


How to implement the encryption, decryption and interconnection of the national secret SM4 and SM2 algorithms in Go?
Apr 19, 2025 pm 06:27 PMDetailed explanation of the encryption, decryption and interconnection of Go language SM4 and SM2
This article explains in detail how to use Go language to implement the encryption and decryption of the SM4 and SM2 algorithms, and ensure interoperability with Java applications (such as those using the hutool toolkit). This requires the combination of asymmetric encryption algorithm SM2 and symmetric encryption algorithm SM4 to take into account data security and efficiency.
Encryption process:
- SM4 symmetric encryption: The sender first randomly generates a session key
secretidcontent
. Use this key to SM4 encryption of the message body. The encrypted result is used as the body content of the final message. Go language can use thegithub.com/emmansun/gmsm
library to implement SM4 encryption. The code example is as follows:
package main import ( "fmt" "github.com/emmansun/gmsm/sm4" ) func main() { // ... (Get the message body, generate secretidcontent) ... cipher, _ := sm4.NewCipher([]byte(secretidcontent)) // ... (SM4 encryption body) ... }
- SM2 asymmetric encryption: Then, using the receiving party's public key, SM2 encryption is performed on
secretidcontent
generated in step 1. The encryption result is stored in thesecretid
field of the message header. Thegithub.com/emmansun/gmsm
library also provides SM2 encryption function. Code example:
package main import ( "fmt" "github.com/emmansun/gmsm/sm2" ) func main() { // ... (Get the receiver's public key, secretidcontent) ... publicKey, _ := sm2.ParsePublicKey(publicKeyBytes) encryptedSecretid, _ := sm2.Encrypt(publicKey, []byte(secretidcontent)) // ... (Put encryptedsecretid into header's secretid) ... }
Decryption process:
- SM2 asymmetric decryption: After receiving the message, the receiver extracts
secretid
content from the header. Use your own private key to perform SM2 decryption to obtain thesecretidcontent
key generated in step 1.
package main import ( "fmt" "github.com/emmansun/gmsm/sm2" ) func main() { // ... (get private key, secretid in header) ... privateKey, _ := sm2.ParsePrivateKey(privateKeyBytes) secretidcontent, _ := sm2.Decrypt(privateKey, encryptedSecretid) // ... }
- SM4 symmetric decryption: Finally, use the
secretidcontent
key obtained by decryption to SM4 decrypt the message body to obtain the original message content.
package main import ( "fmt" "github.com/emmansun/gmsm/sm4" ) func main() { // ... (get body, secretIdContent) ... cipher, _ := sm4.NewCipher([]byte(secretIdContent)) // ... (SM4 decrypted body) ... }
Important tips: The above code is for reference only. In actual applications, error handling, parameter verification, and security issues such as key management are required. Please read the documentation of github.com/emmansun/gmsm
library carefully and learn in-depth its functions and usage methods.
The above is the detailed content of How to implement the encryption, decryption and interconnection of the national secret SM4 and SM2 algorithms in Go?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The duration of the airdrop dividend is uncertain, but the LayerZero, StarkNet and ZK ecosystems still have long-term value. 1. LayerZero achieves cross-chain interoperability through lightweight protocols; 2. StarkNet provides efficient and low-cost Ethereum L2 expansion solutions based on ZK-STARKs technology; 3. ZK ecosystem (such as zkSync, Scroll, etc.) expands the application of zero-knowledge proof in scaling and privacy protection; 4. Participation methods include the use of bridging tools, interactive DApps, participating test networks, pledged assets, etc., aiming to experience the next generation of blockchain infrastructure in advance and strive for potential airdrop opportunities.

The role of Ethereum smart contract is to realize decentralized, automated and transparent protocol execution. Its core functions include: 1. As the core logic layer of DApp, it supports token issuance, DeFi, NFT and other functions; 2. Automatically execute contracts through code to reduce the risks of human intervention and fraud; 3. Build a DeFi ecosystem so that users can directly conduct financial operations such as lending and transactions; 4. Create and manage digital assets to ensure uniqueness and verifiability; 5. Improve the transparency and security of supply chain and identity verification; 6. Support DAO governance and realize decentralized decision-making.

