CoderTools

SM Cryptography Tools

SM2 public key cipher, SM3 hash, SM4 block cipher - Chinese national standard cryptography

SM2 Elliptic Curve Public Key Cipher

Key Generation

C1=EC Point, C2=Ciphertext, C3=SM3 Digest

Encrypt

Decrypt

SM Cryptography Documentation

SM2 Elliptic Curve Public Key Cipher

SM2 is an elliptic curve public key cipher specified by Chinese national standard GBT 32918.2, providing secure public key encryption and digital signatures.

Common Applications

Digital certificates, identity authentication, and secure communication in financial institutions

Related Standards

GB/T 32918 Series (SM2 Elliptic Curve Public Key Cipher)

SM3 Cryptographic Hash Algorithm

SM3 is a cryptographic hash algorithm specified by Chinese national standard GB/T 32905, outputting 256-bit digest for integrity verification and digital signatures.

Common Applications

Data integrity verification, digital signatures, and cryptographic protocols

Related Standards

GB/T 32905 (SM3 Cryptographic Hash Algorithm)

SM4 Block Cipher

SM4 is a block cipher specified by Chinese national standard GB/T 32907, using 128-bit blocks and 128-bit keys, supporting multiple modes including ECB, CBC, and CTR.

Common Applications

Data encryption, key exchange, VPN and secure channels

Related Standards

GB/T 32907 (SM4 Block Cipher)

Security Notes

  • Private key must be properly protected and not transmitted over insecure networks
  • Hash algorithm is one-way and irreversible, used for data integrity verification
  • Key and IV should be randomly generated and stored securely

FAQ

Why use SM cryptography algorithms?

SM cryptography algorithms are Chinese commercial cipher standards widely used in finance, government, and defense sectors. They have been assessed and certified by national cryptography authorities, with guaranteed security.

What is the difference between SM2, SM3, and SM4?

SM2 is for asymmetric encryption and digital signatures, SM3 for data hashing and integrity verification, and SM4 for symmetric encryption. These three are typically used together to implement comprehensive security solutions.

What is the performance of SM algorithms?

SM algorithm performance is comparable to international standards (RSA/SHA/AES). SM4 performs better than RSA, and SM3 performance is comparable to SHA-256.

Related Tools