IC card encryption algorithm and industry operation analysis

With the continuous improvement of the security requirements for access control in recent years, it should be said that the mainstream access control system has been fully upgraded to the CPU card. I think I still want to share with you the first one. We all know that we usually There are many types of cards for access control systems, such as contact cards, SIM cards like mobile phones, social security cards like the whole country, and non-contact IC cards in ordinary public transportation, access control, corporate, and campus cards. One type is a contact and non-contact card. Now everyone's card in the bank is a dual interface card, and the contact side has a non-contact side, which is from the way of the IC card.

From the perspective of the security method of the IC card, there are still many ICs in the house, including some ICs used in the building access control. In fact, his security is very very low, and you can copy it for a few dollars, but from In terms of security, what is higher than the IC card is actually a mainstream encrypted IC card, but with the advent of password cracking, many questions have been raised about the encryption IC, as well as the ICU card.

In fact, another person may have noticed that our IC card is also diverse from the evaluation points. The general IC card is 125KHz. According to the current standards, this is the most commonly used one. Of course, there are some logistics. Parking space, which is also used in parking management, some 43M, 915M, 2.45G, and 5.8G cards used on the highway. These cards are still CPU in terms of security. The card, which already constitutes a mainstream technology on the access card, and further as a CPU card, the state has applied for government military applications at the government level. The specific background is the Ministry of Industry and Information Technology in 2009, requiring important access control. Excessive CPU cards are required in the system, and there are some requirements for the application of over-sized cards.

What is a national secret CPU card, there must be mentioned an encryption algorithm, we know that we usually have a variety of encryption algorithms, the most commonly used is the algorithm, which was discovered by IBM in the United States in 1972, and his length is 64-bit, with the continuous improvement of computer computing power, everyone found that 64-bit is also easy to be solved. He increases the length instead of the new cross-password algorithm. His password can be up to 128 bits long, but usually 112 bits, and then below is an encryption algorithm we call advanced. This is also the AS algorithm. It is a standard adopted by the US federal government. It has been analyzed by many parties and used by the whole world. By 2006, AS has become the most popular algorithm. It can be 128, 192, and 256 bits, but is usually 128 bits.

Finally, let's talk about the national secret algorithm. Usually, two algorithms are used. One is to speed up the SM1 algorithm and the SM7 algorithm. It mainly talks about the SM1 algorithm of the national secret. It uses the commercial cipher grouping algorithm. Its length is the same as that of the AS. The degree of confidentiality and related hardware and software business is comparable to AS, but he is very different from AS. So far its algorithm is not public, it exists only in the form of IP core in the chip, if it wants its algorithm It is necessary to use his IP core to the middle of the hardware to apply.

The second country has a complete set of management system for the national secret algorithm. First, he has a full-time management organization. From the state to the municipalities directly under the central government, there are completed laws and regulations. In 2006, the commercial password product life regulations were promulgated. Emphasize that you must obtain a fixed-point certificate issued by the Cryptographic Authority for the production of password products. The algorithm mentioned by the National Secret Service is also mentioned here. In addition to production, it also adopts a product sales license attitude for sales, so if you want to sell national secret products, you also need to obtain a license issued by the National Secret Service. This is the certificate and license obtained.

In addition to a specific product, in addition to the manufacturer to obtain the production location, it is important that you obtain a production and sales certificate, this model is not defined by your company, but the model approved after the product is certified. Now the national secret system has begun to be used in government, military and judicial applications.

Everyone just mentioned in the exchange, that is, the card of the mobile phone. In fact, this thing has developed a lot. It should be said that it has gradually been introduced to the market since 2006, but we can now clearly say that the mobile phone card has been developed to enter the communication, we all know The first generation of mobile phone card products was launched in 2006. You can see from the pictures that it is actually pulling a small tail on the SIM card of our mobile phone. Because some mobile phone cases are made of metal, the user needs to replace it. Mobile phones, when used in addition to mobile phones, often encounter, easily lead to disconnection, and now the design of various shapes, the second generation is currently in Hubei, Hunan, in Guangdong, mainly in Shenzhen, the use of mobile solutions The program, his comments are not the same as our usual IC card, which is characterized by the first product of our country's independent intellectual property rights, and he is very in line with the requirements of the operator binding customer, but it must be operated by someone. That is, when we are using a 2.4G mobile phone card to do various operations, your mobile phone must be powered, such as There is no way to use without electricity. In addition, the use distance of 2.4G can be as long as 1.4 meters, which leads to this stability. It is not consistent with the standard of UnionPay recently. The promotion in this piece is not very strong. At present, it should probably be About this mobile phone card development direction is NFC, NFC is a communication technology, is managed by an NFC forum, the founding was founded by Sony and Nokia.

First of all, NFC can replace our card. It has a card reader mode and a P2P mode. However, there are many types of NFC. In summary, these three types are summarized: the first SWP solution that requires NFC, and the NFC part is On the mobile phone, part of it is in the credit card. Currently, operators use this solution. Of course, there is a full-terminal solution for mobile phones, all of which are on mobile phones, and have nothing to do with mobile phone operators. On the SIM, we have a lot of bank cards. You can use this card to install on your card in software. You can choose which one to use when you use it, it is very convenient, and you can see that you can not only When the card is used, you can also read the information in some of your bank cards through it. This is very convenient. This is some of the current operations in China Mobile. This is some mobile phones that are currently compatible with NFC, and I believe this one will be more and more.

ZENGHUI PAPER PACKAGE is a good Apparel Packaging manufacturers and suppliers with good reputation, we have our own factory, we are able to provide our customers varieties of other apparel packaging boxes with good quality and reasonable price. such as sock boxes,underware boxes,scarf boxes.etc.Welcome to wholesale products from us.

Other Apparel Packaging Box

Luxury Paper Box,Scarf Paper Box,Scarf Packaging Box,Apparel Packaging Box

Zenghui Paper Package Industry and Trading Company , http://www.zhpaperpackage.com