Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

SM3 (hash function)

From Wikipedia, the free encyclopedia
Cryptographic hash function
SM3
General
DesignersNational Cryptography Administration
First published2010

ShangMi 3 (SM3) is acryptographic hash function, standardised for use in commercial cryptography in China.[1] It was published by the National Cryptography Administration (Chinese:国家密码管理局) on 2010-12-17[2][3] as "GM/T 0004-2012: SM3 cryptographic hash algorithm".[2]

SM3 is used for implementingdigital signatures,message authentication codes, andpseudorandom number generators.[4] The algorithm is public[5][6] and is considered similar toSHA-256 in security and efficiency.[7] SM3 can be used withTransport Layer Security[8] although it is not enabled by default.

Attacks

[edit]

Cryptanalysis

[edit]

Shen Y Z, Bai D X, Yu H B. Improved cryptanalysis of step-reduced SM3. Sci China Inf Sci, 2018,61(3): 038105, doi: 10.1007/s11432-017-9119-6

Side channel

[edit]

Christophe Clavier and Leo Reynaud and Antoine Wurcker. Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm (2019).https://eprint.iacr.org/2019/346.

Definitive standards

[edit]

SM3 is defined in each of:

  • GM/T 0004-2012: SM3 cryptographic hash algorithm[2]
  • GB/T 32905-2016: Information security techniques—SM3 cryptographic hash algorithm[9]
  • ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions
  • IETF RFC draft-sca-cfrg-sm3-02[4]

References

[edit]
  1. ^Martinkauppi, Louise Bergman; He, Qiuping; Ilie, Dragos (June 2020)."On the Design and Performance of Chinese OSCCA-approved Cryptographic Algorithms".2020 13th International Conference on Communications (COMM). pp. 119–124.doi:10.1109/COMM48946.2020.9142035.ISBN 978-1-7281-5611-8.S2CID 220668639.
  2. ^abc"Announcement No.23 of the State Cryptography Administration" (in Chinese (China)). The Office of the State Commercial Code Administration (OSCCA). 2012-03-21. Archived fromthe original on 2016-08-14. Retrieved2016-07-24.
  3. ^"SM3 cryptographic hash algorithm" (in Chinese (China)).CNNIC. 2013-12-04. Archived fromthe original on 2016-09-19. Retrieved2016-07-24.
  4. ^ab"The SM3 Cryptographic Hash Function".Internet Engineering Task Force. 2018-01-08. Retrieved2023-11-16.
  5. ^"Announcement No.22 of the State Cryptography Administration" (in Chinese (China)). The Office of the State Commercial Code Administration (OSCCA). 2010-12-17. Retrieved2016-08-06.[permanent dead link]
  6. ^"SM3 cryptographic hash algorithm"(PDF) (in Chinese (China)).
  7. ^"An Efficient and Low-Power Design of the SM3 Hash Algorithm for IoT". Electronics. 2019-09-11. Retrieved2021-02-11.
  8. ^Yang, P (March 2021).RFC 8998.IETF.doi:10.17487/RFC8998. Retrieved2022-07-30.
  9. ^Wang Xiaoyun.SM3 Cryptographic Hash Algorithm[J]. Journal of Information Security Research, 2016, 2(11): 983-994.

See also

[edit]
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
General
Mathematics


Stub icon

This cryptography-related article is astub. You can help Wikipedia byexpanding it.

Retrieved from "https://en.wikipedia.org/w/index.php?title=SM3_(hash_function)&oldid=1304738642"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp