1e41f4b71Sopenharmony_ci# Signing and Signature Verification with an SM2 Key Pair (ArkTS)
2e41f4b71Sopenharmony_ci
3e41f4b71Sopenharmony_ci
4e41f4b71Sopenharmony_ciFor details about the algorithm specifications, see [SM2](crypto-sign-sig-verify-overview.md#sm2).
5e41f4b71Sopenharmony_ci
6e41f4b71Sopenharmony_ci
7e41f4b71Sopenharmony_ci**Signing**
8e41f4b71Sopenharmony_ci
9e41f4b71Sopenharmony_ci
10e41f4b71Sopenharmony_ci1. Use [cryptoFramework.createAsyKeyGenerator](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#cryptoframeworkcreateasykeygenerator) and [AsyKeyGenerator.generateKeyPair](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#generatekeypair-1) to generate a 256-bit key pair (**KeyPair**) using SM2.
11e41f4b71Sopenharmony_ci   
12e41f4b71Sopenharmony_ci   In addition to the example in this topic, [SM2](crypto-asym-key-generation-conversion-spec.md#sm2) and [Randomly Generating an Asymmetric Key Pair](crypto-generate-asym-key-pair-randomly.md) may help you better understand how to generate an SM2 asymmetric key pair. Note that the input parameters in the reference documents may be different from those in the example below.
13e41f4b71Sopenharmony_ci
14e41f4b71Sopenharmony_ci2. Use [cryptoFramework.createSign](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#cryptoframeworkcreatesign) with the string parameter **'SM2_256|SM3'** to create a **Sign** instance. The key type is **SM2_256**, and the MD algorithm is **SM3**.
15e41f4b71Sopenharmony_ci
16e41f4b71Sopenharmony_ci3. Use [Sign.init](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#init-3) to initialize the **Sign** instance with the private key (**PriKey**).
17e41f4b71Sopenharmony_ci
18e41f4b71Sopenharmony_ci4. Use [Sign.update](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#update-3) to pass in the data to be signed.
19e41f4b71Sopenharmony_ci   
20e41f4b71Sopenharmony_ci   Currently, the amount of data to be passed in by a single **update()** is not limited. You can determine how to pass in data based on the data volume.
21e41f4b71Sopenharmony_ci   
22e41f4b71Sopenharmony_ci5. Use [Sign.sign](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#sign-2) to generate a signature.
23e41f4b71Sopenharmony_ci
24e41f4b71Sopenharmony_ci
25e41f4b71Sopenharmony_ci**Signature Verification**
26e41f4b71Sopenharmony_ci
27e41f4b71Sopenharmony_ci
28e41f4b71Sopenharmony_ci1. Use [cryptoFramework.createVerify](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#cryptoframeworkcreateverify) with the string parameter **'SM2_256|SM3'** to create a **Verify** instance. The key type is **SM2_256**, and MD algorithm is **SM3**.
29e41f4b71Sopenharmony_ci
30e41f4b71Sopenharmony_ci2. Use [Verify.init](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#init-5) to initialize the **Verify** instance using the public key (**PubKey**).
31e41f4b71Sopenharmony_ci
32e41f4b71Sopenharmony_ci3. Use [Verify.update](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#update-5) to pass in the data to be verified.
33e41f4b71Sopenharmony_ci   
34e41f4b71Sopenharmony_ci   Currently, the amount of data to be passed in by a single **update()** is not limited. You can determine how to pass in data based on the data volume.
35e41f4b71Sopenharmony_ci   
36e41f4b71Sopenharmony_ci4. Use [Verify.verify](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#verify-2) to verify the data signature.
37e41f4b71Sopenharmony_ci
38e41f4b71Sopenharmony_ci
39e41f4b71Sopenharmony_ci- Example (using asynchronous APIs):
40e41f4b71Sopenharmony_ci
41e41f4b71Sopenharmony_ci  ```ts
42e41f4b71Sopenharmony_ci  import { cryptoFramework } from '@kit.CryptoArchitectureKit';
43e41f4b71Sopenharmony_ci  import { buffer } from '@kit.ArkTS';
44e41f4b71Sopenharmony_ci  // The plaintext is split into input1 and input2.
45e41f4b71Sopenharmony_ci  let input1: cryptoFramework.DataBlob = { data: new Uint8Array(buffer.from("This is Sign test plan1", 'utf-8').buffer) };
46e41f4b71Sopenharmony_ci  let input2: cryptoFramework.DataBlob = { data: new Uint8Array(buffer.from("This is Sign test plan2", 'utf-8').buffer) };
47e41f4b71Sopenharmony_ci  async function signMessagePromise(priKey: cryptoFramework.PriKey) {
48e41f4b71Sopenharmony_ci    let signAlg = "SM2_256|SM3";
49e41f4b71Sopenharmony_ci    let signer = cryptoFramework.createSign(signAlg);
50e41f4b71Sopenharmony_ci    await signer.init(priKey);
51e41f4b71Sopenharmony_ci    await signer.update(input1); // If the plaintext is short, you can use sign() to pass in the full data at a time.
