Title :
SM2 cryptographic algorithm based on discrete logarithm problem and prospect
Author :
Bai, Liantao ; Zhang, Yuegong ; Yang, Guoqiang
Author_Institution :
Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Abstract :
With the development of technology, network has become an integral part of the life. At the same time the protection to network information is becoming very important. Encryption is one of the most effective ways to protect the information. The sender will symmetrically encrypt and send the data through the network, and receiver will decrypt the information to get the plaintext. All of information in network has been encrypted. The symmetric key will be the most effectively distributed through asymmetrical key. RSA algorithm and ECC algorithm are two of the most important asymmetric algorithm. The SM2 algorithm is independently developed by the State Cryptography Administration; it improves and expands the international standard ECC algorithm. This paper introduces the advantages of authenticating correctness and safety; it also put forward the further applications and some improvements for the SM2 algorithm.
Keywords :
message authentication; public key cryptography; ECC algorithm; RSA algorithm; SM2 cryptographic algorithm; State Cryptography Administration; asymmetric algorithm; asymmetrical key; authentication; discrete logarithm problem; elliptic curve cryptography; information decryption; information encryption; international standard ECC algorithm; network information protection; plaintext; Algorithm design and analysis; Elliptic curve cryptography; Elliptic curves; Encryption; Safety; SM2; SM3; cryptography; encryption; key; safety;
Conference_Titel :
Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on
Conference_Location :
Yichang
Print_ISBN :
978-1-4577-1414-6
DOI :
10.1109/CECNet.2012.6201878