Functions based on SM2
Short Description
This section describes functions based on the SM2 encryption standard for elliptic curves. For more information on the Elliptic Curve Integrated Encryption Scheme, see [IEEE P1363A]. The standard operations of
GFpEC
functions are listed below:
- Compute a shared secretZof the private keyUand a recipient public keyW.
- Derive a shared secret key dataKfrom the shared secretZ.
- Encrypt or decrypt a message using the cipher agreed upon parties and the shared secret key dataK.
- Compute an authentication tag using the agreed authentication scheme and the secret key dataK.
As an encryption or decryption result, the Elliptic Curve Encryption Scheme (ECES) returns a buffer with the following components:
- pkcontaining representation of the sender public key;
- msgcontaining the encrypted or decrypted message;
- tagcontaining the authentication tag.
The size of
msg
equals to the size of the plain-text message. To get the size of
pk
or
tag
, call the
ippsGFpECESGetBuffersSize_SM2
function.
For more information on the SM2 cryptographic algorithm based on elliptic curves, see [SM2 PKE].