ShangMi 3 (SM3) is a cryptographic hash function, standardised for use in commercial cryptography in China.[1] It was published by the National Cryptography Administration (Chinese: 国家密码管理局) on 2010-12-17[2][3] as "GM/T 0004-2012: SM3 cryptographic hash algorithm".[2]

SM3
General
DesignersNational Cryptography Administration
First published2010

SM3 is used for implementing digital signatures, message authentication codes, and pseudorandom number generators.[4] The algorithm is public[5][6] and is considered similar to SHA-256 in security and efficiency.[7] SM3 is used with Transport Layer Security.[8]

Definitive standards

edit

SM3 is defined in each of:

  • GM/T 0004-2012: SM3 cryptographic hash algorithm[2]
  • GB/T 32905-2016: Information security techniques—SM3 cryptographic hash algorithm[9]
  • ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions
  • IETF RFC draft-sca-cfrg-sm3-02[4]

References

edit
  1. ^ Martinkauppi, Louise Bergman; He, Qiuping; Ilie, Dragos (June 2020). "On the Design and Performance of Chinese OSCCA-approved Cryptographic Algorithms". 2020 13th International Conference on Communications (COMM). pp. 119–124. doi:10.1109/COMM48946.2020.9142035. ISBN 978-1-7281-5611-8. S2CID 220668639.
  2. ^ a b c "Announcement No.23 of the State Cryptography Administration" (in Chinese (China)). The Office of the State Commercial Code Administration (OSCCA). 2012-03-21. Archived from the original on 2016-08-14. Retrieved 2016-07-24.
  3. ^ "SM3 cryptographic hash algorithm" (in Chinese (China)). CNNIC. 2013-12-04. Archived from the original on 2016-09-19. Retrieved 2016-07-24.
  4. ^ a b "The SM3 Cryptographic Hash Function". Internet Engineering Task Force. 2018-01-08. Retrieved 2023-11-16.
  5. ^ "Announcement No.22 of the State Cryptography Administration" (in Chinese (China)). The Office of the State Commercial Code Administration (OSCCA). 2010-12-17. Retrieved 2016-08-06.
  6. ^ "SM3 cryptographic hash algorithm" (PDF) (in Chinese (China)).
  7. ^ "An Efficient and Low-Power Design of the SM3 Hash Algorithm for IoT". Electronics. 2019-09-11. Retrieved 2021-02-11.
  8. ^ Yang, P (March 2021). RFC 8998. IETF. doi:10.17487/RFC8998. Retrieved 2022-07-30.
  9. ^ Wang Xiaoyun. SM3 Cryptographic Hash Algorithm[J]. Journal of Information Security Research, 2016, 2(11): 983-994.

See also

edit


pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy