Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

The principles of the SM2 algorithm.

More »

Fig 1 Expand

Fig 2.

The SM3 cryptographic hash algorithm.

More »

Fig 2 Expand

Fig 3.

SM4 cryptographic algorithm flow chart.

More »

Fig 3 Expand

Fig 4.

The overall security architecture.

More »

Fig 4 Expand

Fig 5.

The schematic diagram of Encrypted Socket Communication.

More »

Fig 5 Expand

Fig 6.

End-to-end communication timing diagram.

More »

Fig 6 Expand

Fig 7.

The proposed hybrid encryption scheme for data communication is based on SM2, SM3, and SM4.

More »

Fig 7 Expand

Table 1.

The identifiers and descriptions used in the framework.

More »

Table 1 Expand

Fig 8.

End-to-end data transmission protocol flowchart.

More »

Fig 8 Expand

Table 2.

The test results of the hybrid encryption scheme for data communication.

More »

Table 2 Expand

Table 3.

The performance testing results of the SM2 and RSA-3072.

More »

Table 3 Expand

Table 4.

The performance testing results of the SM3 and SHA-256.

More »

Table 4 Expand

Table 5.

The performance testing results of SM4 and AES-256.

More »

Table 5 Expand

Table 6.

Evaluation results of security performance.

More »

Table 6 Expand

Table 7.

Confidentiality, integrity, and availability analysis results.

More »

Table 7 Expand

Fig 9.

Overall performance comparison of SM2 and RSA-3072 algorithms.

More »

Fig 9 Expand

Fig 10.

The performance comparison between SM3 and SHA-256.

More »

Fig 10 Expand

Fig 11.

The performance comparison between SM4 and AES-256.

More »

Fig 11 Expand