National cryptographic algorithm, a domestic cryptographic algorithm recognized by the State Cryptographic Bureau, is a commercial cryptographic algorithm.
The National Cryptozoology Algorithm is a series of algorithms set by the State Cryptozoology Bureau. These include symmetric encryption algorithms, elliptic curve asymmetric encryption algorithms, and hash algorithms. Specifically include SM1, SM2, SM3, etc.
SM1, a symmetric encryption algorithm with an encryption strength of 128 bits, is implemented in hardware.
SM2, the public key algorithm announced by the State Cryptozoology Administration, has an encryption strength of 256 bits.
SM3, password hash algorithm, hash value length is 32 bytes.
Extended information
Commercial passwords have a wide range of applications and are mainly used to process sensitive internal information, administrative affairs information, economic information, etc. that do not involve state secrets but are sensitive. Encrypted protection. For example, commercial passwords can be used for enterprise access control, transmission encryption and storage encryption of various sensitive information within the enterprise to prevent illegal third parties from obtaining information content; they can also be used for various security authentications, online banking, digital signatures, etc.
For example: In access control applications, the SM1 algorithm is used for identity authentication and data encrypted communication to verify the legitimacy of the card and ensure the authenticity of the identity recognition. Security is a key issue related to the interests of the country, city information, industry users, and people.
The State Cryptozoology Administration also provides guidance on the construction, upgrading, and application of existing important access control systems, and strengthens the standardization of chips, cards, and systems. Cases of upgrading national secret access control systems are also gradually increasing, and CPU cards, CPU card reading and writing equipment and key management systems based on independent domestic intellectual property have attracted widespread attention.