CN112968778A - Block chain state encryption algorithm conversion method and system, computer equipment and application - Google Patents

Block chain state encryption algorithm conversion method and system, computer equipment and application Download PDF

Info

Publication number
CN112968778A
CN112968778A CN202110156494.2A CN202110156494A CN112968778A CN 112968778 A CN112968778 A CN 112968778A CN 202110156494 A CN202110156494 A CN 202110156494A CN 112968778 A CN112968778 A CN 112968778A
Authority
CN
China
Prior art keywords
algorithm
block chain
cryptographic
blockchain
domestic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110156494.2A
Other languages
Chinese (zh)
Inventor
谢朝阳
刘明哲
马立川
付铭
裴庆祺
张锐
袁昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Xidian Lianrong Technology Co ltd
Xidian University
Original Assignee
Xi'an Xidian Lianrong Technology Co ltd
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Xidian Lianrong Technology Co ltd, Xidian University filed Critical Xi'an Xidian Lianrong Technology Co ltd
Priority to CN202110156494.2A priority Critical patent/CN112968778A/en
Publication of CN112968778A publication Critical patent/CN112968778A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention belongs to the technical field of block chain and domestic cryptography application, and discloses a block chain cryptographic algorithm conversion method, a system, computer equipment and application, wherein the block chain is collected by using the information of cryptography; according to the standard of the national cipher committee, a domestic encryption algorithm corresponding to the type of the cipher algorithm of the mainstream block chain system is obtained, and finally, the cryptography component is combined to be adaptive to the mainstream block chain system, so that componentization is realized. Information using cryptography is defined as: collecting information related to address generation, information related to transaction and information related to blocks in the block chain, and information needing negotiation in the communication process of the P2P network node. The core aim of the invention is to realize the autonomous controllability of the block chain industry in China; the safety of the block chain system is improved; the method provides a password suite with better performance for the current mainstream block chain platform, and promotes the development of the cryptography technology in China by attracting more participants to spontaneously add into a data ecosystem.

