ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2019, Vol. 56 ›› Issue (10): 2207-2215.doi: 10.7544/issn1000-1239.2019.20190390

Special Issue: 2019密码学与智能安全研究专题

Previous Articles     Next Articles

A Big Data Security Scheme Based on High-Performance Cryptography Implementation

Yang Guoqiang1, Ding Hangchao2, Zou Jing3, Jiang Han4, Chen Yanqin5   

  1. 1(School of Computer Science and Technology, Shandong University, Jinan 250101);2(College of Mathematics, Shandong University, Jinan 250100);3(State Grid Economic and Technological Research Institute Co., Ltd, Beijing 102209);4(School of Software, Shandong University, Jinan 250101);5(Beijing Sansec Technology Development Co., Ltd, Beijing 100102)
  • Online:2019-10-16

Abstract: At present, the trend of information technology development is the artificial intelligence technology based on big data computing. Although it has made enormous contribution in the economic development, big data processing technology which includes cloud computing, fog computing, edge computing and other computing modes also brings a great risk of data security. Cryptographic technology is the kernel of the big data security. Confidentiality, authentication and privacy protection of big data need to solve the following three security problems: firstly, high-speed encryption and decryption of massive data; secondly, the authentication problem of high concurrency and large scale user; thirdly, privacy protection in data mining. The solution of these problems requires the fast implementation of the underlying cryptographic algorithm. Aiming at the logic architecture of big data security application, this paper gives a fast calculation algorithm for the cryptographic standard algorithm SM4-XTS, SM2 and modular exponentiation of large integers. It is verified on the KC705 development board based on Xilinx company, the results of experiment show that our work has certain advancement: 1) The implementation of SM4-XTS fills the blank of this direction in China. 2) SM2 signature has high performance, leading domestic similar products. 3) Modular exponentiation is applied to the productization of homomorphism cryptography, and its performance is ahead of other similar products.

Key words: SM4-XTS, SM2, modular exponentiation, high-speed implementation of cryptographic algorithm, big data

CLC Number: