Developer Reference

Contents

Functions based on SM2

Short Description
This section describes functions based on the SM2 encryption standard for elliptic curves. For more information on the Elliptic Curve Integrated Encryption Scheme, see [IEEE P1363A]. The standard operations of
GFpEC
functions are listed below:
  • Compute a shared secret
    Z
    of the private key
    U
    and a recipient public key
    W
    .
  • Derive a shared secret key data
    K
    from the shared secret
    Z
    .
  • Encrypt or decrypt a message using the cipher agreed upon parties and the shared secret key data
    K
    .
  • Compute an authentication tag using the agreed authentication scheme and the secret key data
    K
    .
As an encryption or decryption result, the Elliptic Curve Encryption Scheme (ECES) returns a buffer with the following components:
  • pk
    containing representation of the sender public key;
  • msg
    containing the encrypted or decrypted message;
  • tag
    containing the authentication tag.
The size of
msg
equals to the size of the plain-text message. To get the size of
pk
or
tag
, call the
ippsGFpECESGetBuffersSize_SM2
function.
For more information on the SM2 cryptographic algorithm based on elliptic curves, see [SM2 PKE].

Product and Performance Information

1

Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.