Introduction - If you have any usage issues, please Google them yourself
Aimed at DTCP content protection agreement, the paper analyzes agreement using cryptographic algorithms, puts forward secure hash function SHA one 1, SHA a 256, AES encryption algorithm, prime fields senior elliptic curve point multiply algorithm, the hardware realization method effectively meet the DTCP content protection of equipment, validation, transmission protocol data encryption demand.