The current security specifications for e-commerce include the specifications of the encryption algorithm, packet summary algorithm, security communication protocol, etc. 1. The basic encryption algorithm of encryption algorithm has two: symmetric key encryption, asymmetric key encryption, is used to ensure confidentiality, integrity, authenticity, and non-property services in e-commerce. (1) Symmetric key encrypted symmetric key encryption is also called Secret Key Encryption, i.e., both parties that transmit and receive data must encrypt and decrypt computing using the same / symmetric key. The most famous symmetric key encryption standard is Data Encryption Standard, referred to as DES. DES is a block encryption algorithm for operating 64-bit data blocks using a key to 56 data bits. It is launched by IBM, which can simultaneously encrypt a large amount of data. The US government announced on January 15, 1977 as Federal Information Processing Standard, referred to as FIPS, namely FIPS PUB 46-2, has been used in banking and other fields for more than 20 years. The DES algorithm has been widely analyzed and tested, and is considered a very safe system. There are currently some symmetric key encryption algorithms than the DES algorithm, such as the IDEA algorithm, RC2, RC4 algorithm, Skipjack algorithm, etc. (2) Asymmetric key encryption asymmetric key encryption is also called public key encryption, Professor Herman, Stanford University in 1977, was proposed in 1977. It mainly refers to everyone has a pair of unique corresponding keys: public key and private key, public key pairs are open, and private keys are kept by personal secrets; use one of them to encrypt, they can only use another The key is decrypted. Merchants can disclose their public keys; the customer can encrypt the information sent by the merchant's public key to the merchant, and then decrypt by the merchant with her own private key. Public key encryption technology solves the publishing and management of keys, is the core of current business password. Using the public key technology, the two sides of data communication can securely confirm the other party identity and public key, providing the identity of communication. As a result, the construction of the public key system is a prerequisite for e-commerce. The asymmetric encryption algorithm mainly has RSA, DSA, Diffie-Hellman, PKCS, PGP, etc. The US Government is the first to deal with the standardization of password technology. From DES, a series of federal information processing standards (FIPS) has been developed by NIST, and the password technology specification is developed, and the cryptographic product is strictly inspected under the premise of technical specifications. my country is relatively behind in public key institutions. The construction of its public key system should fully take advantage of the experience and lessons of other countries to implement public key systems and e-commerce strategy; combined with the development of e-commerce, and the needs of cross-sectoral applications, the central government is coordinated and developed. my country's unified, complete national public key system, promoting the development of e-commerce in my country, enhancing our competitiveness in the e-commerce field, and promoting the development of the password product market. 2. Message Digest Algorithms This is a unidirectional HASH algorithm to summarize the plaintext of encryption, resulting in a one-way hasonial (HASH) value having a fixed length. Among them, hash functions is a formula that converts a different length of packets into a numeric string (ie, message summary), which does not require a key, and the formula determines the length of the message summary.