Jump to content
Wikipedia The Free Encyclopedia

SM3 (hash function)

From Wikipedia, the free encyclopedia
Cryptographic hash function
SM3
General
DesignersNational Cryptography Administration
First published2010

ShangMi 3 (SM3) is a cryptographic hash function, standardised for use in commercial cryptography in China.[1] It was published by the National Cryptography Administration (Chinese: 国家密码管理局) on 2010年12月17日[2] [3] as "GM/T 0004-2012: SM3 cryptographic hash algorithm".[2]

SM3 is used for implementing digital signatures, message authentication codes, and pseudorandom number generators.[4] The algorithm is public[5] [6] and is considered similar to SHA-256 in security and efficiency.[7] SM3 is used with Transport Layer Security.[8]

Definitive standards

[edit ]

SM3 is defined in each of:

  • GM/T 0004-2012: SM3 cryptographic hash algorithm[2]
  • GB/T 32905-2016: Information security techniques—SM3 cryptographic hash algorithm[9]
  • ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions
  • IETF RFC draft-sca-cfrg-sm3-02[4]

References

[edit ]
  1. ^ Martinkauppi, Louise Bergman; He, Qiuping; Ilie, Dragos (June 2020). "On the Design and Performance of Chinese OSCCA-approved Cryptographic Algorithms". 2020 13th International Conference on Communications (COMM). pp. 119–124. doi:10.1109/COMM48946.2020.9142035. ISBN 978-1-7281-5611-8. S2CID 220668639.
  2. ^ a b c "Announcement No.23 of the State Cryptography Administration" (in Chinese (China)). The Office of the State Commercial Code Administration (OSCCA). 2012年03月21日. Archived from the original on 2016年08月14日. Retrieved 2016年07月24日.
  3. ^ "SM3 cryptographic hash algorithm" (in Chinese (China)). CNNIC. 2013年12月04日. Archived from the original on 2016年09月19日. Retrieved 2016年07月24日.
  4. ^ a b "The SM3 Cryptographic Hash Function". Internet Engineering Task Force. 2018年01月08日. Retrieved 2023年11月16日.
  5. ^ "Announcement No.22 of the State Cryptography Administration" (in Chinese (China)). The Office of the State Commercial Code Administration (OSCCA). 2010年12月17日. Retrieved 2016年08月06日.
  6. ^ "SM3 cryptographic hash algorithm" (PDF) (in Chinese (China)).
  7. ^ "An Efficient and Low-Power Design of the SM3 Hash Algorithm for IoT". Electronics. 2019年09月11日. Retrieved 2021年02月11日.
  8. ^ Yang, P (March 2021). RFC 8998. IETF. doi:10.17487/RFC8998 . Retrieved 2022年07月30日.
  9. ^ Wang Xiaoyun. SM3 Cryptographic Hash Algorithm [J]. Journal of Information Security Research, 2016, 2(11): 983-994.

See also

[edit ]
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
General
Mathematics


Stub icon

This cryptography-related article is a stub. You can help Wikipedia by expanding it.

AltStyle によって変換されたページ (->オリジナル) /