{"id":792,"date":"2024-02-05T22:11:26","date_gmt":"2024-02-05T21:11:26","guid":{"rendered":"http:\/\/10.0.1.197\/?page_id=792"},"modified":"2024-08-27T08:28:04","modified_gmt":"2024-08-27T06:28:04","slug":"entropy-source-assessment","status":"publish","type":"page","link":"http:\/\/192.168.0.78\/services\/cryptographic-testing\/entropy-source-assessment\/","title":{"rendered":"\u71b5\u6e90\uff08Entropy Source\uff09\u8bc4\u4f30"},"content":{"rendered":"\n
\n
\n
\n
\n
\n

\u5bc6\u7801\u6d4b\u8bd5<\/p>\n\n\n\n

\u71b5\u6e90\uff08Entropy Source\uff09\u8bc4\u4f30<\/h1>\n\n\n\n

\u54a8\u8be2\u6211\u4eec\u7684\u4e13\u5bb6\u3002\u6211\u4eec\u5f88\u9ad8\u5174\u4e3a\u60a8\u63d0\u4f9b\u652f\u6301\u3002<\/p>\n\n\n\n

\n
\u8054\u7cfb\u6211\u4eec<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
<\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/g><\/g>
\n
\n
\n
\n
\n
\n

atsec\u63d0\u4f9b\u7684\u670d\u52a1\uff1a<\/h3>\n\n\n\n

atsec \u7f8e\u56fd\u901a\u8fc7\u5176\u7ecf\u8ba4\u53ef\u7684\u5bc6\u7801\u5b89\u5168\u6d4b\u8bd5 (CST) \u5b9e\u9a8c\u5ba4 (NVLAP \u5b9e\u9a8c\u5ba4\u4ee3\u7801 #200658-0) \u63d0\u4f9b SP800-90 \u7cfb\u5217\u6587\u4ef6\u89c4\u5b9a\u7684\u71b5\u6e90\u8bc4\u4f30\u3002\u8bc4\u4f30\u5305\u62ec\u4e24\u90e8\u5206\uff0c\u5e76\u5c06\u5bfc\u81f4\u5728 NIST \u7f51\u7ad9\u4e0a\u5217\u51fa ESV \u8bc1\u4e66\uff1a<\/p>\n\n\n\n