计算机科学 ›› 2023, Vol. 50 ›› Issue (11A): 221100116-4.doi: 10.11896/jsjkx.221100116

• 信息安全 • 上一篇    下一篇

基于I-SM4和SM2的混合加密算法

孙敏, 陕童, 续森炜   

  1. 山西大学计算机与信息技术学院 太原 030006
  • 发布日期:2023-11-09
  • 通讯作者: 孙敏(minsun@sxu.edu.cn)
  • 基金资助:
    山西省基础研究计划项目(20210302123455);山西省基础研究计划项目(201701D121052)

Hybrid Encryption Algorithm Based on I-SM4 and SM2

SUN Min, SHAN Tong, XU Senwei   

  1. School of Computer & Information Technology,Shanxi University,Taiyuan 030006,China
  • Published:2023-11-09
  • About author:SUN Min,born in 1966,master,professor.Her main research interests include computer network and information security.
  • Supported by:
    Shanxi Province Basic Research Program,China(20210302123455) and Shanxi Province Basic Research Program,China(201701D121052).

摘要: 近年来,数据泄露事件频发,信息安全问题日益突出。由于单一的加密算法无法满足信息在传输过程中的安全需求,因此一般采用混合加密算法进行数据加密。现有的混合加密算法主要基于国外设计的加密算法,不符合网络空间安全自主可控的要求。针对这一问题,结合改进的SM4算法(I-SM4)与SM2算法,设计了一种新的混合加密算法。该算法改进了SM4加密算法的密钥扩展部分,采用线性同余序列代替原有的密钥扩展方式对轮密钥进行扩展,降低了轮密钥之间的相关性,提高了密钥的安全性。此外,采用将I-SM4与SM2相结合的方法,一方面可以加强对I-SM4密钥的管理,提高安全性;另一方面可以缩短单独使用SM2加密算法所需的时间。通过实验与分析证明,文中提出的混合加密算法能够有效提高网络传输过程中信息的保密性、完整性和不可否认性。

关键词: 混合加密, SM2, SM3, SM4, 线性同余

Abstract: In recent years,data leakage incidents have occurred frequently,and information security issues have become increasingly prominent.Since a single encryption algorithm cannot meet the security requirements of information in the transmission process,data encryption is generally performed through a hybrid encryption algorithm.The existing hybrid encryption algorithms are mainly based on encryption algorithms designed abroad,which do not meet the autonomous and controllable requirements of cyberspace security.Aiming at this problem,a new hybrid encryption algorithm is designed by combining the improved SM4 algorithm(I-SM4) and SM2 algorithm.It improves the key expansion part of the SM4 encryption algorithm,and uses the linear congruence sequence instead of the original key expansion method to expand the round key,which reduces the correlation between the round keys and improves the security of the key.In addition,the combination of I-SM4 and SM2 can strengthen the management of I-SM4 keys and improve security on the one hand.On the other hand,it can reduce the time required to use the SM2 encryption algorithm alone.Through experiments and analysis,it is proved that the hybrid encryption algorithm proposed in this paper can effectively improve the confidentiality,integrity and non-repudiation of information during network transmission.

Key words: Mixed encryption, SM2, SM3, SM4, Linear congruence

中图分类号: 

  • TP309
[1]YANG Q,LIU Y,CHEN T,et al.Federated machine learning:Concept and applications[J].ACM Transactions on Intelligent Systems and Technology(TIST),2019,10(2):1-19.
[2]YAN Y X,MA M,JIANG H.An Efficient Privacy Protection Sifang Machine Learning Scheme Based on Secret Sharing [J].Computer Research and Development,2022,59(10):2338-2347.
[3]KANG H Y,DENG J.Enhanced hybrid encryption method for secure storage of medical data[J].Journal of Beijing Institute of Technology,2021,41(10):1058-1068.
[4]Cryptography Administration.SM4 Block Cipher Algorithm:GM/T 0002-2012 [S].Beijing:China Standard Press,2012.
[5]WANG J W,ZHANG S H,LI C.A Controllable Identity Management and Authentication Model of Agricultural Product Supply Chain Based on ECC-ZKP[J].Computer Application Research,2022,39(10):2916-2922,2928.
[6]BIAN J X,LI Y J,WANG J H.Research on Hybrid Encryption Algorithm Based on SM4 and ECC[J].Computer Applications and Software,2016,33(10):303-306,324.
[7]General Administration of Quality Supervision,Inspection andQuarantine of the People’s Republic of China,Standardization Administration of China.Information Security Technology SM2 Elliptic Curve Public Key Cryptographic Algorithm Part 1:General Provisions:GB/T 32918.1-2016 [S].Beijing:China Standards Press,2017.
[8]Cryptography Administration.SM3 Cryptographic Hash Algo-rithm:GB/T 32905-2016[S].Beijing:China Standard Press,2012.
[9]LI J L,MO Y N,SU T,et al.Hardware Design of High-speed Hybrid Encryption System Based on National Secret Algorithms SM2,SM3,SM4 [J].Computer Application Research,2022,39(9):2818-2825,2831.
[10]HUANG X L,SHI H S,ZHANG C B,et al.Unpredictability of a Class of Combinatorial Linear Congruential Generators[J].Journal of Tsinghua University(Natural Science Edition),2016,56(1):22-27.
[11]LI W,WANG M L,GU D W,et al.Ciphertext-only FailureAnalysis of SM4 Cryptographic Algorithm[J].Journal of Computers,2022,45(8):1814-1826.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!