No.One Purpose of Project
01-With the high-speed development of information technology, people's demand for information security, the talent competition, competition in the market, such as the financial crisis, the enemy spy agencies have all lead huge risks to the development of the enterprises and institutions, internal espionage, hacker attacks, unconscious leaks between people, enterprises and countries became safe hidden trouble.
02-Using the traditional encryption technology to deal with the current explosion of cloud data encryption is more and more powerless whether from the speed of operation or encryption security. It is urgent to adopt a more efficient and secure encryption algorithm.
03-All kinds of smart devices, such as smart phones, smart body-wear devices, as well as a variety of derived APP software bring much convenience to our life, at the same time, due to personal information disclosure by kinds of fraud phone call also greatly affect everyone's life.
No.Two Principle of Project
Block Cipher Algorithm
Elliptic Curve Public Key Cryptography Algorithm
Cryptographic Hash Algorithm
Random Test Specification
Cryptographic Algorithm Encryption Signature Message Syntax Specification
No.Three CSA Technology Features
Safety and reliability. The hardware security protection can meet the strict security level of international PCI and the security level required by China UnionPay, which is the domestic password algorithm recognized by the state password bureau.
Versatility. CSA technology can be used for enterprise access control management system, all kinds of sensitive information transmission encryption between internal enterprise or the financial field, storage encryption, prevent some illegal third party to access to information. It can also be used for various security authentication, online banking, digital signature, etc.
Ease of use.Modular interface, through a simple protocol to achieve data interaction.
No.Four CSA Encryption Functions
In the cryptography field, encryption and decryption, attack and defense run through the whole process of cryptography development, thus promoting the development of cryptography, and the CSA algorithm appeared. In the actual operation process, after the data is preprocessed by the application module, it will be transmitted to the CSA encryption module through the agreed protocol. According to the application request, the CSA module can complete key pair generation, encryption and decryption, signature, signature verification, random number generation, hash algorithm and other operations, and return the corresponding data stream. The application module can check the data, determine whether the data has been tampered, and decrypt the real data through the corresponding key. The whole data flow is transmitted in ciphertext.
No.Five Application Cases
As shown in the figure below is a typical financial self-service system. The cardholder insert the card into the ATM machine or financial self-service terminals, after the financial self-service terminal finished the card information identification, it will turn on the encrypted Pin Pad for the cardholder to enter the password, and encrypt password with CSA technology into safety data to financial terminal and make a background processing.
- 【Financial Self-Service System】