Description

Block chain state encryption algorithm conversion method and system, computer equipment and application
Technical Field
The invention belongs to the technical field of block chain and domestic cryptography application, and particularly relates to a block chain cryptographic algorithm conversion method, a block chain cryptographic algorithm conversion system, computer equipment and application.
Background
At present: the blockchain technology is originally derived from bitcoin, the blockchain is a type of distributed data storage and computing system which comprehensively utilizes technologies such as peer-to-peer networks, cryptographic algorithms, distributed consensus protocols, scripting languages and the like, and sometimes the blockchain is also called a distributed account book. The bitcoin adopts a distributed peer-to-peer network architecture, utilizes a digital signature technology to verify the transaction validity, synchronizes the node historical data by a consensus algorithm based on a workload certification (PoW), and combines the inherent economy.
The national cryptographic algorithm is the abbreviation of the commercial cryptographic algorithm of China, and is also the core of the national cryptographic system, and mainly comprises cryptographic algorithm standards such as SM2/SM3/SM4 and the like and application specifications thereof, wherein SM represents the commercial cryptographic technology which does not involve the national secret. Dividing the national cryptographic algorithm into a symmetric cryptographic algorithm, an asymmetric cryptographic algorithm and a Hash cryptographic algorithm, wherein the symmetric cryptographic algorithm comprises a block cryptographic algorithm SM4 and a stream cryptographic algorithm ZUC; asymmetric cryptography includes SM2 and SM9 algorithms; the hash cipher algorithm includes SM 3.
The block chain is based on a cryptography technology, and when the block chain is applied to actual services, the block chain has problems in privacy protection and application of a national cryptographic algorithm in the block chain at present:
(1) at present, the security threat of the network space is increasingly severe, and the issuing of a series of laws and regulations such as the equal security 2.0 and the cipher law promotes the enhancement of the cipher application and the guarantee of the security of the network space. However, currently, the mainstream blockchain platform commonly uses foreign cryptographic algorithms, such as ECDSA elliptic curve signature algorithm, SHA3 cryptographic hash algorithm, RIPEMD160 cryptographic hash algorithm, AES block cipher algorithm, etc. Most of these algorithms are those standardized in the united states.
(2) Because the development and optimization of the national secret algorithm involve a lot of expertise and are very labor-intensive, most companies also choose open-source national secret implementations (such as GmSSL) to integrate on the blockchain system, and the workload of integration is still very large because the blockchain system does not consider the compatibility problem of the national secret at the beginning of design.
(3) The domestic cryptographic algorithm lacks a publicly expandable interface in the blockchain architecture to provide user expandability. With the continuous development and change of the block chain field for the requirements of consensus algorithm, signature scheme, privacy protection, data security sharing and the like, the basic password covered by the domestic password system cannot meet the application requirements of the block chain, and a series of novel password schemes which can keep compatibility with the existing domestic password security parameters are urgently needed.
Through the above analysis, the problems and defects of the prior art are as follows:
(1) the current mainstream block chain system lacks the support of a national cryptographic algorithm and does not meet the information security level protection standard.
(1) The compatibility of the current cryptographic algorithm in a block chain system is poor, and the application running efficiency is low.
(2) The application expansibility of the current national encryption algorithm in a blockchain system is poor, and a set of complete national encryption blockchain system structure does not exist.
The difficulty in solving the above problems and defects is: how to effectively embody the national cryptographic algorithm system in the current mainstream block chain system on the premise of ensuring reliability, verifiability, non-repudiation and knowledge proofness; how to maintain the operation efficiency of the block chain system under the national secret system and realize effective embedding; algorithms such as cryptographic hash, public key cryptography and the like are applied to the bottom layer of the block chain, the security strength of the algorithms is gradually reduced along with the development of the technology, the research on the new generation of cryptographic algorithms and the engineering realization needs to be periodically and roll-type developed, and how to design a set of complete block chain system architecture with high expansibility, so that the effective packaging of the block chain on the bottom layer of the cryptography component is realized.
The significance of solving the problems and the defects is as follows: since the foreign cryptographic algorithm is unsafe and may be implanted into the backdoor, the use of the substituted foreign cryptographic algorithm can realize the autonomous control in the true sense. If the door lock is manufactured by foreign technologies and foreign countries, the door lock is equivalent to the situation that the national gate is completely opened and faces important safety risks, the current situation that the core technology is limited by people is changed, and the password technology is comprehensively replaced in a domesticated way. The blockchain architecture mainly comprises a password component, a storage component, a network component, a consensus component, a contract/virtual machine component, a management component and the like, wherein the password component has the function of penetrating through each layer of blockchain security and is a security basic stone and a credible gene of the blockchain.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a conversion method, a system, computer equipment and application of a block chain cryptographic algorithm.
The invention is realized in such a way that a block chain cryptographic algorithm conversion method comprises the following steps:
collecting block chains requires the use of cryptographic information;
and acquiring a domestic encryption algorithm corresponding to the type of the cipher algorithm of the mainstream block chain system according to the standard of the national cipher committee.
