Fig 1.
The principles of the SM2 algorithm.
Fig 2.
The SM3 cryptographic hash algorithm.
Fig 3.
SM4 cryptographic algorithm flow chart.
Fig 4.
The overall security architecture.
Fig 5.
The schematic diagram of Encrypted Socket Communication.
Fig 6.
End-to-end communication timing diagram.
Fig 7.
The proposed hybrid encryption scheme for data communication is based on SM2, SM3, and SM4.
Table 1.
The identifiers and descriptions used in the framework.
Fig 8.
End-to-end data transmission protocol flowchart.
Table 2.
The test results of the hybrid encryption scheme for data communication.
Table 3.
The performance testing results of the SM2 and RSA-3072.
Table 4.
The performance testing results of the SM3 and SHA-256.
Table 5.
The performance testing results of SM4 and AES-256.
Table 6.
Evaluation results of security performance.
Table 7.
Confidentiality, integrity, and availability analysis results.
Fig 9.
Overall performance comparison of SM2 and RSA-3072 algorithms.
Fig 10.
The performance comparison between SM3 and SHA-256.
Fig 11.
The performance comparison between SM4 and AES-256.