Feedback

SM2 Encryption and Decryption

📖 Description

1. Why Must SM2 Be Used in Development?

With the deepening of "Xinchuang (Information Technology Application Innovation)", SM2 has become the mandatory standard for most security scenarios in China:


2. Core Features Analysis

This site's tool provides a one-stop SM2 processing solution, supporting the standard C1C3C2 and C1C2C3 ordering modes:

A. Key Pair Generation
B. Public Key Encryption
C. Private Key Decryption
D. Absolute Privacy Guarantee: Local Computation

3. Operation Process Overview

Step 1: Obtain Keys
  1. If you don't have keys yet, click "Generate SM2 Key Pair".
  2. Securely save the private key and share the public key.
Step 2: Public Key Encryption
  1. Enter the original text in the "Text to Process" box.
  2. Paste the received 64-byte hexadecimal public key (starting with 04) into the "Public Key" box.
  3. Click "SM2 Encrypt" to obtain the encrypted hexadecimal string.
Step 3: Private Key Decryption
  1. Paste the SM2 ciphertext represented in Hex format.
  2. Enter your private 32-byte hexadecimal private key.
  3. Click "SM2 Decrypt" to restore the original content.

4. SM2 Common Parameter Reference

Parameter Description Example Value
Curve Name SM2 Recommended Curve (sm2p256v1) 256-bit Elliptic Curve
Private Key Length 32-byte Hexadecimal String 7E9...A12
Public Key Length 64-byte Hexadecimal (Uncompressed) 128-character string starting with 04...
Ciphertext Order C1(Curve Point) + C3(Hash) + C2(Ciphertext) Recommended by OSCCA

5. Why Choose This National Cryptography Assistant?

📖 Recommendation