CN107147488A - A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms - Google Patents
A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms Download PDFInfo
- Publication number
- CN107147488A CN107147488A CN201710183058.8A CN201710183058A CN107147488A CN 107147488 A CN107147488 A CN 107147488A CN 201710183058 A CN201710183058 A CN 201710183058A CN 107147488 A CN107147488 A CN 107147488A
- Authority
- CN
- China
- Prior art keywords
- register
- module
- software
- sign test
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The present invention relates to a kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms, system includes software module and hardware module;Hardware module includes computing module, register and randomizer;Randomizer produces the random number for algorithm, symmetric key, sender's public key and private key, recipient's public key and private key;Computing module, the algorithm for SM2, SM3, SM4 in computing encryption process;Software module, for realizing signature sign test function;Register, by software module access scheduling computing module.The random number produced during present invention signature sign test is produced by randomizer, drastically increases the security of data;Arithmetic section realizes that software module realizes signature sign test function by hardware module, by software-hardware synergism cooperation, is realized compared to pure software, drastically increases arithmetic speed;Compared to pure hard-wired inoperable property, with stronger controllable, programmable, portable, compatibility.
Description
Technical field
The present invention relates to the technical field of cyberspace safety, more particularly to a kind of label based on SM2 enciphering and deciphering algorithms
Name sign test system and method.
Background technology
As network security problem is on the rise, the influence caused is increasing, and digital signature sign test is arisen at the historic moment;Numeral
The reliability of user identity can be achieved in signature;Realize the integrality of information;Ensure data during storage, transmission and processing
Exempt from it is any unauthorized or it is unexpected modification, insertion, delete, retransmit etc. destruction so that realize the authenticity of data, effectively
Property and uniformity;Non-repudiation is realized, the sender for ensuring information by digital signature can not deny the information once sent, no
The operation behavior of oneself can be denied.
SM2 algorithms are the ellipse curve public key cipher algorithms that national Password Management office issued on December 17th, 2010, its
The more advanced safety compared with RSA Algorithm, is applied to digital signature sign test.
Many software approach realize that the computing module in SM2 signature sign test steps all employs OpenSSL condoms at present
Word layer cryptographic libraries are connect, this includes main cryptographic algorithm, conventional key and certificate encapsulation manager function and ssl protocol, and carries
Used for abundant application program for test or other purposes.But have the disadvantage:(1) OpenSSL, which is exposed, occurs in that severe safety leaks
Hole, hacker can directly initiate PC " heart bleeding " (Heartbleed) attack using this leak;Have big on Windows
Software is measured using the OpenSSL code libraries that there is leak, the internal storage data on user computer, peace may be captured by assault
Full property is poor.(2) simple to realize SM2 signature sign tests using software approach, its arithmetic speed is slower, it is impossible to meet the need of user
Ask.
And if signature sign test is merely realized by hardware, its inoperable property and poor compatibility also determine its with
The paces in not upper diversification epoch.
The content of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of software-hardware synergism cooperation, it is safe, can
The high signature sign test system based on SM2 enciphering and deciphering algorithms of strong, the compatible good, operation efficiency of control property.
To achieve the above object, technical scheme provided by the present invention is:Including software module and hardware module;It is described hard
Part module includes computing module, register and randomizer;Wherein,
The randomizer, produces the random number for algorithm, carries out the symmetrical close of encryption and decryption to bright ciphertext respectively
Key, respectively to symmetric key carry out encryption and decryption recipient's public key and private key and respectively to summary and digital signature be encrypted
With the sender's private key and public key of decryption;
The computing module, the algorithm for SM2, SM3 and SM4 in computing encryption process;Three kinds of algorithms are
The close algorithm of state, is issued by State Commercial Cryptography Administration;Wherein, SM2 algorithms are ellipse curve public key cipher algorithm, and SM2 standards include general provisions,
Digital Signature Algorithm, IKE, four parts of public key encryption algorithm, Digital Signature Algorithm, IKE and
Public key encryption algorithm all employ the SM3 algorithms and randomizer of national close management board's approval;SM3 algorithms are calculated for hash
Method, gives the computational methods and calculation procedure of Hashing function algorithms, it is adaptable to commercial cipher application in digital signature and test
Card, generation and checking and the generation of random number of message authentication code, can meet the demand for security of a variety of cipher applications;SM4 is
Symmetry algorithm, a grouping algorithm, for Wireless LAN Equipments;Decipherment algorithm is identical with the structure of AES, simply takes turns
The use order of key is on the contrary, decryption round key is the backward of encryption round key.
The software module, for realizing signature sign test function;
The register, by software module access scheduling computing module.
To achieve the above object, the present invention also provides a kind of for the signature sign test system based on SM2 enciphering and deciphering algorithms
Method, it includes encrypted signature and sign test decryption, wherein,
Encrypted signature comprises the following steps:
1) randomizer is called to produce symmetric key, sender's public key and private key, recipient's public key and private key;
2) software module carries out SM4 AES computings by accessing register scheduling computation module, makes in symmetric key
On the basis of the plaintext to be sent is encrypted, obtain message ciphertext;
3) software module carries out SM2 AES computings by accessing register scheduling computation module, makes public in recipient
Symmetric key is encrypted on the basis of key, symmetric key ciphertext is obtained;
4) software module is by accessing register scheduling computation module to step 2) obtained message ciphertext carries out SM3 algorithms
Computing, forms summary;
5) software module carries out SM2 AES computings by accessing register scheduling computation module, makes private in sender
To step 4 on the basis of key) formed summary be encrypted, generate digital signature;
6) digital signature and message ciphertext are sent jointly to recipient by sender;
Sign test decryption comprises the following steps:
(1 recipient receives the digital signature and message ciphertext sended over;
(2 software modules carry out SM3 algorithm computings by accessing register scheduling computation module to message ciphertext, obtain new
Summary;
(3 software modules carry out SM2 decipherment algorithm computings by accessing register scheduling computation module, make public in sender
Digital signature is decrypted on the basis of key, original summary is obtained;
(4 pairs of two summaries are contrasted, and software module is carried out by accessing register scheduling computation module if identical
SM2 decipherment algorithm computings, make symmetric key ciphertext is decrypted on the basis of recipient's private key, obtain symmetric key;
(5 software modules carry out SM4 algorithm computings by accessing register scheduling computation module, make the base in symmetric key
Message ciphertext is decrypted on plinth, obtained in plain text.
Further, the SM3 algorithms are realized by software-hardware synergism, wherein, SM3 algorithms are performed by computing module, process
It is as follows:
1)) fill
SM3 is less than to message-length for 2^64 progress computings, it is assumed that the length of message m is l bits, first by bit " 1 "
It is added to the end of message, another addition k " 0 ", k is the minimum nonnegative integer for meeting l+1+k=448mod512, Ran Houling
Add 64 Bit Strings, the Bit String is length l binary representation, message m after filling ' bit length be 512
Multiple;
2)) Iteration Contraction
Extension of message is first carried out, afterwards iteration and compression, it extends calculates based on cyclic shift with compression, and has XOR
Calculate, carry out 64 wheel iteration after the message of filling is expanded again, finally calculate hash result;
The software scheduling portion of SM3 algorithms is as follows:
By configuring the address of hardware register, all interface registers are conducted interviews, wherein needing having for scheduling
Status register, control register and data register;According to the difference of big small end, input register is write data into, is passed through
Corresponding computing is realized in operation to control register, the reading to status register, judges whether calculating completes, and is being calculated
Value into rear reading output register is used as output.
Further, the SM2 enciphering and deciphering algorithms are realized that calculating section is realized by computing module by software-hardware synergism, soft
Realize signature sign test function in part part.
Further, the SM2 enciphering and deciphering algorithms need to pre-process input data during realizing signature sign test,
The data used in pretreatment using big end representation, need to try to achieve the Hash Value of byte stream twice in the process, finally
Hash Value be that the summary of plaintext is used as the real input of signature function.
Further, the SM2 enciphering and deciphering algorithms include modular arithmetic and point processing;Wherein, modular arithmetic add including mould, mould
Subtract, modular multiplication, mould it is inverse, modular multiplication uses alternate algorithm, and mould is inverse to use binary system euler algorithm, while by modular multiplication, mould is inverse merges
Realize that mould is inverse to multiply;Point processing include point plus, dot product, point doubling, point plus, times point scheduling introduce projection coordinate, reduce mould it is inverse
Operation time.
This programme principle and advantage are as follows:
The random number produced during signature sign test is produced by randomizer, is greatly enhanced the security of data;
Arithmetic section in scheme realizes that software module realizes signature sign test function, by software-hardware synergism cooperation by hardware module,
Realized compared to pure software, be greatly enhanced arithmetic speed, can with stronger compared to pure hard-wired inoperable property
Control, programmable, portable, compatibility.
Brief description of the drawings
Fig. 1 is encryption and decryption flow chart of the invention;
Fig. 2 is the structural representation of system in the present invention.
Embodiment
With reference to specific embodiment, the invention will be further described:
Referring to shown in accompanying drawing 1-2, a kind of signature sign test system based on SM2 enciphering and deciphering algorithms described in the present embodiment is wrapped
Include software module 1 and hardware module 2;The hardware module 2 includes computing module 3, register 4 and randomizer 5;Its
In,
The randomizer 5, produces the random number for algorithm, carries out the symmetrical close of encryption and decryption to bright ciphertext respectively
Key, respectively to symmetric key carry out encryption and decryption recipient's public key and private key and respectively to summary and digital signature be encrypted
With the sender's private key and public key of decryption;
Computing module 3, the algorithm for SM2, SM3 and SM4 in computing encryption process;
Software module 1, for realizing signature sign test function;
Register 4, by the access scheduling computing module 3 of software module 1.
During encrypted signature, by following steps:
1) randomizer is called to produce symmetric key, sender's public key and private key, recipient's public key and private key;
2) software module 1 carries out SM4 AES computings by accessing the scheduling computation module 3 of register 4, makes symmetrical close
The plaintext to be sent is encrypted on the basis of key, message ciphertext is obtained;
3) software module 1 carries out SM2 AES computings by accessing the scheduling computation module 3 of register 4, makes in recipient
Symmetric key is encrypted on the basis of public key, symmetric key ciphertext is obtained;
4) software module 1 is by accessing the scheduling computation module 3 of register 4 to step 2) obtained message ciphertext carries out SM3
Algorithm computing, forms summary;
5) software module 1 carries out SM2 AES computings by accessing the scheduling computation module 3 of register 4, makes in sender
To step 4 on the basis of private key) formed summary be encrypted, generate digital signature;
6) digital signature and message ciphertext are sent jointly to recipient by sender;
During encrypted signature, by following steps:
(1 recipient receives the digital signature and message ciphertext sended over;
(2 software modules 1 carry out SM3 algorithm computings by accessing the scheduling computation module 3 of register 4 to message ciphertext, obtain
New summary;
(3 software modules 1 carry out SM2 decipherment algorithm computings by accessing the scheduling computation module 3 of register 4, make in sender
Digital signature is decrypted on the basis of public key, original summary is obtained;
(4 pairs of two summaries are contrasted, and software module 1 is entered by accessing the scheduling computation module 3 of register 4 if identical
Row SM2 decipherment algorithm computings, make symmetric key ciphertext is decrypted on the basis of recipient's private key, obtain symmetric key;
(5 software modules 1 carry out SM4 algorithm computings by accessing the scheduling computation module 3 of register 4, make in symmetric key
On the basis of message ciphertext is decrypted, obtain in plain text.
In the present embodiment, SM2 and SM3 algorithms are realized by software-hardware synergism.Wherein, SM2 algorithms are in hardware module 2
Computing module 3 is performed, and its enciphering and deciphering algorithm includes modular arithmetic and point processing, and modular arithmetic adds including mould, mould subtracts, modular multiplication, mould are inverse, mould
Multiplication uses alternate algorithm, and mould is inverse to use binary system euler algorithm, multiplies while modular multiplication, the inverse merging of mould are realized into mould is inverse;Point fortune
Calculation include a little plus, dot product, point doubling, point plus, times point scheduling introducing projection coordinate, reduction mould inverse operation time.
SM2 enciphering and deciphering algorithms need to pre-process input data during realizing signature sign test, are used in pretreatment
Data using big end representation, need to try to achieve the Hash Value of byte stream twice in the process, final Hash Value is bright
Text summary as signature function real input.
And SM3 algorithms are performed by computing module, process is as follows:
1)) fill
SM3 is less than to message-length for 2^64 progress computings, it is assumed that the length of message m is l bits, first by bit " 1 "
It is added to the end of message, another addition k " 0 ", k is the minimum nonnegative integer for meeting l+1+k=448mod512, Ran Houling
Add 64 Bit Strings, the Bit String is length l binary representation, message m after filling ' bit length be 512
Multiple;
3)) Iteration Contraction
Extension of message is first carried out, afterwards iteration and compression, it extends calculates based on cyclic shift with compression, and has XOR
Calculate, carry out 64 wheel iteration after the message of filling is expanded again, finally calculate hash result;
The software scheduling portion of SM3 algorithms is as follows:
By configuring the address of hardware register, all interface registers are conducted interviews, wherein needing having for scheduling
Status register, control register and data register;According to the difference of big small end, input register is write data into, is passed through
Corresponding computing is realized in operation to control register, the reading to status register, judges whether calculating completes, and is being calculated
Value into rear reading output register is used as output.
In the present embodiment, the random number produced during signature sign test is produced by randomizer, is drastically increased
The security of data;Arithmetic section in scheme realizes that software module realizes signature sign test function, by soft by hardware module
Hardware cooperative cooperating, realizes compared to pure software and drastically increases arithmetic speed, hard-wired inoperable compared to pure
Property, with stronger controllable, programmable, portable, compatibility.
Examples of implementation described above are only the preferred embodiments of the invention, and the implementation model of the present invention is not limited with this
Enclose, therefore the change that all shape, principles according to the present invention are made, it all should cover within the scope of the present invention.
Claims (6)
1. a kind of signature sign test system based on SM2 enciphering and deciphering algorithms, it is characterised in that:Including software module (1) and hardware mould
Block (2);The hardware module (2) includes computing module (3), register (4) and randomizer (5);Wherein,
The randomizer (5), produces the random number for algorithm, carries out the symmetrical close of encryption and decryption to bright ciphertext respectively
Key, respectively to symmetric key carry out encryption and decryption recipient's public key and private key and respectively to summary and digital signature be encrypted
With the sender's private key and public key of decryption;
The computing module (3), the algorithm for SM2, SM3 and SM4 in computing encryption process;
The software module (1), for realizing signature sign test function;
The register (4), by software module (1) access scheduling computing module (3).
2. a kind of method of signature sign test system based on SM2 enciphering and deciphering algorithms for described in claim 1, its feature exists
In:Decrypted including encrypted signature and sign test, wherein,
Encrypted signature comprises the following steps:
1) randomizer is called to produce symmetric key, sender's public key and private key, recipient's public key and private key;
2) software module carries out SM4 AES computings by accessing register scheduling computation module, makes the base in symmetric key
The plaintext to be sent is encrypted on plinth, message ciphertext is obtained;
3) software module carries out SM2 AES computings by accessing register scheduling computation module, makes in recipient's public key
On the basis of symmetric key is encrypted, obtain symmetric key ciphertext;
4) software module is by accessing register scheduling computation module to step 2) obtained message ciphertext carries out SM3 algorithm fortune
Calculate, form summary;
5) software module carries out SM2 AES computings by accessing register scheduling computation module, makes in sender's private key
On the basis of to step 4) formed summary be encrypted, generate digital signature;
6) digital signature and message ciphertext are sent jointly to recipient by sender;
Sign test decryption comprises the following steps:
(1 recipient receives the digital signature and message ciphertext sended over;
(2 software modules carry out SM3 algorithm computings by accessing register scheduling computation module to message ciphertext, obtain new pluck
Will;
(3 software modules carry out SM2 decipherment algorithm computings by accessing register scheduling computation module, make in sender's public key
On the basis of digital signature is decrypted, obtain original summary;
(4 pairs of two summaries are contrasted, and software module carries out SM2 solutions by accessing register scheduling computation module if identical
Close algorithm computing, makes symmetric key ciphertext is decrypted on the basis of recipient's private key, obtains symmetric key;
(5 software modules carry out SM4 algorithm computings by accessing register scheduling computation module, make on the basis of symmetric key
Message ciphertext is decrypted, obtained in plain text.
3. a kind of method for the signature sign test system based on SM2 enciphering and deciphering algorithms according to claim 2, its feature
It is:The SM3 algorithms are realized by software-hardware synergism, wherein, SM3 algorithms are performed by computing module, and process is as follows:
1)) fill
SM3 is less than to message-length for 2^64 progress computings, it is assumed that the length of message m is l bits, first adds bit " 1 "
To the end of message, another addition k " 0 ", k is the minimum nonnegative integer for meeting l+1+k=448mod512, then another addition
One 64 Bit String, the Bit String is length l binary representation, message m after filling ' bit length for 512 times
Number;
2)) Iteration Contraction
Extension of message is first carried out, afterwards iteration and compression, it extends calculates based on cyclic shift with compression, and has XOR meter
Calculate, carry out 64 wheel iteration after the message of filling is expanded again, finally calculate hash result;
The software scheduling portion of SM3 algorithms is as follows:
By configuring the address of hardware register, all interface registers are conducted interviews, wherein needing the stateful of scheduling
Register, control register and data register;According to the difference of big small end, input register is write data into, by control
Corresponding computing is realized in the operation of register processed, the reading to status register, judges whether calculating completes, after the completion of calculating
The value for reading output register is used as output.
4. a kind of method for the signature sign test system based on SM2 enciphering and deciphering algorithms according to claim 2, its feature
It is:The SM2 enciphering and deciphering algorithms are realized that calculating section is realized by computing module by software-hardware synergism, and software section realizes label
Name sign test function.
5. a kind of method for the signature sign test system based on SM2 enciphering and deciphering algorithms according to claim 4, its feature
It is:The SM2 enciphering and deciphering algorithms need to pre-process input data during realizing signature sign test, are used in pretreatment
Data using big end representation, need to try to achieve the Hash Value of byte stream twice in the process, final Hash Value is bright
Text summary as signature function real input.
6. a kind of method for the signature sign test system based on SM2 enciphering and deciphering algorithms according to claim 4, its feature
It is:The SM2 enciphering and deciphering algorithms include modular arithmetic and point processing;Wherein, modular arithmetic adds including mould, mould subtracts, modular multiplication, mould are inverse,
Modular multiplication uses alternate algorithm, and mould is inverse to use binary system euler algorithm, multiplies while modular multiplication, the inverse merging of mould are realized into mould is inverse;Point
Computing include point plus, dot product, point doubling, point plus, a times point scheduling introduce projection coordinate, reduce mould inverse operation time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710183058.8A CN107147488A (en) | 2017-03-24 | 2017-03-24 | A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710183058.8A CN107147488A (en) | 2017-03-24 | 2017-03-24 | A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107147488A true CN107147488A (en) | 2017-09-08 |
Family
ID=59784131
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710183058.8A Pending CN107147488A (en) | 2017-03-24 | 2017-03-24 | A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107147488A (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107612680A (en) * | 2017-09-14 | 2018-01-19 | 哈尔滨理工大学 | A kind of national secret algorithm in mobile network's payment |
CN107707536A (en) * | 2017-09-26 | 2018-02-16 | 武汉默联股份有限公司 | Commercial health insurance directly pays for straight pair of data transmission method and system between system and Shang Bao companies |
CN108039947A (en) * | 2017-12-05 | 2018-05-15 | 飞天诚信科技股份有限公司 | A kind of SM2 endorsement methods using coprocessor attack resistance |
CN108199841A (en) * | 2018-02-08 | 2018-06-22 | 山东渔翁信息技术股份有限公司 | A kind of SM2 keys operation method realized based on JCE frames and device |
CN110071793A (en) * | 2019-04-12 | 2019-07-30 | 苏州浪潮智能科技有限公司 | A kind of random digit generation method and system based on BMC |
CN110489370A (en) * | 2019-07-15 | 2019-11-22 | 广东工业大学 | A kind of pretreated hardware fill method of hash algorithm SHA256 message |
CN110851888A (en) * | 2019-10-12 | 2020-02-28 | 天津光电聚能专用通信设备有限公司 | High-performance security encryption system with double-path heterogeneous function |
CN111163108A (en) * | 2020-02-04 | 2020-05-15 | 国网江苏省电力有限公司南京供电分公司 | Electric power Internet of things security terminal chip composite encryption system and method |
CN111314072A (en) * | 2020-02-21 | 2020-06-19 | 北京邮电大学 | Extensible identity authentication method and system based on SM2 algorithm |
CN111555881A (en) * | 2020-03-23 | 2020-08-18 | 中安云科科技发展(山东)有限公司 | Method and system for realizing national secret SSL protocol by using SDF and SKF |
CN111901363A (en) * | 2020-08-12 | 2020-11-06 | 吉林大学 | 5G-Profibus-DP data encryption transmission device based on FPGA |
CN112187461A (en) * | 2020-09-28 | 2021-01-05 | 中国人民解放军海军航空大学 | Weapon equipment data hybrid encryption method based on encryption algorithm |
CN112260840A (en) * | 2020-10-21 | 2021-01-22 | 上海创能国瑞数据系统有限公司 | Disturbance encryption method based on sm4 encryption algorithm |
CN112256602A (en) * | 2020-10-22 | 2021-01-22 | 方一信息科技(上海)有限公司 | PCIe SSD controller, data storage system and data transmission method |
CN112632475A (en) * | 2020-12-30 | 2021-04-09 | 郑州轻工业大学 | Picture copyright protection system and method based on state password and picture steganography |
CN112653554A (en) * | 2020-12-30 | 2021-04-13 | 成都卫士通信息产业股份有限公司 | Signature method, system, equipment and readable storage medium |
CN113221193A (en) * | 2021-06-02 | 2021-08-06 | 上海交通大学 | SM2 digital signature and signature verification quick implementation method and system based on GPU |
CN113505380A (en) * | 2021-06-11 | 2021-10-15 | 山东云海国创云计算装备产业创新中心有限公司 | BMC (baseboard management controller) safe starting method, device, equipment and medium based on state cryptographic algorithm |
CN113630240A (en) * | 2020-05-09 | 2021-11-09 | 成都天瑞芯安科技有限公司 | Mimicry safety cipher computing model |
CN113660087A (en) * | 2021-07-06 | 2021-11-16 | 浙江传媒学院 | SM9 identification cryptographic algorithm hardware implementation system based on finite field |
CN114697095A (en) * | 2022-03-23 | 2022-07-01 | 中山大学 | Hybrid encryption and decryption method, system, device and medium |
CN114826656A (en) * | 2022-03-02 | 2022-07-29 | 国家电网有限公司大数据中心 | Trusted data link transmission method and system |
CN115208571A (en) * | 2022-09-14 | 2022-10-18 | 中安网脉(北京)技术股份有限公司 | Parallel multi-path hardware implementation method based on high-speed hybrid encryption algorithm |
CN115242392A (en) * | 2022-08-01 | 2022-10-25 | 北京成鑫盈通科技有限公司 | Method and system for realizing industrial information safety transmission based on safety transmission protocol |
CN115550042A (en) * | 2022-10-08 | 2022-12-30 | 江南信安(北京)科技有限公司 | Signature verification server for realizing national cryptographic algorithm based on security chip |
CN116032490A (en) * | 2023-01-09 | 2023-04-28 | 郑州轻工业大学 | Fabric block chain construction method based on improved SM2 algorithm |
WO2023151171A1 (en) * | 2022-02-10 | 2023-08-17 | 中国科学院信息工程研究所 | Elliptic curve digital signature calculation method resistant to memory information leakage attacks, and apparatus |
CN113630240B (en) * | 2020-05-09 | 2024-04-26 | 成都天瑞芯安科技有限公司 | Mimicry secure password computing system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102761413B (en) * | 2011-04-27 | 2015-06-10 | 航天信息股份有限公司 | Implementation system of p-element domain SM2 elliptic curve public key cryptographic algorithm |
-
2017
- 2017-03-24 CN CN201710183058.8A patent/CN107147488A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102761413B (en) * | 2011-04-27 | 2015-06-10 | 航天信息股份有限公司 | Implementation system of p-element domain SM2 elliptic curve public key cryptographic algorithm |
Non-Patent Citations (4)
Title |
---|
丁佳莉: ""基于SM2加密算法的网络型电压监控系统的研发"", 《万方数据知识服务平台》 * |
梦醒-已千年: ""加密解密、签名验签"", 《HTTPS://BLOG.CSDN.NET/U010102951/ARTICLE/DETAILS/39367707》 * |
薛英花等: ""随机数发生器分析及其在安全信息系统中的应用"", 《计算机工程》 * |
钟丽: ""基于ESL与SM2算法的软硬件协同设计与实现"", 《万方数据知识服务平台》 * |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107612680A (en) * | 2017-09-14 | 2018-01-19 | 哈尔滨理工大学 | A kind of national secret algorithm in mobile network's payment |
CN107707536A (en) * | 2017-09-26 | 2018-02-16 | 武汉默联股份有限公司 | Commercial health insurance directly pays for straight pair of data transmission method and system between system and Shang Bao companies |
CN108039947A (en) * | 2017-12-05 | 2018-05-15 | 飞天诚信科技股份有限公司 | A kind of SM2 endorsement methods using coprocessor attack resistance |
CN108039947B (en) * | 2017-12-05 | 2020-10-13 | 飞天诚信科技股份有限公司 | SM2 signature method for resisting attack by using coprocessor |
CN108199841A (en) * | 2018-02-08 | 2018-06-22 | 山东渔翁信息技术股份有限公司 | A kind of SM2 keys operation method realized based on JCE frames and device |
CN110071793B (en) * | 2019-04-12 | 2023-01-06 | 苏州浪潮智能科技有限公司 | Random number generation method and system based on BMC |
CN110071793A (en) * | 2019-04-12 | 2019-07-30 | 苏州浪潮智能科技有限公司 | A kind of random digit generation method and system based on BMC |
CN110489370A (en) * | 2019-07-15 | 2019-11-22 | 广东工业大学 | A kind of pretreated hardware fill method of hash algorithm SHA256 message |
CN110489370B (en) * | 2019-07-15 | 2023-05-23 | 广东工业大学 | Hardware filling method for preprocessing SHA256 message of hash algorithm |
CN110851888A (en) * | 2019-10-12 | 2020-02-28 | 天津光电聚能专用通信设备有限公司 | High-performance security encryption system with double-path heterogeneous function |
CN111163108A (en) * | 2020-02-04 | 2020-05-15 | 国网江苏省电力有限公司南京供电分公司 | Electric power Internet of things security terminal chip composite encryption system and method |
CN111314072A (en) * | 2020-02-21 | 2020-06-19 | 北京邮电大学 | Extensible identity authentication method and system based on SM2 algorithm |
CN111555881A (en) * | 2020-03-23 | 2020-08-18 | 中安云科科技发展(山东)有限公司 | Method and system for realizing national secret SSL protocol by using SDF and SKF |
CN113630240A (en) * | 2020-05-09 | 2021-11-09 | 成都天瑞芯安科技有限公司 | Mimicry safety cipher computing model |
CN113630240B (en) * | 2020-05-09 | 2024-04-26 | 成都天瑞芯安科技有限公司 | Mimicry secure password computing system |
CN111901363A (en) * | 2020-08-12 | 2020-11-06 | 吉林大学 | 5G-Profibus-DP data encryption transmission device based on FPGA |
CN112187461A (en) * | 2020-09-28 | 2021-01-05 | 中国人民解放军海军航空大学 | Weapon equipment data hybrid encryption method based on encryption algorithm |
CN112260840A (en) * | 2020-10-21 | 2021-01-22 | 上海创能国瑞数据系统有限公司 | Disturbance encryption method based on sm4 encryption algorithm |
CN112256602A (en) * | 2020-10-22 | 2021-01-22 | 方一信息科技(上海)有限公司 | PCIe SSD controller, data storage system and data transmission method |
CN112632475A (en) * | 2020-12-30 | 2021-04-09 | 郑州轻工业大学 | Picture copyright protection system and method based on state password and picture steganography |
CN112653554A (en) * | 2020-12-30 | 2021-04-13 | 成都卫士通信息产业股份有限公司 | Signature method, system, equipment and readable storage medium |
CN112632475B (en) * | 2020-12-30 | 2024-03-29 | 郑州轻工业大学 | Picture copyright protection system and method based on national password and picture steganography |
CN113221193A (en) * | 2021-06-02 | 2021-08-06 | 上海交通大学 | SM2 digital signature and signature verification quick implementation method and system based on GPU |
CN113221193B (en) * | 2021-06-02 | 2022-07-29 | 上海交通大学 | SM2 digital signature and signature verification quick implementation method and system based on GPU |
CN113505380A (en) * | 2021-06-11 | 2021-10-15 | 山东云海国创云计算装备产业创新中心有限公司 | BMC (baseboard management controller) safe starting method, device, equipment and medium based on state cryptographic algorithm |
CN113660087B (en) * | 2021-07-06 | 2023-09-26 | 浙江传媒学院 | SM9 identification cipher algorithm hardware realization system based on finite field |
CN113660087A (en) * | 2021-07-06 | 2021-11-16 | 浙江传媒学院 | SM9 identification cryptographic algorithm hardware implementation system based on finite field |
WO2023151171A1 (en) * | 2022-02-10 | 2023-08-17 | 中国科学院信息工程研究所 | Elliptic curve digital signature calculation method resistant to memory information leakage attacks, and apparatus |
CN114826656A (en) * | 2022-03-02 | 2022-07-29 | 国家电网有限公司大数据中心 | Trusted data link transmission method and system |
CN114697095A (en) * | 2022-03-23 | 2022-07-01 | 中山大学 | Hybrid encryption and decryption method, system, device and medium |
CN115242392A (en) * | 2022-08-01 | 2022-10-25 | 北京成鑫盈通科技有限公司 | Method and system for realizing industrial information safety transmission based on safety transmission protocol |
CN115242392B (en) * | 2022-08-01 | 2024-03-26 | 北京成鑫盈通科技有限公司 | Method and system for realizing industrial information safety transmission based on safety transmission protocol |
CN115208571A (en) * | 2022-09-14 | 2022-10-18 | 中安网脉(北京)技术股份有限公司 | Parallel multi-path hardware implementation method based on high-speed hybrid encryption algorithm |
CN115550042A (en) * | 2022-10-08 | 2022-12-30 | 江南信安(北京)科技有限公司 | Signature verification server for realizing national cryptographic algorithm based on security chip |
CN116032490A (en) * | 2023-01-09 | 2023-04-28 | 郑州轻工业大学 | Fabric block chain construction method based on improved SM2 algorithm |
CN116032490B (en) * | 2023-01-09 | 2023-10-03 | 郑州轻工业大学 | Fabric block chain construction method based on improved SM2 algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107147488A (en) | A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms | |
US20220141038A1 (en) | Method of rsa signature or decryption protected using a homomorphic encryption | |
Asharov et al. | More efficient oblivious transfer and extensions for faster secure computation | |
CN110313146B (en) | Ambiguity enhancement | |
CN107395368B (en) | Digital signature method, decapsulation method and decryption method in media-free environment | |
CN110401615B (en) | Identity authentication method, device, equipment, system and readable storage medium | |
CN104270247B (en) | Suitable for the efficient general Hash functions authentication method of quantum cryptography system | |
CN110958219B (en) | SM2 proxy re-encryption method and device for medical cloud shared data | |
CN108111295B (en) | Homomorphic encryption method based on analog-to-analog operation | |
CN109818741B (en) | Decryption calculation method and device based on elliptic curve | |
EP3596876B1 (en) | Elliptic curve point multiplication device and method for signing a message in a white-box context | |
WO2021114850A1 (en) | Method and apparatus for encrypting and decrypting and reading and writing messages, computer device, and storage medium | |
CN110061957A (en) | Data encryption, decryption method, user terminal, server and data management system | |
CN107634946A (en) | A kind of micro services node legitimacy verification method and device | |
CN114697095A (en) | Hybrid encryption and decryption method, system, device and medium | |
Mohamed | New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA | |
CN113784342B (en) | Encryption communication method and system based on Internet of things terminal | |
CN115987500A (en) | Data safety transmission method and system based on industrial equipment data acquisition | |
CN112907247B (en) | Block chain authorization calculation control method | |
Vennela et al. | Performance analysis of cryptographic algorithms for cloud security | |
CN107465508A (en) | A kind of method, system and the equipment of software and hardware combining construction true random number | |
US20130058483A1 (en) | Public key cryptosystem and technique | |
CN112713989B (en) | Decryption method and device | |
CN112507357A (en) | Multi-level interface design method based on key generator | |
Omerasevic et al. | CryptoStego—A novel approach for creating cryptographic keys and messages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170908 |