Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 221100116-4.doi: 10.11896/jsjkx.221100116

• Information Security • Previous Articles     Next Articles

Hybrid Encryption Algorithm Based on I-SM4 and SM2

SUN Min, SHAN Tong, XU Senwei   

  1. School of Computer & Information Technology,Shanxi University,Taiyuan 030006,China
  • Published:2023-11-09
  • About author:SUN Min,born in 1966,master,professor.Her main research interests include computer network and information security.
  • Supported by:
    Shanxi Province Basic Research Program,China(20210302123455) and Shanxi Province Basic Research Program,China(201701D121052).

Abstract: In recent years,data leakage incidents have occurred frequently,and information security issues have become increasingly prominent.Since a single encryption algorithm cannot meet the security requirements of information in the transmission process,data encryption is generally performed through a hybrid encryption algorithm.The existing hybrid encryption algorithms are mainly based on encryption algorithms designed abroad,which do not meet the autonomous and controllable requirements of cyberspace security.Aiming at this problem,a new hybrid encryption algorithm is designed by combining the improved SM4 algorithm(I-SM4) and SM2 algorithm.It improves the key expansion part of the SM4 encryption algorithm,and uses the linear congruence sequence instead of the original key expansion method to expand the round key,which reduces the correlation between the round keys and improves the security of the key.In addition,the combination of I-SM4 and SM2 can strengthen the management of I-SM4 keys and improve security on the one hand.On the other hand,it can reduce the time required to use the SM2 encryption algorithm alone.Through experiments and analysis,it is proved that the hybrid encryption algorithm proposed in this paper can effectively improve the confidentiality,integrity and non-repudiation of information during network transmission.

Key words: Mixed encryption, SM2, SM3, SM4, Linear congruence

CLC Number: 

  • TP309
[1]YANG Q,LIU Y,CHEN T,et al.Federated machine learning:Concept and applications[J].ACM Transactions on Intelligent Systems and Technology(TIST),2019,10(2):1-19.
[2]YAN Y X,MA M,JIANG H.An Efficient Privacy Protection Sifang Machine Learning Scheme Based on Secret Sharing [J].Computer Research and Development,2022,59(10):2338-2347.
[3]KANG H Y,DENG J.Enhanced hybrid encryption method for secure storage of medical data[J].Journal of Beijing Institute of Technology,2021,41(10):1058-1068.
[4]Cryptography Administration.SM4 Block Cipher Algorithm:GM/T 0002-2012 [S].Beijing:China Standard Press,2012.
[5]WANG J W,ZHANG S H,LI C.A Controllable Identity Management and Authentication Model of Agricultural Product Supply Chain Based on ECC-ZKP[J].Computer Application Research,2022,39(10):2916-2922,2928.
[6]BIAN J X,LI Y J,WANG J H.Research on Hybrid Encryption Algorithm Based on SM4 and ECC[J].Computer Applications and Software,2016,33(10):303-306,324.
[7]General Administration of Quality Supervision,Inspection andQuarantine of the People’s Republic of China,Standardization Administration of China.Information Security Technology SM2 Elliptic Curve Public Key Cryptographic Algorithm Part 1:General Provisions:GB/T 32918.1-2016 [S].Beijing:China Standards Press,2017.
[8]Cryptography Administration.SM3 Cryptographic Hash Algo-rithm:GB/T 32905-2016[S].Beijing:China Standard Press,2012.
[9]LI J L,MO Y N,SU T,et al.Hardware Design of High-speed Hybrid Encryption System Based on National Secret Algorithms SM2,SM3,SM4 [J].Computer Application Research,2022,39(9):2818-2825,2831.
[10]HUANG X L,SHI H S,ZHANG C B,et al.Unpredictability of a Class of Combinatorial Linear Congruential Generators[J].Journal of Tsinghua University(Natural Science Edition),2016,56(1):22-27.
[11]LI W,WANG M L,GU D W,et al.Ciphertext-only FailureAnalysis of SM4 Cryptographic Algorithm[J].Journal of Computers,2022,45(8):1814-1826.
[1] ZHAI Jia-qi, LI Bin, ZHOU Qing-lei, CHEN Xiao-jie. Implementation of FPGA-based High-performance and Scalable SM4-GCM Algorithm [J]. Computer Science, 2022, 49(10): 74-82.
[2] ZHU Ren-jie. Study on SM4 Differential Fault Attack Under Extended Fault Injection Range [J]. Computer Science, 2019, 46(11A): 493-495.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!