Haitai Fangyuan SM2 algorithm Key boost public key cryptography algorithm upgrade

With the development of cryptography and the improvement of computing power in the world, the existing RSA1024-based cryptosystem can no longer meet the security requirements of current and future applications. Due to historical reasons, in a large number of domestic information systems, CA companies that have obtained the "Electronic Authentication Service Password License" and "Electronic Authentication Service License" according to law are currently using the RSA algorithm. Most of the key length is 1024. Bits, only a small number of keys use 2048 bits or longer.

The difficulty of RSA algorithm based on the factorization of large numbers: that is, only the holder of the private key can multiply the prime number p/q to obtain the public key parameter n=p*q, and others cannot obtain p/q from the n decomposition. . If the public key parameter n can be decomposed, the corresponding private key can be obtained therefrom.

The RSA Challenge is a challenge event initiated by RSA Labs on March 18, 1991. The purpose is to encourage research on two aspects: computational number theory, large integer decomposition, and the practical difficulty of cracking RSA keys used in passwords. RSA discloses a list of semi-prime numbers (that is, the public key parameter n in the RSA algorithm), and the challenger who successfully breaks down n will receive a certain amount of bonus. On April 1, 1991, a 100-bit decimal number RSA-100 was successfully decomposed. The 2007 RSA Challenge was terminated. RSA Labs claims that the industry has gained a deep understanding of the cryptanalysis of common symmetric key algorithms and public key cryptography algorithms. So this type of challenge will not be carried out anymore.

In 2003, Adi Shamir and Eran Tromer published a paper on Factoring Large Numbers with the TWIRL Device at Crypto'2003, designed a device for large factor decomposition (TWIRL), estimated (in 2003 technical conditions) 1 Ten million dollars can be manufactured, and the device can crack 1024 bits RSA key within one year. The design of TWIRL immediately led RSA Lab to fix the recommended value of the RSA algorithm key length. According to reports from world-renowned research institutions, 1024 bits RSA keys should only be used until 2010, 2048 bits RSA keys should only be used until 2030, 3072 bits RSA keys can be used after 2030.

Like the RSA algorithm, the SM2 algorithm belongs to the asymmetric algorithm system and belongs to the Elliptic Curve Cryptography (ECC) algorithm. However, unlike the RSA algorithm, the RSA algorithm is based on the mathematical problem of large integer decomposition. The SM2 algorithm is based on the discrete logarithm problem of the point group on the elliptic curve.

Compared with the RSA algorithm, the SM2 algorithm has the following advantages:

a high security. The 192-bit SM2 password strength is already stronger than the RSA 2048-bit password strength.

b storage space is small. The password of the SM2 algorithm generally uses 192-256 bits, and the RSA algorithm password generally needs to use 2048-4096 bits.

c signature speed. SM2 is much faster than RSA in private key operations.

Domestic algorithm. The national password management department formulates specifications, and there is no unopenable password to ensure that there is no back door available abroad.

It is currently considered that the RSA 1024-bit algorithm, which is widely used in China, is no longer secure. The National Cryptographic Authority issued a notice: Since July 1, 2011, the information system that is put into operation and uses public key cryptography should use the SM2 elliptic curve. Cryptographic algorithm

Beijing Haitai Fangyuan Technology Co., Ltd. (hereinafter referred to as Haitai Fangyuan) was established in 2003, mainly engaged in the research of terminal cryptography equipment based on cryptography. After more than 10 years of accumulation, there is a deep knowledge of cryptography. With the increasing insecurity of the RSA algorithm, Haitai Fangyuan conducted research on terminal cryptographic equipment based on the SM2 algorithm with the support of the National Cryptography Administration in 2008. With the efforts of technicians, Haitai Fangyuan participated in the country. The draft SM2 algorithm specification was drafted and became a member of the SM2 algorithm committee. And in 2009, it became the first enterprise to identify by SM2 algorithm Key. Based on the SM2 algorithm, Haitai Fangyuan further complied with the call of the national secret, making its terminal cryptographic device USBKey compatible with the national SM1/SM2/SM3 algorithm. At the same time, it also supports RSA1024/2048, SSF33, DES, 3DES, AES and other international mainstream algorithms, which is a big advantage for its terminal cryptographic equipment in the commercial application market. Since 2009, Haitai Fangyuan's SM2 algorithm has shipped more than 5 million Keys, providing strong security for financial, securities, CA, integrators, government and other industries.

As time goes by, the products based on the SM2 algorithm industry chain will be more and more, and the use environment will become more and more mature, so the application based on SM2 algorithm will become more and more simple. Haitai Fangyuan will follow the development of technology, based on the exquisite craftsmanship of its cryptographic technology, and make greater achievements in the future terminal security market, and continuously promote the upgrade of China's public key cryptography algorithm.

4564567567567567

Empire Wedding Dresses1

Empire Wedding Dresses,Empire Western Wedding Dresses,Empire Boho Wedding Dresses,Empire Sexy Wedding Dress

Bossgoo Wedding Company Co., Ltd. , https://www.bossgoodemo.com

Posted on