DES(TripleDES): Based on DES, a piece of data is encrypted three times with three different keys, which is more powerful. AES(AdvancedEncryptionStandard): Advanced encryption standard, which is the next generation high-speed and high-security encryption algorithm standard; Algorithm principle AES algorithm is based on permutation and permutation operation.
Unsafe encryption algorithms are as follows: 1, DES(DataEncryptionStandard): data encryption standard, which is fast and suitable for encrypting a large number of data. 2,33 DES (Triple DES): Based on DES, a piece of data is encrypted three times with three different keys, which is more powerful.
RSA algorithm, AES algorithm, SHA algorithm and ECC algorithm do not belong. RSA algorithm: RSA algorithm is an asymmetric encryption algorithm, which was invented by three American cryptographers and widely used in network security, digital signature and other fields.
The hash algorithm that is considered unsafe is MD5. MD5(MessageDigestAlgorithm5) is a hash encryption algorithm, which can compress messages of any length into a 128-bit digest.
20 10 What algorithm is not disclosed?
The SM 1 algorithm is not disclosed. SM 1 algorithm has the same security strength and related software and hardware implementation performance as AES. The algorithm is not public and only exists in the chip in the form of ip core. State secret is a domestic cryptographic algorithm approved by the State Cryptography Bureau. There are mainly SM 1, SM2, SM3 and SM4, and the key length and packet length are all 128 bits.
Among them, SM 1 is a symmetric block encryption algorithm, and the block length and key length are both 128 bits. The security strength and related hardware and software implementation performance of the algorithm are equivalent to the American AES encryption standard. The algorithm is not public and only exists in the chip in the form of ip core.
At the end of 2006, the National Cryptography Administration published domestic cryptographic algorithms such as SMSM3.
Public cryptographic algorithm: the key used for encryption is different from the key used for decryption, and the decryption key cannot be calculated from the encryption key (at least for a reasonably assumed long time). It is called public key algorithm because the encryption key can be made public, that is, strangers can encrypt information with the encryption key.
Popular science: domestic cryptographic algorithm
1, the national secret algorithm is a series of algorithms formulated by the National Cryptography Bureau. It includes symmetric encryption algorithm, elliptic curve asymmetric encryption algorithm and hash algorithm. Including SMSMSMSMS4 and so on. , in which: SM 1: symmetric encryption algorithm with encryption strength of 128 bits is implemented by hardware.
2. State secret is a domestic cryptographic algorithm approved by the State Cryptography Bureau. Mainly SM 1, SM2, SM3 and SM4. Both the key length and the package length are 128 bits.
3. State secret algorithm: the domestic cryptographic algorithm recognized by the State Cryptography Bureau, that is, the commercial password.
4. State secret is a domestic cryptographic algorithm approved by the State Cryptography Bureau. For example, in the application of access control, SM 1 algorithm is used for identity authentication and data encryption communication, so as to verify the legitimacy of the card and ensure the authenticity of identity identification. Security is a key issue related to the interests of the country, city information, industry users and people.
5. The latest algorithm is as follows. At present, the commonly used domestic cryptographic algorithms independently developed in China are as follows: SM 1 algorithm.
6.SM7 algorithm is also a block cipher algorithm, with the block length of 128 bits and the key length of 128 bits. At present, the algorithm text of SM7 has not been published publicly. SM7 is suitable for non-IC card applications, including identification applications such as access cards, ticketing applications, payment and one-card applications such as campus cards.
The core of the password is the encryption algorithm, which cannot be made public.
1, this is mainly to ensure that the designed cryptographic algorithm is reliable and cannot be cracked casually, because the designed cryptographic algorithm will always be used by people, if it is to be widely used.
2. Password is the core of network and information security, and password problems generally come down to the design and analysis of cryptographic algorithms and protocols. Cryptography is the core of security technology, among which encryption and decryption, digital signature, key exchange and other technologies are important guarantee mechanisms.
3. Realize low cost and high performance. However, it must be pointed out that the open principle of password design does not mean that all passwords must be open when applied. For example, the military and political core passwords of all countries in the world do not disclose their own encryption algorithms.
4. Cryptographic algorithm is the general name of encryption algorithm and decryption algorithm, and it is the core of cryptographic system. A cryptographic algorithm can be regarded as a combination of some exchanges. When the input is plaintext, after these transformations, the output is ciphertext. This is the process of encrypted exchange, and the cryptographic algorithm is called encryption algorithm.
5. Asymmetric encryption Public key encryption is an encryption technology, which uses a pair of keys (public key and private key) to encrypt and decrypt data. The sender uses the public key of the receiver to encrypt the data, and the receiver uses its own private key to decrypt the data.
6. Ciphertext: Ciphertext is the encrypted text, and plaintext is the text before encryption. The word encryption sometimes refers to ciphertext, but it is usually used to refer to encryption methods. The output of plain text after some disguise or transformation. It can also be understood as a set of characters or bits that cannot be directly understood.