ShangMi 3(SM3) is acryptographic hash functionused in the Chinese National Standard. It was published by the National Cryptography Administration (Chinese:Quốc gia mật mã quản lý cục) on 2010-12-17[1][2]as "GM/T 0004-2012: SM3 cryptographic hash algorithm".[1]

SM3
General
DesignersNational Cryptography Administration
First published2010

SM3 is used for implementingdigital signatures,message authentication codes,andpseudorandom number generators.[3]The algorithm is public[4][5]and is considered similar toSHA-256in security and efficiency.[6]SM3 is used withTransport Layer Security.[7]

Definitive standards

edit

SM3 is defined in each of:

  • GM/T 0004-2012: SM3 cryptographic hash algorithm[1]
  • GB/T 32905-2016: Information security techniques—SM3 cryptographic hash algorithm[8]
  • ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions
  • IETF RFC draft-sca-cfrg-sm3-02[3]

References

edit
  1. ^abc"Announcement No.23 of the State Cryptography Administration"(in Chinese (China)). The Office of Security Commercial Code Administration (OSCCA). 2012-03-21. Archived fromthe originalon 2016-08-14.Retrieved2016-07-24.
  2. ^"SM3 cryptographic hash algorithm"(in Chinese (China)).CNNIC.2013-12-04. Archived fromthe originalon 2016-09-19.Retrieved2016-07-24.
  3. ^ab"The SM3 Cryptographic Hash Function".Internet Engineering Task Force.2018-01-08.Retrieved2023-11-16.
  4. ^"Announcement No.22 of the State Cryptography Administration"(in Chinese (China)). The Office of Security Commercial Code Administration (OSCCA). 2010-12-17.Retrieved2016-08-06.
  5. ^"SM3 cryptographic hash algorithm"(PDF)(in Chinese (China)).
  6. ^"An Efficient and Low-Power Design of the SM3 Hash Algorithm for IoT".Electronics. 2019-09-11.Retrieved2021-02-11.
  7. ^Yang, P (March 2021).RFC 8998.IETF.doi:10.17487/RFC8998.Retrieved2022-07-30.
  8. ^Wang Xiaoyun.SM3 Cryptographic Hash Algorithm[J]. Journal of Information Security Research, 2016, 2(11): 983-994.

See also

edit