Tagged articles
9 articles
Page 1 of 1
Lin is Dream
Lin is Dream
Mar 18, 2025 · Information Security

Master OpenSSL on CentOS: Install, Upgrade, and Generate RSA/SM2 Keys

This article explains OpenSSL’s origins, its role in encryption on CentOS, common use cases such as web servers and database security, provides step‑by‑step installation and upgrade commands, and demonstrates how to generate RSA, SM2, AES, and SM4 keys via the OpenSSL command line and Java alternatives.

CentOSOpenSSLRSA
0 likes · 8 min read
Master OpenSSL on CentOS: Install, Upgrade, and Generate RSA/SM2 Keys
AntTech
AntTech
Dec 6, 2024 · Information Security

Ant Financial's MorseCrypto Wins First Place in the 2024 Financial Cipher Cup Second Stage with High‑Performance SM2/SM3/SM4 Implementations

Ant Financial's MorseCrypto team secured first place in the 2024 Financial Cipher Cup second‑stage competition by delivering highly optimized SM2, SM3, and SM4 implementations on X86 and ARM platforms that achieve up to 4.3‑times faster verification while meeting strict security and memory constraints.

AssemblyInformation SecuritySM2
0 likes · 4 min read
Ant Financial's MorseCrypto Wins First Place in the 2024 Financial Cipher Cup Second Stage with High‑Performance SM2/SM3/SM4 Implementations
Open Source Tech Hub
Open Source Tech Hub
Jul 2, 2024 · Information Security

Master GmSSL: Build, Install, and Use China’s National Cryptography Suite

This guide introduces GmSSL, an OpenSSL‑compatible toolbox that implements China’s national cryptographic algorithms, explains its lightweight and cross‑platform features, and provides step‑by‑step instructions for compiling, installing, and using core commands, SM4/SM3/SM2 operations, and certificate authority workflows.

GmSSLOpenSSLSM2
0 likes · 12 min read
Master GmSSL: Build, Install, and Use China’s National Cryptography Suite
Open Source Linux
Open Source Linux
Mar 7, 2024 · Information Security

Why China’s National Cryptographic Algorithms Matter: SM1‑SM9 Explained

The article introduces China’s national cryptographic standards—including SM1, SM2, SM3, SM4, SM7, SM9 and ZUC—explaining their origins, key features, implementation details, comparison with international algorithms, and typical use cases such as AD‑WAN, IPsec, and 4G/5G VPDN networks, highlighting their role in enhancing information security.

BlockchainSM2SM3
0 likes · 16 min read
Why China’s National Cryptographic Algorithms Matter: SM1‑SM9 Explained
Bilibili Tech
Bilibili Tech
Aug 23, 2022 · Information Security

Constant-Time Implementation and Optimization of SM2 Finite Field Inversion

The article analyzes constant‑time computation of the multiplicative inverse in SM2’s prime field, compares the variable‑time Extended Euclidean Algorithm with a constant‑time Fermat‑based square‑and‑multiply exponentiation, optimizes the fixed exponent using add‑chain generation, and shows this reduces multiplications from ~187 to ~41, making inversion the dominant cost in secure SM2 signing.

Fermat's little theoremGoSM2
0 likes · 12 min read
Constant-Time Implementation and Optimization of SM2 Finite Field Inversion
Bilibili Tech
Bilibili Tech
Mar 17, 2022 · Information Security

How to Secure SM2 Elliptic Curve Operations with Constant‑Time Techniques

This article explains why side‑channel attacks threaten SM2, SM3, and SM4 algorithms, describes the vulnerabilities of table‑lookup and double‑and‑add implementations, and presents constant‑time scalar multiplication and selection methods in Go to protect private keys on blockchain platforms.

GoSM2constant-time
0 likes · 13 min read
How to Secure SM2 Elliptic Curve Operations with Constant‑Time Techniques