Netinfo Security ›› 2021, Vol. 21 ›› Issue (10): 8-16.doi: 10.3969/j.issn.1671-1122.2021.10.002

Previous Articles     Next Articles

SM Algorithm Analysis and Software Performance Research

HU Jingxiu1,2, YANG Yang1,2, XIONG Lu1,2(), WU Jintan1,2   

  1. 1. China Unionpay Co., Ltd, Shanghai 201201, China
    2. National Engineering Laboratory of E-commerce and E-payment, Shanghai 201201, China
  • Received:2021-05-15 Online:2021-10-10 Published:2021-10-14
  • Contact: XIONG Lu E-mail:xionglu@unionpay.com

Abstract:

Encryption technology is the core of information security, and the promotion of national secret algorithms is of great significance to safeguarding country’s network information security. In recent years, commercial encryption industry of China has developed rapidly, but the SM algorithm generally has the problem of low implementation efficiency. In order to explored the feasibility of the SM algorithm to replace the international encryption algorithm, this article mainly focused on the SM3, SM2, SM4 of SM algorithm and comprehensive comparison of the target international cryptographic algorithms, analyzed the calculation amount and security of the algorithms, and used OpenSSL and a SM algorithm optimized by a domestic manufacturer A to test the performance of each algorithm. The performance test results show that the SM3 is similar to the SHA-256, the performance of the SM2 digital signature algorithm and the ECDSA algorithm is affected by the Hash function they select, but the overall performance is similar. With small amount of data, the performance of SM2 public key encryption algorithm and ECIES algorithm depend on the size of the encrypted data. As the amount of data increases, the performance of the latter is significantly better than the former. The performance of the SM4 algorithm is between AES and 3DES.

Key words: SM algorithm, SM2 algorithm, SM3 algorithm, SM4 algorithm, software performance

CLC Number: