SM3 (hash function)

{{Short description|Cryptographic hash function}}

{{Infobox hash function|name=SM3|designers=National Cryptography Administration|publish date=2010}}

ShangMi 3 (SM3) is a cryptographic hash function, standardised for use in commercial cryptography in China.{{Cite book |last1=Martinkauppi |first1=Louise Bergman |last2=He |first2=Qiuping |last3=Ilie |first3=Dragos |title=2020 13th International Conference on Communications (COMM) |chapter=On the Design and Performance of Chinese OSCCA-approved Cryptographic Algorithms |date=June 2020 |chapter-url=https://ieeexplore.ieee.org/document/9142035 |pages=119–124 |doi=10.1109/COMM48946.2020.9142035|isbn=978-1-7281-5611-8 |s2cid=220668639 |url=http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19835 }} It was published by the National Cryptography Administration ({{lang-zh|国家密码管理局}}) on 2010-12-17{{cite web|url=http://www.oscca.gov.cn/News/201204/News_1228.htm |title=Announcement No.23 of the State Cryptography Administration |publisher=The Office of the State Commercial Code Administration (OSCCA) |date=2012-03-21 |access-date=2016-07-24 |url-status=dead |archive-url=https://web.archive.org/web/20160814151056/http://www.oscca.gov.cn/News/201204/News_1228.htm |archive-date=2016-08-14 |language=zh-cn}}{{cite web |url=http://www.cnnic.cn/gcjsyj/qyjsyj/mmsfbz/sm3/201312/t20131204_43340.htm |title=SM3 cryptographic hash algorithm |publisher=CNNIC |date=2013-12-04 |accessdate=2016-07-24 |language=zh-cn |archive-date=2016-09-19 |archive-url=https://web.archive.org/web/20160919080203/http://www.cnnic.cn/gcjsyj/qyjsyj/mmsfbz/sm3/201312/t20131204_43340.htm |url-status=dead }} as "GM/T 0004-2012: SM3 cryptographic hash algorithm".

SM3 is used for implementing digital signatures, message authentication codes, and pseudorandom number generators.{{cite web|url=https://datatracker.ietf.org/doc/html/draft-sca-cfrg-sm3 |title=The SM3 Cryptographic Hash Function |publisher=Internet Engineering Task Force |date=2018-01-08 |accessdate=2023-11-16}} The algorithm is public{{cite web|url=http://www.oscca.gov.cn/News/201012/News_1199.htm |title=Announcement No.22 of the State Cryptography Administration |publisher=The Office of the State Commercial Code Administration (OSCCA) |date=2010-12-17 |accessdate=2016-08-06 |language=zh-cn}}{{cite web |url=http://www.oscca.gov.cn/sca/xxgk/2010-12/17/1002389/files/302a3ada057c4a73830536d03e683110.pdf |title=SM3 cryptographic hash algorithm |language=zh-cn}} and is considered similar to SHA-256 in security and efficiency.{{cite web|url=https://www.researchgate.net/publication/335848054 |title=An Efficient and Low-Power Design of the SM3 Hash Algorithm for IoT |publisher=Electronics |date=2019-09-11 |accessdate=2021-02-11 |language=en-us}} SM3 is used with Transport Layer Security.{{cite IETF |title= |rfc=8998 |last=Yang |first=P |date=March 2021 |publisher=IETF |access-date=2022-07-30 |doi=10.17487/RFC8998}}

Definitive standards

SM3 is defined in each of:

  • GM/T 0004-2012: SM3 cryptographic hash algorithm
  • GB/T 32905-2016: Information security techniques—SM3 cryptographic hash algorithmWang Xiaoyun. {{URL|1=http://ris.sic.gov.cn/CN/Y2016/V2/I11/983 |2=SM3 Cryptographic Hash Algorithm}}[J]. Journal of Information Security Research, 2016, 2(11): 983-994.
  • ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions
  • IETF RFC draft-sca-cfrg-sm3-02

References

{{Reflist}}

See also