Further, the information that the collection blockchain of the conversion method of the blockchain cryptographic algorithm needs to utilize cryptography is defined as: collecting information related to address generation, information related to transaction and information related to blocks in the block chain, and information needing negotiation in the communication process of the P2P network node.
Further, according to the standard of the national cipher commission, the domestic encryption algorithm corresponding to the type of the cipher algorithm of the mainstream block chain system is obtained by the block chain national cipher algorithm conversion method and is defined as follows: the type of the cryptographic algorithm of the mainstream block chain comprises an elliptic curve public key cryptographic algorithm of an ECC system; hash digest algorithm of MD5, SHA1, SHA 3; AES system, symmetrical cipher algorithm of IDEA system.
Further, the elliptic curve public key cryptographic algorithm of the ECC system includes a public key encryption/decryption/digital signature algorithm of the ECDSA, a public key negotiation protocol algorithm of the ECDH and an integrated encryption scheme of the ECIES, and the elliptic curve encryption/decryption/digital signature/key negotiation algorithm of the SM2 in the domestic cryptographic system corresponds to the public key cryptographic algorithm of the ECC system.
Further, the hash digest algorithm of the SHA3 includes SHA256 algorithm output by 256 bits and SHA512 algorithm output by 512 bits, and the hash digest algorithm of SM3 in the domestic cryptosystem corresponding to SHA 256;
the AES block cipher algorithm provides a 128-bit block AES-128 algorithm, a 192-bit block AES-192 algorithm, a 256-bit block AES-256 algorithm, and corresponding to AES-128 is an SM4 block cipher algorithm.
It is a further object of the invention to provide a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
collecting block chains requires the use of cryptographic information;
and acquiring a domestic encryption algorithm corresponding to the type of the cipher algorithm of the mainstream block chain system according to the standard of the national cipher committee.
Another object of the present invention is to provide a system for converting a blockchain cryptographic algorithm, which implements the method for converting a blockchain cryptographic algorithm, the system comprising:
the information collection module is used for collecting information of the block chain needing to utilize cryptography;
and the algorithm type conversion module is used for acquiring a domestic encryption algorithm corresponding to the type of the cryptographic algorithm of the mainstream block chain system according to the standard of the national cipher committee.
Another object of the present invention is to provide an application of the SM2 public key cryptographic algorithm in the domestic cryptographic algorithm converted by the conversion method of the blockchain national cryptographic algorithm, where the application is an account generation mechanism in a blockchain system, a signature of a node on a transaction, and a key agreement protocol in a P2P node communication process, integrated in an encryption scheme.
Another object of the present invention is to provide an application of SM3 hash algorithm in the domestic cryptographic algorithm converted by the conversion method of blockchain cryptographic algorithm, the application is an account generation mechanism in a blockchain system, hash compression storage for transactions, hash compression storage for blocks, generation of MPT tree and an integrated encryption scheme in the process of P2P node communication.
Another object of the present invention is to provide an application of the SM4 block cipher algorithm in the domestic cipher algorithm converted by the conversion method of the blockchain domestic cipher algorithm, wherein the application is in an integrated encryption scheme in the processes of blockchain landed encryption and P2P node communication.
By combining all the technical schemes, the invention has the advantages and positive effects that: the invention actively responds to the national information security level protection standard, realizes the localization of the block chain cryptographic algorithm, realizes the autonomous control of the block chain bottom layer cryptographic technology in the true sense, and gets rid of the current situation that the core technology is restricted by people. The block chain cryptography component with strong expansibility can be applied to a mainstream block chain system in China, and the development of the localization of the block chain industry is greatly promoted.
The core goal of the localization of the block chain cryptographic algorithm is to realize the autonomous controllability of the block chain industry in China; the safety of the block chain system is improved, the national cryptographic algorithm cannot be broken at present, and important information cannot be leaked; the method provides a password suite with better performance for the current mainstream block chain platform, better accords with the national situation, and promotes the development of the cryptography technology of China by attracting more participants to spontaneously add into a data ecosystem.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained from the drawings without creative efforts.
Fig. 1 is a flowchart of a block chain cryptographic algorithm conversion method according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a transformation system of a block chain cryptographic algorithm according to an embodiment of the present invention;
in fig. 2: 1. an information collection module; 2. and an algorithm type conversion module.
Fig. 3 is a flowchart of an implementation of the block chain cryptographic algorithm conversion method according to the embodiment of the present invention.
Fig. 4 is a schematic diagram of a public key cryptography system of a domestic cryptography component according to an embodiment of the present invention.
Fig. 5 is a schematic diagram of a hash algorithm of a domestic cryptography component according to an embodiment of the present invention.
FIG. 6 is a diagram of a symmetric cryptographic algorithm for a domestic cryptographic component according to an embodiment of the present invention.
Fig. 7 is a schematic diagram of an account registration process performed by the home cryptographic algorithm component in the blockchain platform according to the embodiment of the present invention.
Fig. 8 is a block chain transmission transaction process diagram according to an embodiment of the invention.
Fig. 9 is a schematic diagram of a mining process of a block chain according to an embodiment of the present invention.
Fig. 10 is a schematic diagram of a cryptographic version integrated encryption scheme used in the process of synchronizing data by P2P according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Aiming at the problems in the prior art, the invention provides a conversion method, a system, computer equipment and application of a block chain cryptographic algorithm, and the invention is described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the method for converting the block chain cryptographic algorithm provided by the present invention includes the following steps:
s101: collecting block chains requires the use of cryptographic information;
s102: and acquiring a domestic encryption algorithm corresponding to the type of the cipher algorithm of the mainstream block chain system according to the standard of the national cipher committee.
S103, adapting a national cryptographic algorithm with the same cryptographic standard to a bottom platform of the main block chain to realize componentization.
Those skilled in the art can also implement the method for converting the blockchain cryptographic algorithm provided by the present invention by using other steps, and the method for converting the blockchain cryptographic algorithm provided by the present invention in fig. 1 is only one specific embodiment.
As shown in fig. 2, the transformation system of the block chain cryptographic algorithm provided by the present invention includes:
the information collection module 1 is used for collecting information of a block chain needing to utilize cryptography;
and the algorithm type conversion module 2 is used for acquiring a domestic encryption algorithm corresponding to the type of the cipher algorithm of the main stream block chain system according to the standard of the national cipher committee.
And the adaptive block chain platform module 3 is used for adjusting the cryptographic algorithm structure to enable the cryptographic algorithm structure to be compatible with each block chain bottom-layer platform, so as to realize componentization.
The technical solution of the present invention is further described below with reference to the accompanying drawings.
As shown in fig. 3, the method for converting the block chain cryptographic algorithm provided by the present invention includes: 1. the collection area blockchain needs to acquire a domestic encryption algorithm corresponding to the type of the cipher algorithm of the mainstream blockchain system according to the standard of the national cipher committee by using the information 2 of cryptography. 3. A set of perfect domestic password component system structure is constructed and applied to the current mainstream block chain.
(1) Acquiring encryption module information of a main flow block chain, collecting information related to address generation in the block chain, transaction information and block information, and negotiating information in the communication process of the P2P network nodes.
(2) According to the algorithm of the existing mainstream block chain cryptography module, including public key cryptography, Hash algorithm and symmetric cryptography, a domestic encryption algorithm corresponding to the type of the mainstream block chain system cryptography algorithm is obtained according to the standard of the national cipher Committee.
(3) And adapting to the main flow block chain, constructing a set of complete domestic password component system structure, and applying the complete domestic password component system structure to the current main flow block chain. Including the address generation mechanism serving the blockchain, the signature and verification of transactions, the application of hash functions to the blockchain, and the implementation of symmetric encryption techniques in the off-the-shelf encryption and P2P communications. Has high expansibility.
The technical solution of the present invention is further described with reference to the following specific examples.
Example 1
As shown in fig. 4, the public key cryptography system of the domestic cryptography component will provide the following services:
(1) and (4) generating an algorithm by the nodes. The national-secret node adopts a point on an SM2 elliptic curve (the horizontal and vertical coordinates are spliced to obtain a corresponding node). Starting up while running the P2P network and verifying the reliability of the node (i.e. whether the point is on the elliptic curve sm2P256v 1).
(2) And an address generation algorithm: the key generation algorithm of the SM2 is adopted to map a private key (32 bytes) to a public key (65 bytes), and the SM3 algorithm compresses the 65 bytes of the public key into 32 bytes. The last 20 bytes are taken as the public key of the user address.
(3) Transaction signature algorithm: the ECDSA signature algorithm has a method of directly recovering a public key from signature contents, but the SM2 does not, so in order to enable a user with a verification requirement to obtain a public key of a signer, the public key of the signer is written into a transaction. The signature algorithm comprises a signature recovery public key, a signature algorithm, a signature verification algorithm and an elliptic curve point (public key) serialization algorithm.
(4) P2P underlying RLPx key agreement protocol: the RLPx protocol belongs to the protocol of the session layer of the OSI network model, the main function is to establish and maintain communication between nodes, and the discovery of the nodes and the transmission of data streams between the nodes are mainly completed by UDP and TCP protocols of the transmission layer. The bottom layer of the RLPx protocol is an ECIES integrated encryption scheme, which can be divided into a public key and secret key negotiation process, a symmetric encryption and decryption process and a process of perfecting the integrity by a Hash algorithm. The method mainly comprises the steps of replacing an ecdsa public and private key generation algorithm in the RLPx handshake process with an SM2 public and private key generation algorithm, adopting an SM2 public key negotiation protocol as a public key negotiation protocol in an ECIES integrated encryption scheme, adopting an SM4 symmetric encryption and decryption algorithm as a symmetric encryption and decryption algorithm, and adopting an SM3 hash algorithm as a hash algorithm.
Example 2
As shown in fig. 5, the hash algorithm of the domestic cryptography component will provide the following services:
(1) and an address generation algorithm: the SM2 public key of 65 bytes is 32 bytes using the SM3 hash algorithm. The last 20 bytes are taken as the public key of the user address.
(2) And (3) packaging the transaction: the signed transaction is hash-compressed using SM3 hash algorithm.
(3) And (3) block packing: the contents of the blocks are hash-compressed using the SM3 hash algorithm.
(4) An integrated encryption scheme: the SM3 hash algorithm is used in the ECIES integrated encryption scheme.
Example 3
As shown in fig. 6, the symmetric cryptographic algorithm of the domestic cryptography component will provide the following services:
(1) an integrated encryption scheme: the application of the SM4 packet encryption algorithm in the ECIES integrated encryption scheme is the key for transmitting encrypted data in the RLPx protocol of P2P.
(2) And (4) falling disc encryption: the SM4 block cipher algorithm is used in the process of storing public key in node.
The test is carried out on the bottom platform of the ethereum block chain according to the national cryptographic algorithm suite, and experimental data are given.
(1) As shown in fig. 7, the private key generated by the SM2 key generation algorithm is output as a public key generated by the private key generation algorithm in the form of compression through the public key compression method of the function of the elliptic curve library in the go language, and then the public key is hashed and compressed through the SM3 to obtain a hash value.
(2) As shown in fig. 8, the SM3 hash value is obtained by compressing the hash of the whole transaction during the process of sending the transaction through the blockchain.
(3) As shown in fig. 9, the SM3 hash value obtained by compressing the hash of the whole block during the mining process of the block chain is shown.
(4) As shown in fig. 10, it is a cryptographic integrated encryption scheme used in the process of synchronizing data by P2P, and the synchronization result of two nodes is shown below.
It should be noted that the embodiments of the present invention can be realized by hardware, software, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided on a carrier medium such as a disk, CD-or DVD-ROM, programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier, for example. The apparatus and its modules of the present invention may be implemented by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., or by software executed by various types of processors, or by a combination of hardware circuits and software, e.g., firmware.
The above description is only for the purpose of illustrating the present invention and the appended claims are not to be construed as limiting the scope of the invention, which is intended to cover all modifications, equivalents and improvements that are within the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A block chain cryptographic algorithm conversion method is characterized by comprising the following steps:
collecting block chains requires the use of cryptographic information;
and acquiring a domestic encryption algorithm corresponding to the type of the cipher algorithm of the mainstream block chain system according to the standard of the national cipher committee.
2. The method as claimed in claim 1, wherein the information that the collection blockchain of the transformation method of the blockchain cryptographic algorithm needs to use cryptography is defined as: collecting information related to address generation, information related to transaction and information related to blocks in the block chain, and information needing negotiation in the communication process of the P2P network node.
3. The method for converting a blockchain cryptographic algorithm according to claim 1, wherein the method for converting a blockchain cryptographic algorithm obtains a domestic cryptographic algorithm corresponding to a mainstream blockchain system cryptographic algorithm type according to a standard of the national cryptology committee defined as: the type of the cryptographic algorithm of the mainstream block chain comprises an elliptic curve public key cryptographic algorithm of an ECC system; hash digest algorithm of MD5, SHA1, SHA 3; AES system, symmetrical cipher algorithm of IDEA system.
4. The method as claimed in claim 3, wherein the elliptic curve public key cryptography algorithm of the ECC system comprises a public key encryption/decryption/digital signature algorithm of ECDSA, a public key negotiation protocol algorithm of ECDH and an integrated encryption scheme of ECIES, and the elliptic curve encryption/decryption/digital signature/key negotiation algorithm of SM2 in the domestic cryptography corresponds to the public key cryptography of the ECC system.
5. The method for converting a blockchain cryptographic algorithm according to claim 3, wherein the SHA3 hash digest algorithm includes SHA256 algorithm with 256-bit output and SHA512 algorithm with 512-bit output, and the SHA256 corresponds to the SM3 hash digest algorithm in the domestic cryptosystem;
the AES block cipher algorithm provides a 128-bit block AES-128 algorithm, a 192-bit block AES-192 algorithm, a 256-bit block AES-256 algorithm, and corresponding to AES-128 is an SM4 block cipher algorithm.
6. A computer device, characterized in that the computer device comprises a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to carry out the steps of:
collecting block chains requires the use of cryptographic information;
and acquiring a domestic encryption algorithm corresponding to the type of the cipher algorithm of the mainstream block chain system according to the standard of the national cipher committee.
7. A transformation system of a block chain cryptographic algorithm for implementing the transformation method of the block chain cryptographic algorithm according to any one of claims 1 to 5, wherein the transformation system of the block chain cryptographic algorithm comprises:
the information collection module is used for collecting information of the block chain needing to utilize cryptography;
and the algorithm type conversion module is used for acquiring a domestic encryption algorithm corresponding to the type of the cryptographic algorithm of the mainstream block chain system according to the standard of the national cipher committee.
8. An application of SM2 public key cryptographic algorithm in the domestic cryptographic algorithm converted by the conversion method of blockchain national cryptographic algorithm according to any one of claims 1 to 5, wherein the application is an account generation mechanism in a blockchain system, a signature of a node on a transaction, and a key agreement protocol in a P2P node communication process, and is integrated in an encryption scheme.
9. An application of SM3 hash algorithm in domestic cryptographic algorithm converted by the conversion method of blockchain cryptographic algorithm according to any claim 1-5, wherein the application is in account generation mechanism in blockchain system, hash compression storage for transaction, hash compression storage for block, generation of MPT tree and integrated encryption scheme in P2P node communication process.
10. An application of the SM4 block cipher algorithm in the domestic cipher algorithm converted by the conversion method of the blockchain domestic cipher algorithm according to any one of claims 1 to 5 is in an integrated encryption scheme in the processes of blockchain landed encryption and P2P node communication.
CN202110156494.2A 2021-02-04 2021-02-04 Block chain state encryption algorithm conversion method and system, computer equipment and application Pending CN112968778A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110156494.2A CN112968778A (en) 2021-02-04 2021-02-04 Block chain state encryption algorithm conversion method and system, computer equipment and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110156494.2A CN112968778A (en) 2021-02-04 2021-02-04 Block chain state encryption algorithm conversion method and system, computer equipment and application

Publications (1)

Publication Number Publication Date
CN112968778A true CN112968778A (en) 2021-06-15

Family

ID=76273935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110156494.2A Pending CN112968778A (en) 2021-02-04 2021-02-04 Block chain state encryption algorithm conversion method and system, computer equipment and application

Country Status (1)

Country Link
CN (1) CN112968778A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113783832A (en) * 2021-06-18 2021-12-10 中国地质大学(武汉) Development and manufacturing method and device for block chain common cryptographic algorithm SDK (software development kit) packet
CN113794711A (en) * 2021-09-10 2021-12-14 安徽江淮汽车集团股份有限公司 Vehicle information management and control architecture construction method based on block chain and national cryptographic algorithm
CN113904854A (en) * 2021-10-13 2022-01-07 筹远(上海)信息科技有限公司 Block chain data encryption method and device based on quotient secret algorithm
CN115549928A (en) * 2022-11-30 2022-12-30 山东区块链研究院 Signature checking method, system, storage medium and equipment in block chain system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306737A (en) * 2017-12-21 2018-07-20 中国科学院信息工程研究所 A kind of method of ether mill cryptographic algorithm production domesticization
US20190089687A1 (en) * 2017-09-18 2019-03-21 Michael Stephen Fiske Multiparty Key Exchange
CN110048855A (en) * 2019-04-23 2019-07-23 东软集团股份有限公司 Introducing method and call method and device, equipment, the Fabric platform of national secret algorithm
CN110365481A (en) * 2019-07-04 2019-10-22 上海交通大学 The optimization of the close SM2 algorithm of state is accelerated to realize system and method
US10476665B1 (en) * 2016-12-28 2019-11-12 Wells Fargo Bank, N.A. Cryptographic algorithm status transition

