Haitai Fangyuan SM2 algorithm Key boosts public key cryptographic algorithm upgrade

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

With the development of cryptographic technology and the improvement of computing power worldwide, the existing cryptographic system based on RSA1024 can no longer meet the security requirements of current and future applications. Due to historical reasons, in a large number of domestic information systems, CA companies that have obtained the “Electronic Authentication Service Use Password License” and “Electronic Authentication Service License” according to law are currently using the RSA algorithm, and most of the key lengths are 1024 bits, and very few use 2048-bit or longer keys.

The security of the RSA algorithm is based on the difficulty of factoring large numbers: that is, only the holder of the private key can multiply the prime number p/q to obtain the public key parameter n=p*q, and others cannot decompose n to obtain p/q . If the public key parameter n can be decomposed, the corresponding private key can be obtained therefrom.

RSA Challenge (RSA Challenge) is a challenge activity initiated by RSA Labs on March 18, 1991. The purpose is to encourage research in two areas: computational number theory, factoring large integers, and the practical difficulties of cracking RSA keys used in ciphers. RSA has published a list of semi-prime numbers (that is, the public key parameter n in the RSA algorithm), and the challenger who successfully decomposes n will receive a certain amount of bonus. On April 1, 1991, a 100-digit decimal number, RSA-100, was successfully decomposed. 2007 RSA Challenge terminated. RSA Labs claims that the industry has gained a considerable and in-depth understanding of the cryptanalysis of common symmetric key algorithms and public key cryptographic algorithms. Therefore, such challenges will no longer be carried out.

In 2003, Adi Shamir and Eran Tromer published the paper Factoring Large Numbers with the TWIRL Device at Crypto’2003, and designed a device for factoring large numbers, TWIRL, estimated (in 2003 technical conditions) 1 10 million US dollars can be completed to manufacture, the device can crack 1024 bits RSA key in 1 year of operation. The design of TWIRL immediately led RSA Labs to revise the recommended key length for the RSA algorithm. According to a report by a world-renowned research institution, 1024 bits RSA keys should only be used until 2010, 2048 bits RSA keys should only be used until 2030, and 3072 bits RSA keys can be used after 2030.

Like the RSA algorithm, the SM2 algorithm belongs to the asymmetric algorithm system and is a type of elliptic curve encryption (ECC) algorithm. But different from the RSA algorithm is that the RSA algorithm is based on the mathematical problem of large integer decomposition, and the SM2 algorithm is based on the discrete logarithm problem of point groups on elliptic curves.

Compared with the RSA algorithm, the SM2 algorithm has the following advantages:

aHigh security. The 192-bit SM2 cipher is already stronger than the RSA 2048-bit cipher.

bStorage space is small. The password of SM2 algorithm generally uses 192-256 bits, and the password of RSA algorithm generally needs to use 2048-4096 bits.

c signature is fast. SM2 is much faster than RSA in private key operations.

Domestic algorithm. The regulations are formulated by the national password management department, there is no undisclosed password, and there is no back door that can be used abroad.

At present, it is considered that the RSA 1024-bit algorithm, which is widely used in China, is no longer safe. The State Cryptography Administration issued a notice: Since July 1, 2011, the information system that is put into operation and uses public key cryptography should use SM2 elliptic curve cryptographic algorithm

Beijing Haitai Fangyuan Technology Co., Ltd. (hereinafter referred to as Haitai Fangyuan) was established in 2003, mainly engaged in the research of terminal encryption equipment based on encryption technology. After more than 10 years of accumulation, he has deep attainments in cryptography. With the increasing insecurity of the RSA algorithm, Haitai Fangyuan has carried out research on terminal cryptographic equipment based on the SM2 algorithm with the support of the State Cryptography Administration as early as 2008. With the efforts of technicians, Haitai Fangyuan participated in the national Drafted the SM2 algorithm specification and became a member of the SM2 algorithm committee. And in 2009, it became the first enterprise to pass the SM2 algorithm Key identification. On the basis of the SM2 algorithm, Haitai Fangyuan further complied with the call of the state secret, and made its terminal encryption device USBKey compatible with the state secret SM1/SM2/SM3 algorithm At the same time, it also supports international mainstream algorithms such as RSA1024/2048, SSF33, DES, 3DES, AES, etc., and has a great advantage in the commercial secret application market for its terminal cryptographic equipment. Since 2009, Haitai Fangyuan’s SM2 algorithm Key has shipped more than 5 million pieces, providing a strong security guarantee for finance, securities, CA, integrators, government and other industries.

With the passage of time, there will be more and more products in the industry chain based on the SM2 algorithm, and the use environment will become more and more mature, so the application based on the SM2 algorithm will become simpler and simpler. Haitai Fangyuan will conform to the development of technology and make greater achievements in the future terminal security market based on its superb knowledge of encryption technology, and continuously promote the upgrade of my country’s public key encryption algorithm.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare