SM3 (hash function)
From HandWiki
Short description: Cryptographic hash function
ShangMi 3 (SM3) is a cryptographic hash function used in the Chinese National Standard. It was published by the National Cryptography Administration (Chinese: 国家密码管理局) on 2010-12-17[1][2] as "GM/T 0004-2012: SM3 cryptographic hash algorithm".[1]
SM3 is used for implementing digital signatures, message authentication codes, and pseudorandom number generators.[3] The algorithm is public[4][5] and is considered similar to SHA-256 in security and efficiency.[6] SM3 is used with Transport Layer Security.[7]
Definitive standards
SM3 is defined in each of:
- GM/T 0004-2012: SM3 cryptographic hash algorithm[1]
- GB/T 32905-2016: Information security techniques—SM3 cryptographic hash algorithm[8]
- ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions
- IETF RFC draft-sca-cfrg-sm3-02[3]
References
- ↑ 1.0 1.1 1.2 "Announcement No.23 of the State Cryptography Administration" (in zh-cn). The Office of Security Commercial Code Administration (OSCCA). 2012-03-21. http://www.oscca.gov.cn/News/201204/News_1228.htm.
- ↑ "SM3 cryptographic hash algorithm" (in zh-cn). CNNIC. 2013-12-04. http://www.cnnic.cn/gcjsyj/qyjsyj/mmsfbz/sm3/201312/t20131204_43340.htm. Retrieved 2016-07-24.
- ↑ 3.0 3.1 "The SM3 Cryptographic Hash Function". Internet Engineering Task Force. 2018-01-08. https://datatracker.ietf.org/doc/html/draft-sca-cfrg-sm3. Retrieved 2023-11-16.
- ↑ "Announcement No.22 of the State Cryptography Administration" (in zh-cn). The Office of Security Commercial Code Administration (OSCCA). 2010-12-17. http://www.oscca.gov.cn/News/201012/News_1199.htm. Retrieved 2016-08-06.
- ↑ "SM3 cryptographic hash algorithm" (in zh-cn). http://www.oscca.gov.cn/sca/xxgk/2010-12/17/1002389/files/302a3ada057c4a73830536d03e683110.pdf.
- ↑ "An Efficient and Low-Power Design of the SM3 Hash Algorithm for IoT" (in en-us). Electronics. 2019-09-11. https://www.researchgate.net/publication/335848054. Retrieved 2021-02-11.
- ↑ Yang, P (March 2021), RFC 8998, IETF, doi:10.17487/RFC8998, https://tools.ietf.org/html/rfc8998, retrieved 2022-07-30
- ↑ Wang Xiaoyun. SM3 Cryptographic Hash Algorithm[J]. Journal of Information Security Research, 2016, 2(11): 983-994.
See also
- SM4 (cipher)
Original source: https://en.wikipedia.org/wiki/SM3 (hash function).
Read more |