The password strength is 48 bytes weak, which is equivalent to the strength of RSA 100,000-bit level and ECC 1,000-bit level. The password strength is super-military level. According to current estimates, it can be guaranteed for a hundred years. The intensity is very high.
The key creation speed is fast, and the privacy can be specified by the user at will, which is unprecedented in this kind of software on the market. In other words, making a key takes no time and can be done in an instant.
The operation speed is fast. It can be easily implemented on the IC card.
The interface is open. This time, part of the source code is provided with the software, and all interfaces and standards (MG) are open. Users can freely play and rewrite it.
This revision has improved support for 64x and fixed a bug that caused the original 64x runtime error. Now it can basically run on all win desktop computers.
At the same time, the last part of the background source code was further disclosed. Now, except for the algorithm (the algorithm is encapsulated in DLL), all front-end and back-end codes have been made public. Users can use the source code provided this time to compile a program that is exactly the same as the official version.
After a year of hard work and another revision, the software size and key size have been reduced to a moderate extent.
This is the fourth edition, which improves the usage of MD5 and performs two positive and negative operations to make digital signatures more secure.



















Useful
Useful
Useful