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10476665B1 (en) * 2016-12-28 2019-11-12 Wells Fargo Bank, N.A. Cryptographic algorithm status transition
US20190089687A1 (en) * 2017-09-18 2019-03-21 Michael Stephen Fiske Multiparty Key Exchange
CN108306737A (en) * 2017-12-21 2018-07-20 中国科学院信息工程研究所 A kind of method of ether mill cryptographic algorithm production domesticization
CN110048855A (en) * 2019-04-23 2019-07-23 东软集团股份有限公司 Introducing method and call method and device, equipment, the Fabric platform of national secret algorithm
CN110365481A (en) * 2019-07-04 2019-10-22 上海交通大学 The optimization of the close SM2 algorithm of state is accelerated to realize system and method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113783832A (en) * 2021-06-18 2021-12-10 中国地质大学(武汉) Development and manufacturing method and device for block chain common cryptographic algorithm SDK (software development kit) packet
CN113794711A (en) * 2021-09-10 2021-12-14 安徽江淮汽车集团股份有限公司 Vehicle information management and control architecture construction method based on block chain and national cryptographic algorithm
CN113904854A (en) * 2021-10-13 2022-01-07 筹远(上海)信息科技有限公司 Block chain data encryption method and device based on quotient secret algorithm
CN113904854B (en) * 2021-10-13 2024-01-02 筹远(上海)信息科技有限公司 Block chain data encryption method and device based on quotient algorithm
CN115549928A (en) * 2022-11-30 2022-12-30 山东区块链研究院 Signature checking method, system, storage medium and equipment in block chain system
CN115549928B (en) * 2022-11-30 2023-06-13 山东区块链研究院 Signature verification method, system, storage medium and equipment in block chain system

Similar Documents

Publication Publication Date Title
US10425401B1 (en) Extensions for using a digital certificate with multiple cryptosystems
US20210385201A1 (en) Systems and methods for secure multi-party communications using aproxy
CN103763315B (en) A kind of trust data access control method being applied to mobile device cloud storage
CN112968778A (en) Block chain state encryption algorithm conversion method and system, computer equipment and application
CN105873031B (en) Distributed unmanned plane cryptographic key negotiation method based on credible platform
JP2020524421A (en) Distributed Key Management for Trusted Execution Environment
WO2016107203A1 (en) Identity authentication method and device
CN102932350B (en) A kind of method and apparatus of TLS scanning
CN113542428B (en) Vehicle data uploading method and device, vehicle, system and storage medium
CN116601912A (en) Post-secret provisioning service providing encryption security
WO2024001035A1 (en) Message transmission method and apparatus based on blockchain relay communication network system
CN112422560A (en) Lightweight substation secure communication method and system based on secure socket layer
JP2023533319A (en) FIRMWARE DATA VERIFICATION APPARATUS AND METHOD AND FIRMWARE UPDATE APPARATUS, METHOD AND SYSTEM
CN115174267A (en) TLS protocol negotiation method, equipment and medium
CN114462047B (en) Cloud outsourcing calculation safety method based on SGX technology
US20210194694A1 (en) Data processing system
CN105871858A (en) Method and system for ensuring high data safety
WO2024001037A1 (en) Message transmission method and apparatus, electronic device and storage medium
CN115314284B (en) Public key authentication searchable encryption method and system based on trusted execution environment
CN111490874A (en) Distribution network safety protection method, system, device and storage medium
CN116366326A (en) Intelligent power distribution terminal-oriented safety protection system and method
CN114611129A (en) Data privacy protection method and system
JP5932709B2 (en) Transmission side device and reception side device
Al-Kaabi et al. The status, challenges, and future trends of advanced crypto algorithms for wireless network security: An Overview
CN115694997B (en) Intelligent gateway system of Internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an

Applicant after: XIDIAN University

Applicant after: Xi'an Lianrong Technology Co.,Ltd.

Address before: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an

Applicant before: XIDIAN University

Applicant before: XI'AN XIDIAN LIANRONG TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20210615

RJ01 Rejection of invention patent application after publication