To identify fake altcoins, you need to start from six aspects. 1. Check and verify the background of the materials and project, including white papers, official websites, code open source addresses and team transparency; 2. Observe the online platform and give priority to mainstream exchanges; 3. Beware of high returns and people-pulling modes to avoid fund traps; 4. Analyze the contract code and token mechanism to check whether there are malicious functions; 5. Review community and media operations to identify false popularity; 6. Follow practical anti-fraud suggestions, such as not believing in recommendations or using professional wallets. The above steps can effectively avoid scams and protect asset security.

DAI is suitable for users who attach importance to the concept of decentralization, actively participate in the DeFi ecosystem, need cross-chain asset liquidity, and pursue asset transparency and autonomy. 1. Supporters of the decentralization concept trust smart contracts and community governance; 2. DeFi users can be used for lending, pledge, and liquidity mining; 3. Cross-chain users can achieve flexible transfer of multi-chain assets; 4. Governance participants can influence system decisions through voting. Its main scenarios include decentralized lending, asset hedging, liquidity mining, cross-border payments and community governance. At the same time, it is necessary to pay attention to system risks, mortgage fluctuations risks and technical threshold issues.

Ordinary investors can discover potential tokens by tracking "smart money", which are high-profit addresses, and paying attention to their trends can provide leading indicators. 1. Use tools such as Nansen and Arkham Intelligence to analyze the data on the chain to view the buying and holdings of smart money; 2. Use Dune Analytics to obtain community-created dashboards to monitor the flow of funds; 3. Follow platforms such as Lookonchain to obtain real-time intelligence. Recently, Cangming Money is planning to re-polize LRT track, DePIN project, modular ecosystem and RWA protocol. For example, a certain LRT protocol has obtained a large amount of early deposits, a certain DePIN project has been accumulated continuously, a certain game public chain has been supported by the industry treasury, and a certain RWA protocol has attracted institutions to enter.

Is DAI suitable for long-term holding? The answer depends on individual needs and risk preferences. 1. DAI is a decentralized stablecoin, generated by excessive collateral for crypto assets, suitable for users who pursue censorship resistance and transparency; 2. Its stability is slightly inferior to USDC, and may experience slight deansal due to collateral fluctuations; 3. Applicable to lending, pledge and governance scenarios in the DeFi ecosystem; 4. Pay attention to the upgrade and governance risks of MakerDAO system. If you pursue high stability and compliance guarantees, it is recommended to choose USDC; if you attach importance to the concept of decentralization and actively participate in DeFi applications, DAI has long-term value. The combination of the two can also improve the security and flexibility of asset allocation.

The value of stablecoins is usually pegged to the US dollar 1:1, but it will fluctuate slightly due to factors such as market supply and demand, investor confidence and reserve assets. For example, USDT fell to $0.87 in 2018, and USDC fell to around $0.87 in 2023 due to the Silicon Valley banking crisis. The anchoring mechanism of stablecoins mainly includes: 1. fiat currency reserve type (such as USDT, USDC), which relies on the issuer's reserves; 2. cryptocurrency mortgage type (such as DAI), which maintains stability by over-collateralizing other cryptocurrencies; 3. Algorithmic stablecoins (such as UST), which relies on algorithms to adjust supply, but have higher risks. Common trading platforms recommendations include: 1. Binance, providing rich trading products and strong liquidity; 2. OKX,

USDC is safe. It is jointly issued by Circle and Coinbase. It is regulated by the US FinCEN. Its reserve assets are US dollar cash and US bonds. It is regularly audited independently, with high transparency. 1. USDC has strong compliance and is strictly regulated by the United States; 2. The reserve asset structure is clear, supported by cash and Treasury bonds; 3. The audit frequency is high and transparent; 4. It is widely accepted by institutions in many countries and is suitable for scenarios such as DeFi and compliant payments. In comparison, USDT is issued by Tether, with an offshore registration location, insufficient early disclosure, and reserves with low liquidity assets such as commercial paper. Although the circulation volume is large, the regulatory recognition is slightly low, and it is suitable for users who pay attention to liquidity. Both have their own advantages, and the choice should be determined based on the purpose and preferences of use.
