About the UI displaying the cryptographic algorithm

Whether a website is secure or not, there are at least three basic elements, one is https encryption, the other is WAF protection, and the third is trusted identity validation, all three are indispensable. That's why the ZT Browser innovatively displays three security-related icons: 加密  waf  t4, not only has the security padlock, but also has the WAF protection icon and the website trusted identity validation level icon. ZT Browser has also innovatively added an icon that displays the cryptographic algorithm of the SSL certificate deployed on the website to help users understand the cryptographic algorithms used in HTTPS encryption, including the RSA algorithm, ECC algorithm, and SM2 algorithm. Please refer to the innovation UI Icon Summary of ZT Browser for details.

The cryptographic algorithm used for HTTPS encryption depends on the cryptographic algorithm used to issue the SSL certificate deployed by the website. ZT Browser supports three cryptographic algorithms: RSA/ECC/SM2. Different algorithms display different icons for users to identify, and it is also convenient for government regulators and assessment agencies to intuitively understand whether the SSL certificate deployed by the website is compliant. If the website deploys a dual-algorithm SSL certificate, such as RSA+SM2, ZT Browser will give priority to using the SM2 algorithm to implement HTTPS encryption to meet the commercial cryptographic compliance requirements in China.

The specific UI display rules are as follows:

1. When a user visits a website that has deployed an RSA algorithm SSL certificate, an R icon will be displayed after the padlock. Clicking the R icon will display “RSA Algorithm, Publicly Trusted”.

RSA Algorithm, Publicly Trusted

2. When a user visits a website that has deployed an ECC algorithm SSL certificate, an E icon will be displayed after the padlock. Clicking the E icon will display “ECC Algorithm, Publicly Trusted”.

ECC Algorithm, Publicly Trusted

3. When a user visits a website that has deployed an SM2 algorithm SSL certificate, an m icon will be displayed after the padlock. Clicking the m icon will display “SM2 Algorithm, Cryptography Compliance”.

SM2 Algorithm, Publicly Trusted

4. When a user visits a website that has deployed an intranet SSL certificate trusted by ZT Browser, the cryptography algorithm RSA/ECC/SM2 will be displayed, and displays “Intranet SSL Certificate” to let visitors know it.

RSA
ECC
SM2

It is recommended to choose the ZoTrus HTTPS automation management solution, which does not need to apply for an SSL certificate from a CA, install an SSL certificate on the web server, or install ACME client software on the web server, and fully automatically implement https encryption and WAF protection. Since the validity period of SSL certificates will be shortened to 47 days, the traditional solution of manually applying for and deploying SSL certificates cannot meet the application requirements of many website systems that need to deploy SSL certificates, and the automatic management of SSL certificates must be realized. In particular, the critical information infrastructure system that needs to realize the SM2 algorithm HTTPS encryption, the solution that does not affect the normal operation of the existing business system with zero transformation of the original web server is required, ZoTrus solution not only automatically deploys the RSA/ECC SSL certificate, but also automatically deploys the SM2 SSL certificate to realize the automatic management of the dual-algorithm SSL certificate. ZT Browser preferentially uses the SM2 algorithm to achieve HTTPS encryption, and other browsers that do not support the SM2 algorithm use the ECC algorithm to achieve HTTPS encryption.

ZoTrus HTTPS automation management solution