11
•
Create a digital envelope based on the SM2/RSA encryption algorithm.
•
Generate random number sequences on the physical noise generator chip approved by the
China's State Cryptography Administration (SCA).
•
Provide user access control and management to improve device security.
•
Support key backup and recovery to ensure security and reliability of security application
systems.
Application scenarios
The encryption modules are used to provide secure encrypted transmission mainly in the power,
finance, transportation, and industrial control sectors.
They can be used on an IPsec VPN as shown in
and other scenarios to encrypt and verify
data by using the GM encryption algorithms, enhancing transmission security and data integrity.
When using the encryption modules, make sure both the transmission ends use the same encryption
algorithm to encrypt data.
Figure 15 Application scenario