SM2 cryptographic algorithm based on discrete logarithm problem and prospect

Liantao Bai,Yuegong Zhang,Guoqiang Yang
DOI: https://doi.org/10.1109/CECNet.2012.6201878
2012-01-01
Abstract:With the development of technology, network has become an integral part of the life. At the same time the protection to network information is becoming very important. Encryption is one of the most effective ways to protect the information. The sender will symmetrically encrypt and send the data through the network, and receiver will decrypt the information to get the plaintext. All of information in network has been encrypted. The symmetric key will be the most effectively distributed through asymmetrical key. RSA algorithm and ECC algorithm are two of the most important asymmetric algorithm. The SM2 algorithm is independently developed by the State Cryptography Administration; it improves and expands the international standard ECC algorithm. This paper introduces the advantages of authenticating correctness and safety; it also put forward the further applications and some improvements for the SM2 algorithm.
What problem does this paper attempt to address?