CodePudding user response:
SM algorithm is the cipher algorithm there are many kinds of symmetric encryption, asymmetric encryption and theCodePudding user response:
You'd better choose to use the original poster on which commercial cipher algorithm, and then chooseCodePudding user response:
The secret and business secret what is the difference between the twoCodePudding user response:
In fact is the same, because is used after the state administration of the commercial password authentication algorithm, can use our company, so popular that the dense or commercial cipherCodePudding user response:
Cannot be used without authentication, online there is a software implementation wayCodePudding user response:
Certification is not a necessary condition, but some companies or industries of commercial cipher qualification requirements, the certificate is authorized by bureau of the commercial passwords to auditCodePudding user response:
The algorithm of high safety, high safety and international algorithmCodePudding user response:
The secret is mainly in order to protect certain organs in our country, the industry, to prevent damage to introduce abroad, thus mainly exclusion, each algorithm has the international standard docking algorithmCodePudding user response:
I contact SM2 is related to eccCodePudding user response:
To whether can software to implementCodePudding user response:
The same problem, the software to achieve convenientCodePudding user response:
Is not the software more convenient, there are two reasons, one is some algorithms do not allow the software realization, the other is a complicated algorithm software cannot be achieved, or even also takes up a lot of resources, and the slow speed, efficiency is not highCodePudding user response:
Could you recommend any good, also is to have six countries these requirementsCodePudding user response:
Well, the chip, there is also some secret algorithm, which to useCodePudding user response:
Can see LKT4305 lenk core of Ann, they used the goodCodePudding user response:
Good encryption or use hardware, demanding is use a dedicated hardware devices,CodePudding user response:
I used his anti-piracy chip, also have this kind of data encryption?CodePudding user response:
Have a friend do the six used, good cost performanceCodePudding user response:
: so the best of the domestic or dense algorithm, not restricted?CodePudding user response:
Latest news also saw, foreign of encryption products return true have monitoring crack, too unreliableCodePudding user response:
I also want to know about different usageCodePudding user response:
Our country is still on, support domesticCodePudding user response:
SM? Domestic encryption algorithm is to have the qualification to get, are generally find security chip manufacturers, burn in advance, and you need to use safe chip algorithm interface can be supplied by the manufacturer to you,