with the application of symmetric cipher and asymmetric cipher, a cryptographic key management scheme for hierarchy is presented and a workgroup cryptographic key management scheme is presented.
as the basis and core of information security, cryptography also attracts more and more attention. brute force attack on symmetric cipher algorithms is an important direction of cryptography.