On November 29, 2023, the Minister of National Defense issued Circular 96/2023/TT-BQP on National technical regulation on cryptographic technical characteristics used in civil cryptographic products belonging to the group of data storage security products in Vietnam (QCVN 15:2023/BQP).
According to QCVN 15:2023/BQP, the following terms are understood as follows:
- Information not within the scope of state secrets is information that does not belong to the content of "top secret", "secret" and "confidential" information as prescribed in the Law on Protection of State Secrets 2018.
- Passwords are specific rules and conventions used to change the form of information expression to ensure the confidentiality, authenticity, and integrity of information content.
- Civil cryptography is a cryptographic technique and cryptographic product used to secure or authenticate information that is not state-secret.
- Civil cryptographic products are documents, technical equipment, and cryptographic operations to protect information that is not within the scope of state secrets.
- Data storage security products are civil cryptographic products that use cryptographic algorithms and cryptographic techniques to protect data stored on the device.
- Retained data: data (information) is stored (recorded) in a storage medium.
- Cryptographic techniques are methods and means that apply cryptography to protect information.
- Encryption is the process of using cryptographic techniques to change the form of information expression.
- Decoding is the inverse transformation of the corresponding encoding process.
- The key is a sequence of characters that controls the operation of a cryptographic transformation.
- Symmetric cryptography is cryptography in which the keys used for encryption and decryption are the same, or the encryption key can be easily calculated when the decryption key is known, and vice versa.
- Asymmetric cryptography is cryptography in which the key used to allow encryption or decryption consists of two components: a public key and a private key.
with the property that it is easy to calculate the public key if the private key is known, but it is computationally infeasible to calculate the private key from the public key.
- Hash algorithm is an algorithm that converts an input data string of any length into a characteristic output data string of a fixed length.
- Message authentication algorithm is an algorithm that transforms input data strings and secret keys into output data strings of fixed length that satisfy the following properties:
+ Easy calculation with any key and input data string;
+ With any fixed key and without knowing the key in advance, it is impossible to calculate the value of the output data series with any new input data series.
- HS code is the classification code of goods used to determine import and export tax rates and other obligations.
More details can be found in Circular 96/2023/TT-BQP taking effect on January 15, 2024.
Address: | 19 Nguyen Gia Thieu, Vo Thi Sau Ward, District 3, Ho Chi Minh City |
Phone: | (028) 7302 2286 |
E-mail: | info@lawnet.vn |