52e41f4b71Sopenharmony_ci    let signData = await signer.sign(input2);
53e41f4b71Sopenharmony_ci    return signData;
54e41f4b71Sopenharmony_ci  }
55e41f4b71Sopenharmony_ci  async function verifyMessagePromise(signMessageBlob: cryptoFramework.DataBlob, pubKey: cryptoFramework.PubKey) {
56e41f4b71Sopenharmony_ci    let verifyAlg = "SM2_256|SM3";
57e41f4b71Sopenharmony_ci    let verifier = cryptoFramework.createVerify(verifyAlg);
58e41f4b71Sopenharmony_ci    await verifier.init(pubKey);
59e41f4b71Sopenharmony_ci    await verifier.update(input1); // If the plaintext is short, you can use verify() to pass in the full data at a time.
60e41f4b71Sopenharmony_ci    let res = await verifier.verify(input2, signMessageBlob);
61e41f4b71Sopenharmony_ci    console.info("verify result is " + res);
62e41f4b71Sopenharmony_ci    return res;
63e41f4b71Sopenharmony_ci  }
64e41f4b71Sopenharmony_ci  async function main() {
65e41f4b71Sopenharmony_ci    let keyGenAlg = "SM2_256";
66e41f4b71Sopenharmony_ci    let generator = cryptoFramework.createAsyKeyGenerator(keyGenAlg);
67e41f4b71Sopenharmony_ci    let keyPair = await generator.generateKeyPair();
68e41f4b71Sopenharmony_ci    let signData = await signMessagePromise(keyPair.priKey);
69e41f4b71Sopenharmony_ci    let verifyResult = await verifyMessagePromise(signData, keyPair.pubKey);
70e41f4b71Sopenharmony_ci    if (verifyResult == true) {
71e41f4b71Sopenharmony_ci      console.info('verify success');
72e41f4b71Sopenharmony_ci    } else {
73e41f4b71Sopenharmony_ci      console.error('verify failed');
74e41f4b71Sopenharmony_ci    }
75e41f4b71Sopenharmony_ci  }
76e41f4b71Sopenharmony_ci  ```
77e41f4b71Sopenharmony_ci
78e41f4b71Sopenharmony_ci- Example (using synchronous APIs):
79e41f4b71Sopenharmony_ci
80e41f4b71Sopenharmony_ci  ```ts
81e41f4b71Sopenharmony_ci  import { cryptoFramework } from '@kit.CryptoArchitectureKit';
82e41f4b71Sopenharmony_ci  import { buffer } from '@kit.ArkTS';
83e41f4b71Sopenharmony_ci  // The plaintext is split into input1 and input2.
84e41f4b71Sopenharmony_ci  let input1: cryptoFramework.DataBlob = { data: new Uint8Array(buffer.from("This is Sign test plan1", 'utf-8').buffer) };
85e41f4b71Sopenharmony_ci  let input2: cryptoFramework.DataBlob = { data: new Uint8Array(buffer.from("This is Sign test plan2", 'utf-8').buffer) };
86e41f4b71Sopenharmony_ci  function signMessagePromise(priKey: cryptoFramework.PriKey) {
87e41f4b71Sopenharmony_ci    let signAlg = "SM2_256|SM3";
88e41f4b71Sopenharmony_ci    let signer = cryptoFramework.createSign(signAlg);
89e41f4b71Sopenharmony_ci    signer.initSync(priKey);
90e41f4b71Sopenharmony_ci    signer.updateSync(input1); // If the plaintext is short, you can use sign() to pass in the full data at a time.
91e41f4b71Sopenharmony_ci    let signData = signer.signSync(input2);
92e41f4b71Sopenharmony_ci    return signData;
93e41f4b71Sopenharmony_ci  }
94e41f4b71Sopenharmony_ci  function verifyMessagePromise(signMessageBlob: cryptoFramework.DataBlob, pubKey: cryptoFramework.PubKey) {
95e41f4b71Sopenharmony_ci    let verifyAlg = "SM2_256|SM3";
96e41f4b71Sopenharmony_ci    let verifier = cryptoFramework.createVerify(verifyAlg);
97e41f4b71Sopenharmony_ci    verifier.initSync(pubKey);
98e41f4b71Sopenharmony_ci    verifier.updateSync(input1); // If the plaintext is short, you can use verify() to pass in the full data at a time.
99e41f4b71Sopenharmony_ci    let res = verifier.verifySync(input2, signMessageBlob);
100e41f4b71Sopenharmony_ci    console.info("verify result is " + res);
101e41f4b71Sopenharmony_ci    return res;
102e41f4b71Sopenharmony_ci  }
103e41f4b71Sopenharmony_ci  async function main() {
104e41f4b71Sopenharmony_ci    let keyGenAlg = "SM2_256";
105e41f4b71Sopenharmony_ci    let generator = cryptoFramework.createAsyKeyGenerator(keyGenAlg);
106e41f4b71Sopenharmony_ci    let keyPair = generator.generateKeyPairSync();
107e41f4b71Sopenharmony_ci    let signData = signMessagePromise(keyPair.priKey);
108e41f4b71Sopenharmony_ci    let verifyResult = verifyMessagePromise(signData, keyPair.pubKey);
109e41f4b71Sopenharmony_ci    if (verifyResult == true) {
110e41f4b71Sopenharmony_ci      console.info('verify success');
111e41f4b71Sopenharmony_ci    } else {
112e41f4b71Sopenharmony_ci      console.error('verify failed');
113e41f4b71Sopenharmony_ci    }
114e41f4b71Sopenharmony_ci  }
115e41f4b71Sopenharmony_ci  ```
116