ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2019, Vol. 56 ›› Issue (10): 2207-2215.doi: 10.7544/issn1000-1239.2019.20190390

所属专题: 2019密码学与智能安全研究专题

• 信息安全 • 上一篇    下一篇

基于高性能密码实现的大数据安全方案

杨国强1,丁杭超2,邹静3,蒋瀚4,陈彦琴5   

  1. 1(山东大学计算机科学与技术学院 济南 250101);2(山东大学数学学院 济南 250100);3(国网经济技术研究院有限公司 北京 102209);4(山东大学软件学院 济南 250101);5(北京三未信安科技发展有限公司 北京 100102) (geravier@163.com)
  • 出版日期: 2019-10-16
  • 基金资助: 
    国家自然科学基金项目(61572294);国家自然科学基金重点项目(61632020);山东省自然科学基金项目(ZR2017MF021);山东省科技重大创新项目(2018CXGC0702);山东半岛国家自主创新示范区发展建设资金项目(S190101010001);国家电网公司总部科技项目(SGFJX00YJJS1800074);国网信息化项目(B3441518G001);山东大学基本科研业务专项资金项目(2017JC019)

A Big Data Security Scheme Based on High-Performance Cryptography Implementation

Yang Guoqiang1, Ding Hangchao2, Zou Jing3, Jiang Han4, Chen Yanqin5   

  1. 1(School of Computer Science and Technology, Shandong University, Jinan 250101);2(College of Mathematics, Shandong University, Jinan 250100);3(State Grid Economic and Technological Research Institute Co., Ltd, Beijing 102209);4(School of Software, Shandong University, Jinan 250101);5(Beijing Sansec Technology Development Co., Ltd, Beijing 100102)
  • Online: 2019-10-16

摘要: 目前信息技术发展的趋势是以大数据计算为基础的人工智能技术.云计算、雾计算、边缘计算等计算模式下的大数据处理技术,在给经济发展带来巨大推动力的同时,也面临着巨大的安全风险.密码技术是解决大数据安全的核心技术.大数据的机密性、认证性及隐私保护问题需要解决海量数据的高速加解密问题;高并发的大规模用户认证问题;大数据的隐私保护及密态计算问题等,这些问题的解决,需要底层密码算法的快速实现.针对大数据安全应用的逻辑架构,对底层的国产密码标准算法SM4-XTS,SM2以及大整数模幂运算,分别给出快速计算的算法,并在基于Xilinx公司的KC705开发板上进行了验证,并给出实验数据.实验表明:该工作具有一定的先进性:1)SM4-XTS模式的实现填补了国内该方向的空白;2)SM2签名具有较高性能,领先于国内同类产品;3)大整数的模幂运算应用于同态密码的产品化,填补了国内该产品的空白.

关键词: SM4-XTS, SM2, 大整数模幂, 密码算法快速实现, 大数据

Abstract: At present, the trend of information technology development is the artificial intelligence technology based on big data computing. Although it has made enormous contribution in the economic development, big data processing technology which includes cloud computing, fog computing, edge computing and other computing modes also brings a great risk of data security. Cryptographic technology is the kernel of the big data security. Confidentiality, authentication and privacy protection of big data need to solve the following three security problems: firstly, high-speed encryption and decryption of massive data; secondly, the authentication problem of high concurrency and large scale user; thirdly, privacy protection in data mining. The solution of these problems requires the fast implementation of the underlying cryptographic algorithm. Aiming at the logic architecture of big data security application, this paper gives a fast calculation algorithm for the cryptographic standard algorithm SM4-XTS, SM2 and modular exponentiation of large integers. It is verified on the KC705 development board based on Xilinx company, the results of experiment show that our work has certain advancement: 1) The implementation of SM4-XTS fills the blank of this direction in China. 2) SM2 signature has high performance, leading domestic similar products. 3) Modular exponentiation is applied to the productization of homomorphism cryptography, and its performance is ahead of other similar products.

Key words: SM4-XTS, SM2, modular exponentiation, high-speed implementation of cryptographic algorithm, big data

中图分类号: