Developer Reference for Intel® Integrated Performance Primitives Cryptography
Short Description
This section describes functions based on the SM2 encryption standard for elliptic curves. For more information on the Elliptic Curve Integrated Encryption Scheme, see [IEEE P1363A]. The standard operations of GFpEC functions are listed below:
Compute a shared secret Z of the private key U and a recipient public key W.
Derive a shared secret key data K from the shared secret Z.
Encrypt or decrypt a message using the cipher agreed upon parties and the shared secret key data K.
Compute an authentication tag using the agreed authentication scheme and the secret key data K.
As an encryption or decryption result, the Elliptic Curve Encryption Scheme (ECES) returns a buffer with the following components:
The size of msg equals to the size of the plain-text message. To get the size of pk or tag, call the ippsGFpECESGetBuffersSize_SM2 function.
For more information on the SM2 cryptographic algorithm based on elliptic curves, see [SM2 PKE].