Research on Data Encryption Security System in Securities Trading

Research on Data Encryption Security System in Securities Trading

Author / Tao Jianfeng, Director of Information Technology Department, CITIC Construction Investment Securities Co., Ltd. Du Guowei, Chen Hongping, CITIC Construction Investment Securities Co., Ltd. Information Technology Department Since the implementation of the “Cryptography Law of the People’s Republic of China”, it has effectively promoted the advancement of cryptographic technology, industry development, and standardized applications. … Read more

Introduction to Commercial Cryptographic Algorithms

Introduction to Commercial Cryptographic Algorithms

Commercial cryptographic technology refers to the technology that can implement encryption, decryption, and authentication functions of commercial cryptographic algorithms (including programming technology for cryptographic algorithms and implementation technologies for cryptographic algorithm chips, encryption cards, etc.). Commercial cryptographic technology is the core of commercial cryptography, and the state has classified commercial cryptographic technology as a national … Read more

Application of National Encryption Algorithms in Various Platforms

Application of National Encryption Algorithms in Various Platforms

National encryption refers to the domestic encryption algorithms recognized by the National Cryptography Administration. The main algorithms include SM1, SM2, SM3, SM4, and the latest SM9. These algorithms are primarily used in domestic environments as recognized by the National Cryptography Administration. SM2 Algorithm: The SM2 elliptic curve public key cryptography algorithm is a public key … Read more

Implementation of Cryptographic Algorithms: AES, 3DES, RSA, SM2, SM3, SM4

Implementation of Cryptographic Algorithms: AES, 3DES, RSA, SM2, SM3, SM4

Click the blue text above “Programming Diary” to follow below National secret algorithms: These are algorithms independently developed by our country to reduce excessive reliance on foreign technology. National secret refers to the domestic cryptographic algorithms recognized by the National Cryptography Administration. The following is the specific correspondence: Symmetric algorithms: AES, DES, SM4 Asymmetric algorithms: … Read more