Domestic Overview algorithm

Domestic encryption algorithm

State secret algorithm is a set of independent research and innovation of our data encryption algorithm, after years of development, has promulgated more than standard algorithms, including SM1, SM2, SM3, SM4, SM7, cryptographic algorithms SM9, Zu (ZUC) and so on. The most widely used is the SM2, SM3, SM4 three kinds of commercial encryption algorithm, respectively, non-encryption algorithms, symmetric encryption algorithm, and hash algorithm symmetry.

1. SM1 algorithm.

The algorithm is a standard commercial password packet by the State Cryptography Administration prepared symmetric algorithm and key length are packet length 128, security strength of the algorithm and associated hardware and software to achieve considerable performance AES algorithm, the algorithm is not yet present disclosed, only in the form of IP cores present in the chip.

2. SM2 algorithm

The asymmetric key algorithm is an algorithm based on ECC algorithm, the encryption strength of 256 bits, its safety compared with currently used RSA1024 has obvious advantages.

3. SM3 algorithm

The algorithm is also called cryptographic hash algorithm, belongs to a hash (digest) algorithm, the hash value of 256, and SM2 algorithm is published together. Function MD5, the same SHA-1. Produce 256-bit code. The algorithm is irreversible algorithm. The algorithm is also confidential.

4. SM4 algorithm

The algorithm is a symmetric encryption algorithm, the standard is published together with WAPI, which is a 128-bit encryption strength. This algorithm is a grouping algorithm for wireless LAN products. The algorithm is the packet length is 128 bits, the key length is 128 bits. The key expansion algorithm and the encryption algorithm are implemented by iterative nonlinear structure 32. The same configuration as the encryption algorithm and decryption algorithm, but in the reverse order of use of round keys, the decryption round keys are the encryption round keys in reverse order.

5. SM7 symmetric cipher

SM7 algorithm is a block cipher, the packet length is 128 bits, the key length is 128 bits. Algorithms text SM7 not currently publicly available. SM7 apply to non-contact IC card applications including identity-aware application (access cards, work permits, entry permits), ticket type applications (large-scale event tickets, event tickets), payments and Card-type applications (integration of consumer card, campus card, business card, bus card).

6. SM9 asymmetric algorithm

SM9 is based on the identity of the cryptographic algorithm, and similar SM2, it consists of four parts: General, digital signature algorithms, key exchange protocol and the key encapsulation mechanism and public key encryption algorithm. In these algorithms use this tool on the elliptic curve, SM2 algorithm is different from the traditional sense, can achieve identity-based cryptography, public key is the user's identity information that is related to the identification, thereby than the traditional sense the public key cryptography has many advantages, eliminating the need for certificate management.
Bilinear bilinear nature of SM9 is equally applicable to the general part of the identification code based on the SM2, since SM9 General added applies to the theory and implementation of the foundation.

Guess you like

Origin blog.csdn.net/makenothing/article/details/94448088