Home > other >  SM series algorithms to use in the equipment, have to know how to use?
SM series algorithms to use in the equipment, have to know how to use?

Time:11-22

SM series algorithms to use in the equipment, have to know how to use?

CodePudding user response:

SM algorithm is the cipher algorithm there are many kinds of symmetric encryption, asymmetric encryption and the

CodePudding user response:

You'd better choose to use the original poster on which commercial cipher algorithm, and then choose

CodePudding user response:

The secret and business secret what is the difference between the two

CodePudding user response:

In fact is the same, because is used after the state administration of the commercial password authentication algorithm, can use our company, so popular that the dense or commercial cipher

CodePudding user response:

Cannot be used without authentication, online there is a software implementation way

CodePudding user response:

Certification is not a necessary condition, but some companies or industries of commercial cipher qualification requirements, the certificate is authorized by bureau of the commercial passwords to audit

CodePudding user response:

The algorithm of high safety, high safety and international algorithm

CodePudding user response:

The secret is mainly in order to protect certain organs in our country, the industry, to prevent damage to introduce abroad, thus mainly exclusion, each algorithm has the international standard docking algorithm

CodePudding user response:

I contact SM2 is related to ecc

CodePudding user response:

To whether can software to implement

CodePudding user response:

The same problem, the software to achieve convenient

CodePudding user response:

Is not the software more convenient, there are two reasons, one is some algorithms do not allow the software realization, the other is a complicated algorithm software cannot be achieved, or even also takes up a lot of resources, and the slow speed, efficiency is not high

CodePudding user response:

Could you recommend any good, also is to have six countries these requirements

CodePudding user response:

Well, the chip, there is also some secret algorithm, which to use

CodePudding user response:

Can see LKT4305 lenk core of Ann, they used the good

CodePudding user response:

Good encryption or use hardware, demanding is use a dedicated hardware devices,

CodePudding user response:

I used his anti-piracy chip, also have this kind of data encryption?

CodePudding user response:

Have a friend do the six used, good cost performance

CodePudding user response:

: so the best of the domestic or dense algorithm, not restricted?

CodePudding user response:

Latest news also saw, foreign of encryption products return true have monitoring crack, too unreliable

CodePudding user response:

I also want to know about different usage

CodePudding user response:

Our country is still on, support domestic

CodePudding user response:

SM? Domestic encryption algorithm is to have the qualification to get, are generally find security chip manufacturers, burn in advance, and you need to use safe chip algorithm interface can be supplied by the manufacturer to you,
  • Related