SM Cryptography Tools
SM2 public key cipher, SM3 hash, SM4 block cipher - Chinese national standard cryptography
SM2 Elliptic Curve Public Key Cipher
Key Generation
Encrypt
Decrypt
SM Cryptography Documentation
SM2 Elliptic Curve Public Key Cipher
SM2 is an elliptic curve public key cipher specified by Chinese national standard GBT 32918.2, providing secure public key encryption and digital signatures.
Common Applications
Digital certificates, identity authentication, and secure communication in financial institutions
Related Standards
GB/T 32918 Series (SM2 Elliptic Curve Public Key Cipher)
SM3 Cryptographic Hash Algorithm
SM3 is a cryptographic hash algorithm specified by Chinese national standard GB/T 32905, outputting 256-bit digest for integrity verification and digital signatures.
Common Applications
Data integrity verification, digital signatures, and cryptographic protocols
Related Standards
GB/T 32905 (SM3 Cryptographic Hash Algorithm)
SM4 Block Cipher
SM4 is a block cipher specified by Chinese national standard GB/T 32907, using 128-bit blocks and 128-bit keys, supporting multiple modes including ECB, CBC, and CTR.
Common Applications
Data encryption, key exchange, VPN and secure channels
Related Standards
GB/T 32907 (SM4 Block Cipher)
Security Notes
- Private key must be properly protected and not transmitted over insecure networks
- Hash algorithm is one-way and irreversible, used for data integrity verification
- Key and IV should be randomly generated and stored securely
FAQ
Why use SM cryptography algorithms?
SM cryptography algorithms are Chinese commercial cipher standards widely used in finance, government, and defense sectors. They have been assessed and certified by national cryptography authorities, with guaranteed security.
What is the difference between SM2, SM3, and SM4?
SM2 is for asymmetric encryption and digital signatures, SM3 for data hashing and integrity verification, and SM4 for symmetric encryption. These three are typically used together to implement comprehensive security solutions.
What is the performance of SM algorithms?
SM algorithm performance is comparable to international standards (RSA/SHA/AES). SM4 performs better than RSA, and SM3 performance is comparable to SHA-256.
Related Tools
AES Encryption/Decryption
Securely encrypt and decrypt text using AES algorithm
SHA Hash Generator
Online SHA hash generator supporting SHA-1, SHA-256, SHA-384, SHA-512 algorithms
RSA Encryption/Decryption
Use RSA asymmetric encryption for public key encryption, private key decryption, digital signing and verification
MD5 Generator
Generate MD5 hash values for text, useful for data integrity verification