms according to claim 2, its feature It is:The SM3 algorithms are realized by software-hardware synergism, wherein, SM3 algorithms are performed by computing module, and process is as follows:
1)) fill
SM3 is less than to message-length for 2^64 progress computings, it is assumed that the length of message m is l bits, first adds bit " 1 " To the end of message, another addition k " 0 ", k is the minimum nonnegative integer for meeting l+1+k=448mod512, then another addition One 64 Bit String, the Bit String is length l binary representation, message m after filling ' bit length for 512 times Number;
2)) Iteration Contraction
Extension of message is first carried out, afterwards iteration and compression, it extends calculates based on cyclic shift with compression, and has XOR meter Calculate, carry out 64 wheel iteration after the message of filling is expanded again, finally calculate hash result;
The software scheduling portion of SM3 algorithms is as follows:
By configuring the address of hardware register, all interface registers are conducted interviews, wherein needing the stateful of scheduling Register, control register and data register;According to the difference of big small end, input register is write data into, by control Corresponding computing is realized in the operation of register processed, the reading to status register, judges whether calculating completes, after the completion of calculating The value for reading output register is used as output.
4. a kind of method for the signature sign test system based on SM2 enciphering and deciphering algorithms according to claim 2, its feature It is:The SM2 enciphering and deciphering algorithms are realized that calculating section is realized by computing module by software-hardware synergism, and software section realizes label Name sign test function.
5. a kind of method for the signature sign test system based on SM2 enciphering and deciphering algorithms according to claim 4, its feature It is:The SM2 enciphering and deciphering algorithms need to pre-process input data during realizing signature sign test, are used in pretreatment Data using big end representation, need to try to achieve the Hash Value of byte stream twice in the process, final Hash Value is bright Text summary as signature function real input.
6. a kind of method for the signature sign test system based on SM2 enciphering and deciphering algorithms according to claim 4, its feature It is:The SM2 enciphering and deciphering algorithms include modular arithmetic and point processing;Wherein, modular arithmetic adds including mould, mould subtracts, modular multiplication, mould are inverse, Modular multiplication uses alternate algorithm, and mould is inverse to use binary system euler algorithm, multiplies while modular multiplication, the inverse merging of mould are realized into mould is inverse;Point Computing include point plus, dot product, point doubling, point plus, a times point scheduling introduce projection coordinate, reduce mould inverse operation time.
CN201710183058.8A 2017-03-24 2017-03-24 A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms Pending CN107147488A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710183058.8A CN107147488A (en) 2017-03-24 2017-03-24 A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710183058.8A CN107147488A (en) 2017-03-24 2017-03-24 A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms

Publications (1)

Publication Number Publication Date
CN107147488A true CN107147488A (en) 2017-09-08

Family

ID=59784131

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710183058.8A Pending CN107147488A (en) 2017-03-24 2017-03-24 A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms

Country Status (1)

Country Link
CN (1) CN107147488A (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107612680A (en) * 2017-09-14 2018-01-19 哈尔滨理工大学 A kind of national secret algorithm in mobile network's payment
CN107707536A (en) * 2017-09-26 2018-02-16 武汉默联股份有限公司 Commercial health insurance directly pays for straight pair of data transmission method and system between system and Shang Bao companies
CN108039947A (en) * 2017-12-05 2018-05-15 飞天诚信科技股份有限公司 A kind of SM2 endorsement methods using coprocessor attack resistance
CN108199841A (en) * 2018-02-08 2018-06-22 山东渔翁信息技术股份有限公司 A kind of SM2 keys operation method realized based on JCE frames and device
CN110071793A (en) * 2019-04-12 2019-07-30 苏州浪潮智能科技有限公司 A kind of random digit generation method and system based on BMC
CN110489370A (en) * 2019-07-15 2019-11-22 广东工业大学 A kind of pretreated hardware fill method of hash algorithm SHA256 message
CN110851888A (en) * 2019-10-12 2020-02-28 天津光电聚能专用通信设备有限公司 High-performance security encryption system with double-path heterogeneous function
CN111163108A (en) * 2020-02-04 2020-05-15 国网江苏省电力有限公司南京供电分公司 Electric power Internet of things security terminal chip composite encryption system and method
CN111314072A (en) * 2020-02-21 2020-06-19 北京邮电大学 Extensible identity authentication method and system based on SM2 algorithm
CN111555881A (en) * 2020-03-23 2020-08-18 中安云科科技发展(山东)有限公司 Method and system for realizing national secret SSL protocol by using SDF and SKF
CN111901363A (en) * 2020-08-12 2020-11-06 吉林大学 5G-Profibus-DP data encryption transmission device based on FPGA
CN112187461A (en) * 2020-09-28 2021-01-05 中国人民解放军海军航空大学 Weapon equipment data hybrid encryption method based on encryption algorithm
CN112260840A (en) * 2020-10-21 2021-01-22 上海创能国瑞数据系统有限公司 Disturbance encryption method based on sm4 encryption algorithm
CN112256602A (en) * 2020-10-22 2021-01-22 方一信息科技(上海)有限公司 PCIe SSD controller, data storage system and data transmission method
CN112632475A (en) * 2020-12-30 2021-04-09 郑州轻工业大学 Picture copyright protection system and method based on state password and picture steganography
CN112653554A (en) * 2020-12-30 2021-04-13 成都卫士通信息产业股份有限公司 Signature method, system, equipment and readable storage medium
CN113221193A (en) * 2021-06-02 2021-08-06 上海交通大学 SM2 digital signature and signature verification quick implementation method and system based on GPU
CN113505380A (en) * 2021-06-11 2021-10-15 山东云海国创云计算装备产业创新中心有限公司 BMC (baseboard management controller) safe starting method, device, equipment and medium based on state cryptographic algorithm
CN113630240A (en) * 2020-05-09 2021-11-09 成都天瑞芯安科技有限公司 Mimicry safety cipher computing model
CN113660087A (en) * 2021-07-06 2021-11-16 浙江传媒学院 SM9 identification cryptographic algorithm hardware implementation system based on finite field
CN114697095A (en) * 2022-03-23 2022-07-01 中山大学 Hybrid encryption and decryption method, system, device and medium
CN114826656A (en) * 2022-03-02 2022-07-29 国家电网有限公司大数据中心 Trusted data link transmission method and system
CN115208571A (en) * 2022-09-14 2022-10-18 中安网脉(北京)技术股份有限公司 Parallel multi-path hardware implementation method based on high-speed hybrid encryption algorithm
CN115242392A (en) * 2022-08-01 2022-10-25 北京成鑫盈通科技有限公司 Method and system for realizing industrial information safety transmission based on safety transmission protocol
CN115550042A (en) * 2022-10-08 2022-12-30 江南信安(北京)科技有限公司 Signature verification server for realizing national cryptographic algorithm based on security chip
CN116032490A (en) * 2023-01-09 2023-04-28 郑州轻工业大学 Fabric block chain construction method based on improved SM2 algorithm
WO2023151171A1 (en) * 2022-02-10 2023-08-17 中国科学院信息工程研究所 Elliptic curve digital signature calculation method resistant to memory information leakage attacks, and apparatus
CN113630240B (en) * 2020-05-09 2024-04-26 成都天瑞芯安科技有限公司 Mimicry secure password computing system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761413B (en) * 2011-04-27 2015-06-10 航天信息股份有限公司 Implementation system of p-element domain SM2 elliptic curve public key cryptographic algorithm

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761413B (en) * 2011-04-27 2015-06-10 航天信息股份有限公司 Implementation system of p-element domain SM2 elliptic curve public key cryptographic algorithm

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
丁佳莉: ""基于SM2加密算法的网络型电压监控系统的研发"", 《万方数据知识服务平台》 *
梦醒-已千年: ""加密解密、签名验签"", 《HTTPS://BLOG.CSDN.NET/U010102951/ARTICLE/DETAILS/39367707》 *
薛英花等: ""随机数发生器分析及其在安全信息系统中的应用"", 《计算机工程》 *
钟丽: ""基于ESL与SM2算法的软硬件协同设计与实现"", 《万方数据知识服务平台》 *

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107612680A (en) * 2017-09-14 2018-01-19 哈尔滨理工大学 A kind of national secret algorithm in mobile network's payment
CN107707536A (en) * 2017-09-26 2018-02-16 武汉默联股份有限公司 Commercial health insurance directly pays for straight pair of data transmission method and system between system and Shang Bao companies
CN108039947A (en) * 2017-12-05 2018-05-15 飞天诚信科技股份有限公司 A kind of SM2 endorsement methods using coprocessor attack resistance
CN108039947B (en) * 2017-12-05 2020-10-13 飞天诚信科技股份有限公司 SM2 signature method for resisting attack by using coprocessor
CN108199841A (en) * 2018-02-08 2018-06-22 山东渔翁信息技术股份有限公司 A kind of SM2 keys operation method realized based on JCE frames and device
CN110071793B (en) * 2019-04-12 2023-01-06 苏州浪潮智能科技有限公司 Random number generation method and system based on BMC
CN110071793A (en) * 2019-04-12 2019-07-30 苏州浪潮智能科技有限公司 A kind of random digit generation method and system based on BMC
CN110489370A (en) * 2019-07-15 2019-11-22 广东工业大学 A kind of pretreated hardware fill method of hash algorithm SHA256 message
CN110489370B (en) * 2019-07-15 2023-05-23 广东工业大学 Hardware filling method for preprocessing SHA256 message of hash algorithm
CN110851888A (en) * 2019-10-12 2020-02-28 天津光电聚能专用通信设备有限公司 High-performance security encryption system with double-path heterogeneous function
CN111163108A (en) * 2020-02-04 2020-05-15 国网江苏省电力有限公司南京供电分公司 Electric power Internet of things security terminal chip composite encryption system and method
CN111314072A (en) * 2020-02-21 2020-06-19 北京邮电大学 Extensible identity authentication method and system based on SM2 algorithm
CN111555881A (en) * 2020-03-23 2020-08-18 中安云科科技发展(山东)有限公司 Method and system for realizing national secret SSL protocol by using SDF and SKF
CN113630240A (en) * 2020-05-09 2021-11-09 成都天瑞芯安科技有限公司 Mimicry safety cipher computing model
CN113630240B (en) * 2020-05-09 2024-04-26 成都天瑞芯安科技有限公司 Mimicry secure password computing system
CN111901363A (en) * 2020-08-12 2020-11-06 吉林大学 5G-Profibus-DP data encryption transmission device based on FPGA
CN112187461A (en) * 2020-09-28 2021-01-05 中国人民解放军海军航空大学 Weapon equipment data hybrid encryption method based on encryption algorithm
CN112260840A (en) * 2020-10-21 2021-01-22 上海创能国瑞数据系统有限公司 Disturbance encryption method based on sm4 encryption algorithm
CN112256602A (en) * 2020-10-22 2021-01-22 方一信息科技(上海)有限公司 PCIe SSD controller, data storage system and data transmission method
CN112632475A (en) * 2020-12-30 2021-04-09 郑州轻工业大学 Picture copyright protection system and method based on state password and picture steganography
CN112653554A (en) * 2020-12-30 2021-04-13 成都卫士通信息产业股份有限公司 Signature method, system, equipment and readable storage medium
CN112632475B (en) * 2020-12-30 2024-03-29 郑州轻工业大学 Picture copyright protection system and method based on national password and picture steganography
CN113221193A (en) * 2021-06-02 2021-08-06 上海交通大学 SM2 digital signature and signature verification quick implementation method and system based on GPU
CN113221193B (en) * 2021-06-02 2022-07-29 上海交通大学 SM2 digital signature and signature verification quick implementation method and system based on GPU
CN113505380A (en) * 2021-06-11 2021-10-15 山东云海国创云计算装备产业创新中心有限公司 BMC (baseboard management controller) safe starting method, device, equipment and medium based on state cryptographic algorithm
CN113660087B (en) * 2021-07-06 2023-09-26 浙江传媒学院 SM9 identification cipher algorithm hardware realization system based on finite field
CN113660087A (en) * 2021-07-06 2021-11-16 浙江传媒学院 SM9 identification cryptographic algorithm hardware implementation system based on finite field
WO2023151171A1 (en) * 2022-02-10 2023-08-17 中国科学院信息工程研究所 Elliptic curve digital signature calculation method resistant to memory information leakage attacks, and apparatus
CN114826656A (en) * 2022-03-02 2022-07-29 国家电网有限公司大数据中心 Trusted data link transmission method and system
CN114697095A (en) * 2022-03-23 2022-07-01 中山大学 Hybrid encryption and decryption method, system, device and medium
CN115242392A (en) * 2022-08-01 2022-10-25 北京成鑫盈通科技有限公司 Method and system for realizing industrial information safety transmission based on safety transmission protocol
CN115242392B (en) * 2022-08-01 2024-03-26 北京成鑫盈通科技有限公司 Method and system for realizing industrial information safety transmission based on safety transmission protocol
CN115208571A (en) * 2022-09-14 2022-10-18 中安网脉(北京)技术股份有限公司 Parallel multi-path hardware implementation method based on high-speed hybrid encryption algorithm
CN115550042A (en) * 2022-10-08 2022-12-30 江南信安(北京)科技有限公司 Signature verification server for realizing national cryptographic algorithm based on security chip
CN116032490A (en) * 2023-01-09 2023-04-28 郑州轻工业大学 Fabric block chain construction method based on improved SM2 algorithm
CN116032490B (en) * 2023-01-09 2023-10-03 郑州轻工业大学 Fabric block chain construction method based on improved SM2 algorithm

Similar Documents

Publication Publication Date Title
CN107147488A (en) A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms
US20220141038A1 (en) Method of rsa signature or decryption protected using a homomorphic encryption
Asharov et al. More efficient oblivious transfer and extensions for faster secure computation
CN110313146B (en) Ambiguity enhancement
CN107395368B (en) Digital signature method, decapsulation method and decryption method in media-free environment
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
CN104270247B (en) Suitable for the efficient general Hash functions authentication method of quantum cryptography system
CN110958219B (en) SM2 proxy re-encryption method and device for medical cloud shared data
CN108111295B (en) Homomorphic encryption method based on analog-to-analog operation
CN109818741B (en) Decryption calculation method and device based on elliptic curve
EP3596876B1 (en) Elliptic curve point multiplication device and method for signing a message in a white-box context
WO2021114850A1 (en) Method and apparatus for encrypting and decrypting and reading and writing messages, computer device, and storage medium
CN110061957A (en) Data encryption, decryption method, user terminal, server and data management system
CN107634946A (en) A kind of micro services node legitimacy verification method and device
CN114697095A (en) Hybrid encryption and decryption method, system, device and medium
Mohamed New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA
CN113784342B (en) Encryption communication method and system based on Internet of things terminal
CN115987500A (en) Data safety transmission method and system based on industrial equipment data acquisition
CN112907247B (en) Block chain authorization calculation control method
Vennela et al. Performance analysis of cryptographic algorithms for cloud security
CN107465508A (en) A kind of method, system and the equipment of software and hardware combining construction true random number
US20130058483A1 (en) Public key cryptosystem and technique
CN112713989B (en) Decryption method and device
CN112507357A (en) Multi-level interface design method based on key generator
Omerasevic et al. CryptoStego—A novel approach for creating cryptographic keys and messages

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170908