Article Preview
TopIntroduction
Blockchain, a new type of distributed database (You, 2022) in essence, integrates a series of emerging information technologies including consensus mechanism, encryption algorithm, network communication, distributed architecture, and smart contract. All these technologies also contribute to the characteristics of blockchain, such as decentralization, openness, transparency, traceability and non-tampering. Its emergence has brought new solutions to the trust problems, privacy problems and data differences (George, 2022) in the process of multi-party cooperation. It is a huge boost to the establishment and strengthening of the integrity system of the whole Internet, and even to the strengthening of the integrity system in the real world. Blockchain can realize reliable trust transmission at low cost; therefore, it can definitely serve as the cornerstone of trust in the Internet of value and trust of the next generation.
At present, blockchain technology has penetrated into the development of all walks of life, and it has made continuous innovations and breakthroughs. Meanwhile, the problems of Internet and information security caused by its development should be taken into consideration (Avkurova et al., 2022). Individuals, enterprises, and countries cannot ignore network and information security, especially in the current international environment that is becoming increasingly complicated, challenging, and uncertain.
In blockchain technology, a large number of cryptographic algorithms are used (Guo & Yu, 2022; Jose & Prakash, 2014), such as the Hash algorithm (Kuznetsov et al., 2021), digital signature technology, symmetric encryption algorithm, and the asymmetric encryption algorithm. Different types of encryption algorithms are all crucial in different modules, and they jointly ensure the security of data in blockchain. However, many cryptographic algorithms used worldwide now have been cracked and attacked frequently, for there are backdoor security risks and a large number of uncontrollable factors. Therefore, research on how to solve the security risks of cryptographic algorithms in blockchain application has become critical to determine whether blockchain technology can be widely used in all walks of life or not.
To keep encryption and decryption algorithms independent and controllable, China’s State Cryptography Administration has released a series of more efficient and secure commercial cryptographic algorithms since 2010, such as SM2, SM3, SM4, SM9, and so on. After 2020, a range of national standards related to cryptography were promulgated, such as the Cryptography Law of the People’s Republic of China, which effectively standardized and promoted the application of national commercial cryptographic algorithms in every field.
The alliance chain (Li et al., 2021) has different forms and structures from public chains, such as BTC and ETH, and it achieves a balanced state between decentralization and centralization, both of which make the alliance chain the main form of blockchain that attracts wide attention from people. Hyperledger Fabric (Androulaki et al., 2018) is one of the most popular alliance chains at present, and its security mechanism is particularly important. The encryption and decryption algorithms involved in it are all international algorithms, such as Elliptic Curve Digital Signature Algorithm (ECDSA), AES, SHA-256, and so on (Cao et al., 2022).