首页 | 本学科首页   官方微博 | 高级检索  
     

国密SM2数字签名算法与ECDSA算法对比分析研究
引用本文:孙荣燕,蔡昌曙,周洲,赵燕杰,杨金铭.国密SM2数字签名算法与ECDSA算法对比分析研究[J].网络安全技术与应用,2013(2):60-62.
作者姓名:孙荣燕  蔡昌曙  周洲  赵燕杰  杨金铭
作者单位:云南省电子政务网络管理中心 云南650228
摘    要:国密算法的公布是大势所趋,2010年12月公布了SM2椭圆曲线公钥密码算法与SM3哈希算法,国密算法将接受全面的验证,走出国门成为可能。本文首先对ECDSA算法与国密SM2椭圆曲线数字签名算法进行了介绍,接着对ECDSA-SM2算法的数字模型进行了正确性证明。最后,本文就对待签名信息的预处理、ECDLP、哈希函数选择、安全性方面对ECDSA与ECDSA—SM2进行了对比分析研究。

关 键 词:椭圆曲线数字签名  国密算法  SM2  SM2数字签名

The Comparision between Digital Signature based on SM2 and ECDSA
Sun Rongyan , Cai Changshu , Zhou Zhou , Zhao Yanjie , Yang Jinmin.The Comparision between Digital Signature based on SM2 and ECDSA[J].Net Security Technologies and Application,2013(2):60-62.
Authors:Sun Rongyan  Cai Changshu  Zhou Zhou  Zhao Yanjie  Yang Jinmin
Affiliation:Yu Chenxi Chinese People's Public Security University, Beijing,100038,China
Abstract:The development of information science and information construction of public security information to get a more extensive space for the development of the public security information work,constantly enrich the content,so the need for public security intelligence concept transformation and value exploration re-sorted. The public secudty intelligence concept transformation includes information,information network,intelligence and information chain,public security intelligence value exploration including speculative information, cultural information,information management and the information science.
Keywords:Public security information  Philosophy  Value
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号